From 6a206bf0256b24e04b1f68cf8477a0bc531bfe6b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 9 Mar 2025 03:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-03-09T03:00:19.873769+00:00 --- CVE-2012/CVE-2012-03xx/CVE-2012-0391.json | 2 +- CVE-2013/CVE-2013-07xx/CVE-2013-0744.json | 2 +- CVE-2017/CVE-2017-30xx/CVE-2017-3066.json | 2 +- CVE-2018/CVE-2018-118xx/CVE-2018-11816.json | 4 +- CVE-2018/CVE-2018-199xx/CVE-2018-19943.json | 2 +- CVE-2018/CVE-2018-199xx/CVE-2018-19949.json | 2 +- CVE-2018/CVE-2018-199xx/CVE-2018-19953.json | 2 +- CVE-2018/CVE-2018-23xx/CVE-2018-2380.json | 2 +- CVE-2018/CVE-2018-86xx/CVE-2018-8639.json | 42 +- CVE-2019/CVE-2019-18xx/CVE-2019-1815.json | 4 + CVE-2019/CVE-2019-201xx/CVE-2019-20171.json | 2 +- CVE-2019/CVE-2019-202xx/CVE-2019-20208.json | 2 +- CVE-2019/CVE-2019-74xx/CVE-2019-7481.json | 2 +- CVE-2019/CVE-2019-74xx/CVE-2019-7483.json | 2 +- CVE-2020/CVE-2020-118xx/CVE-2020-11862.json | 2 +- CVE-2020/CVE-2020-119xx/CVE-2020-11978.json | 4 +- CVE-2020/CVE-2020-139xx/CVE-2020-13927.json | 4 +- CVE-2020/CVE-2020-234xx/CVE-2020-23438.json | 4 + CVE-2020/CVE-2020-248xx/CVE-2020-24829.json | 18 +- CVE-2020/CVE-2020-279xx/CVE-2020-27950.json | 2 +- CVE-2020/CVE-2020-289xx/CVE-2020-28949.json | 4 +- CVE-2020/CVE-2020-28xx/CVE-2020-2883.json | 2 +- CVE-2020/CVE-2020-31xx/CVE-2020-3122.json | 4 + CVE-2020/CVE-2020-62xx/CVE-2020-6207.json | 2 +- CVE-2021/CVE-2021-16xx/CVE-2021-1675.json | 4 +- CVE-2021/CVE-2021-219xx/CVE-2021-21975.json | 2 +- CVE-2021/CVE-2021-238xx/CVE-2021-23820.json | 7 +- CVE-2021/CVE-2021-275xx/CVE-2021-27561.json | 4 +- CVE-2021/CVE-2021-287xx/CVE-2021-28799.json | 2 +- CVE-2021/CVE-2021-300xx/CVE-2021-30014.json | 13 +- CVE-2021/CVE-2021-300xx/CVE-2021-30022.json | 13 +- CVE-2021/CVE-2021-308xx/CVE-2021-30883.json | 8 +- CVE-2021/CVE-2021-310xx/CVE-2021-31010.json | 4 +- CVE-2021/CVE-2021-311xx/CVE-2021-31196.json | 4 +- CVE-2021/CVE-2021-311xx/CVE-2021-31199.json | 4 +- CVE-2021/CVE-2021-319xx/CVE-2021-31937.json | 2 +- CVE-2021/CVE-2021-319xx/CVE-2021-31982.json | 2 +- CVE-2021/CVE-2021-345xx/CVE-2021-34523.json | 6 +- CVE-2021/CVE-2021-350xx/CVE-2021-35001.json | 93 +- CVE-2021/CVE-2021-350xx/CVE-2021-35002.json | 93 +- CVE-2021/CVE-2021-355xx/CVE-2021-35587.json | 2 +- CVE-2021/CVE-2021-363xx/CVE-2021-36380.json | 4 +- CVE-2021/CVE-2021-369xx/CVE-2021-36942.json | 4 +- CVE-2021/CVE-2021-369xx/CVE-2021-36948.json | 4 +- CVE-2021/CVE-2021-369xx/CVE-2021-36955.json | 4 +- CVE-2021/CVE-2021-379xx/CVE-2021-37973.json | 4 +- CVE-2021/CVE-2021-386xx/CVE-2021-38645.json | 4 +- CVE-2021/CVE-2021-405xx/CVE-2021-40574.json | 30 +- CVE-2021/CVE-2021-417xx/CVE-2021-41719.json | 4 + CVE-2021/CVE-2021-442xx/CVE-2021-44207.json | 4 +- CVE-2021/CVE-2021-44xx/CVE-2021-4453.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47186.json | 102 +- CVE-2021/CVE-2021-471xx/CVE-2021-47188.json | 89 +- CVE-2021/CVE-2021-471xx/CVE-2021-47196.json | 89 +- CVE-2021/CVE-2021-472xx/CVE-2021-47205.json | 83 +- CVE-2021/CVE-2021-472xx/CVE-2021-47219.json | 102 +- CVE-2021/CVE-2021-474xx/CVE-2021-47407.json | 115 +- CVE-2021/CVE-2021-476xx/CVE-2021-47631.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47632.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47633.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47634.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47635.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47636.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47637.json | 4 +- CVE-2021/CVE-2021-476xx/CVE-2021-47638.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47639.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47640.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47641.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47642.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47643.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47644.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47645.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47646.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47647.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47648.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47649.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47650.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47651.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47652.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47653.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47654.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47655.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47656.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47657.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47658.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47659.json | 2 +- CVE-2021/CVE-2021-476xx/CVE-2021-47660.json | 2 +- CVE-2022/CVE-2022-214xx/CVE-2022-21445.json | 2 +- CVE-2022/CVE-2022-220xx/CVE-2022-22047.json | 4 +- CVE-2022/CVE-2022-227xx/CVE-2022-22718.json | 4 +- CVE-2022/CVE-2022-232xx/CVE-2022-23227.json | 2 +- CVE-2022/CVE-2022-257xx/CVE-2022-25773.json | 2 +- CVE-2022/CVE-2022-262xx/CVE-2022-26258.json | 2 +- CVE-2022/CVE-2022-279xx/CVE-2022-27924.json | 8 +- CVE-2022/CVE-2022-279xx/CVE-2022-27925.json | 127 +- CVE-2022/CVE-2022-279xx/CVE-2022-27926.json | 2 +- CVE-2022/CVE-2022-293xx/CVE-2022-29303.json | 2 +- CVE-2022/CVE-2022-303xx/CVE-2022-30333.json | 2 +- CVE-2022/CVE-2022-317xx/CVE-2022-31766.json | 2 +- CVE-2022/CVE-2022-359xx/CVE-2022-35914.json | 2 +- CVE-2022/CVE-2022-365xx/CVE-2022-36537.json | 4 +- CVE-2022/CVE-2022-370xx/CVE-2022-37042.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41040.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41061.json | 2 +- CVE-2022/CVE-2022-410xx/CVE-2022-41091.json | 4 +- CVE-2022/CVE-2022-411xx/CVE-2022-41128.json | 4 +- CVE-2022/CVE-2022-41xx/CVE-2022-4135.json | 2 +- CVE-2022/CVE-2022-429xx/CVE-2022-42966.json | 7 +- CVE-2022/CVE-2022-453xx/CVE-2022-45374.json | 52 +- CVE-2022/CVE-2022-479xx/CVE-2022-47966.json | 4 +- CVE-2022/CVE-2022-479xx/CVE-2022-47986.json | 4 +- CVE-2022/CVE-2022-482xx/CVE-2022-48219.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48632.json | 152 +- CVE-2022/CVE-2022-486xx/CVE-2022-48647.json | 159 +- CVE-2022/CVE-2022-487xx/CVE-2022-48717.json | 156 +- CVE-2022/CVE-2022-490xx/CVE-2022-49044.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49046.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49047.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49048.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49049.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49050.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49051.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49052.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49053.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49054.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49055.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49056.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49057.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49058.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49059.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49060.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49061.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49062.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49063.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49064.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49065.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49066.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49067.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49068.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49069.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49070.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49071.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49072.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49073.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49074.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49075.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49076.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49077.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49078.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49079.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49080.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49081.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49082.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49083.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49084.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49085.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49086.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49087.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49088.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49089.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49090.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49091.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49092.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49093.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49094.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49095.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49096.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49097.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49098.json | 2 +- CVE-2022/CVE-2022-490xx/CVE-2022-49099.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49100.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49102.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49103.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49104.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49105.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49106.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49107.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49108.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49109.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49110.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49111.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49112.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49113.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49115.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49116.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49117.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49118.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49119.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49120.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49121.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49122.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49123.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49124.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49125.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49126.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49127.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49128.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49129.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49130.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49131.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49132.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49133.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49134.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49135.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49136.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49137.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49138.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49139.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49141.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49142.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49144.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49145.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49146.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49147.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49148.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49149.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49150.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49151.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49152.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49153.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49154.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49155.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49156.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49157.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49158.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49159.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49160.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49161.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49162.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49163.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49164.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49165.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49166.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49167.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49168.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49169.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49170.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49171.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49172.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49173.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49174.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49175.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49176.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49177.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49178.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49179.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49180.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49183.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49184.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49185.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49186.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49187.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49188.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49189.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49190.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49191.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49192.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49193.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49194.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49195.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49197.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49198.json | 2 +- CVE-2022/CVE-2022-491xx/CVE-2022-49199.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49200.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49201.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49202.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49203.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49204.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49205.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49206.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49207.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49208.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49209.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49210.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49211.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49212.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49213.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49214.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49215.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49216.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49217.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49218.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49219.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49220.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49221.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49222.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49223.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49224.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49225.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49226.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49227.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49228.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49229.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49230.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49231.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49232.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49233.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49234.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49235.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49236.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49237.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49238.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49239.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49240.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49241.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49242.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49243.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49244.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49245.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49246.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49247.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49248.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49249.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49250.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49251.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49252.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49253.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49254.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49255.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49256.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49257.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49258.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49259.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49260.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49261.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49262.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49263.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49264.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49265.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49266.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49267.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49268.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49269.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49270.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49271.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49272.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49273.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49274.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49276.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49277.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49278.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49279.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49280.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49281.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49282.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49283.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49284.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49285.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49286.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49287.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49288.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49289.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49290.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49291.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49292.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49293.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49294.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49295.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49296.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49297.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49298.json | 2 +- CVE-2022/CVE-2022-492xx/CVE-2022-49299.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49300.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49301.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49302.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49303.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49304.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49305.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49306.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49307.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49308.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49309.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49310.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49311.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49312.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49313.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49314.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49315.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49316.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49317.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49318.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49319.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49320.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49321.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49322.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49323.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49324.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49325.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49326.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49327.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49328.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49329.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49330.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49331.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49332.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49333.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49334.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49335.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49336.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49337.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49338.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49339.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49340.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49341.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49342.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49343.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49344.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49345.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49346.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49347.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49348.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49349.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49350.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49351.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49352.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49353.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49354.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49356.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49357.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49358.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49359.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49360.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49361.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49362.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49363.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49364.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49365.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49366.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49367.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49368.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49369.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49370.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49371.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49372.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49373.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49374.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49375.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49376.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49377.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49378.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49379.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49380.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49381.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49382.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49383.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49384.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49385.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49386.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49387.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49388.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49389.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49390.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49391.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49392.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49393.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49394.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49395.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49396.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49397.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49398.json | 2 +- CVE-2022/CVE-2022-493xx/CVE-2022-49399.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49400.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49401.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49402.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49403.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49404.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49405.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49406.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49407.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49408.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49409.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49410.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49412.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49413.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49414.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49415.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49416.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49417.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49418.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49419.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49420.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49421.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49422.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49423.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49424.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49425.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49426.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49427.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49428.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49429.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49430.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49431.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49432.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49433.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49434.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49435.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49436.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49437.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49438.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49439.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49440.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49441.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49442.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49443.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49444.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49445.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49446.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49447.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49448.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49449.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49450.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49451.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49452.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49453.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49454.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49455.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49456.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49457.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49458.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49459.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49460.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49461.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49462.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49463.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49464.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49465.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49466.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49467.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49468.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49469.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49470.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49471.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49472.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49473.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49474.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49475.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49476.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49477.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49478.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49479.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49480.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49481.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49482.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49483.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49484.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49485.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49486.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49487.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49488.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49490.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49491.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49492.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49493.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49494.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49495.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49496.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49497.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49498.json | 2 +- CVE-2022/CVE-2022-494xx/CVE-2022-49499.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49500.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49501.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49502.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49503.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49504.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49505.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49506.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49507.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49508.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49509.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49510.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49511.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49512.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49513.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49514.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49515.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49516.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49517.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49518.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49519.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49520.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49521.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49522.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49523.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49524.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49525.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49526.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49527.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49528.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49529.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49530.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49531.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49532.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49533.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49534.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49535.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49536.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49537.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49538.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49539.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49540.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49541.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49542.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49543.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49544.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49545.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49546.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49547.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49548.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49549.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49550.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49551.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49552.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49553.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49554.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49555.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49556.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49557.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49558.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49559.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49560.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49561.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49562.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49563.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49564.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49565.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49566.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49567.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49568.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49569.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49570.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49571.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49572.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49573.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49574.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49575.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49576.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49577.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49578.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49579.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49580.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49581.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49582.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49583.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49584.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49585.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49586.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49587.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49588.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49589.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49590.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49591.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49592.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49593.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49594.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49595.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49596.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49597.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49598.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49599.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49600.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49601.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49602.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49603.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49604.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49605.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49606.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49607.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49608.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49609.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49610.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49611.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49612.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49613.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49615.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49616.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49617.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49618.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49619.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49620.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49621.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49622.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49623.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49624.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49625.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49626.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49627.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49628.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49629.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49630.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49631.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49632.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49633.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49634.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49635.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49636.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49637.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49638.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49639.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49640.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49641.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49642.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49643.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49644.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49645.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49646.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49647.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49648.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49649.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49650.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49651.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49652.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49653.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49654.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49655.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49656.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49657.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49658.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49659.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49661.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49662.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49663.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49664.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49665.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49666.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49667.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49668.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49669.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49670.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49671.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49672.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49673.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49674.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49675.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49676.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49677.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49678.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49679.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49680.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49681.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49682.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49683.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49684.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49685.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49686.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49687.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49688.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49691.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49692.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49693.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49695.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49696.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49697.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49698.json | 2 +- CVE-2022/CVE-2022-496xx/CVE-2022-49699.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49700.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49701.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49702.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49703.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49704.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49705.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49706.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49707.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49708.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49709.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49710.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49711.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49712.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49713.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49714.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49715.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49716.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49721.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49722.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49723.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49724.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49725.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49726.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49730.json | 2 +- CVE-2022/CVE-2022-497xx/CVE-2022-49732.json | 2 +- CVE-2023/CVE-2023-05xx/CVE-2023-0582.json | 2 +- CVE-2023/CVE-2023-11xx/CVE-2023-1111.json | 76 +- CVE-2023/CVE-2023-200xx/CVE-2023-20025.json | 12 +- CVE-2023/CVE-2023-201xx/CVE-2023-20118.json | 60 +- CVE-2023/CVE-2023-210xx/CVE-2023-21001.json | 4 + CVE-2023/CVE-2023-216xx/CVE-2023-21674.json | 4 +- CVE-2023/CVE-2023-217xx/CVE-2023-21719.json | 2 +- CVE-2023/CVE-2023-217xx/CVE-2023-21794.json | 2 +- CVE-2023/CVE-2023-218xx/CVE-2023-21839.json | 2 +- CVE-2023/CVE-2023-237xx/CVE-2023-23730.json | 2 +- CVE-2023/CVE-2023-237xx/CVE-2023-23738.json | 2 +- CVE-2023/CVE-2023-238xx/CVE-2023-23895.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24860.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24879.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24882.json | 2 +- CVE-2023/CVE-2023-248xx/CVE-2023-24892.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24923.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24932.json | 2 +- CVE-2023/CVE-2023-249xx/CVE-2023-24935.json | 2 +- CVE-2023/CVE-2023-252xx/CVE-2023-25280.json | 2 +- CVE-2023/CVE-2023-256xx/CVE-2023-25681.json | 61 +- CVE-2023/CVE-2023-257xx/CVE-2023-25717.json | 2 +- CVE-2023/CVE-2023-265xx/CVE-2023-26523.json | 2 +- CVE-2023/CVE-2023-274xx/CVE-2023-27460.json | 2 +- CVE-2023/CVE-2023-275xx/CVE-2023-27524.json | 4 +- CVE-2023/CVE-2023-280xx/CVE-2023-28091.json | 4 + CVE-2023/CVE-2023-282xx/CVE-2023-28261.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28284.json | 2 +- CVE-2023/CVE-2023-282xx/CVE-2023-28286.json | 2 +- CVE-2023/CVE-2023-283xx/CVE-2023-28301.json | 2 +- CVE-2023/CVE-2023-284xx/CVE-2023-28494.json | 2 +- CVE-2023/CVE-2023-288xx/CVE-2023-28831.json | 2 +- CVE-2023/CVE-2023-290xx/CVE-2023-29053.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29333.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29334.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29350.json | 2 +- CVE-2023/CVE-2023-293xx/CVE-2023-29354.json | 2 +- CVE-2023/CVE-2023-294xx/CVE-2023-29492.json | 2 +- CVE-2023/CVE-2023-306xx/CVE-2023-30630.json | 4 + CVE-2023/CVE-2023-327xx/CVE-2023-32762.json | 30 +- CVE-2023/CVE-2023-331xx/CVE-2023-33131.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33140.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33148.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33150.json | 2 +- CVE-2023/CVE-2023-331xx/CVE-2023-33157.json | 2 +- CVE-2023/CVE-2023-332xx/CVE-2023-33246.json | 14 +- CVE-2023/CVE-2023-339xx/CVE-2023-33995.json | 45 +- CVE-2023/CVE-2023-341xx/CVE-2023-34192.json | 4 +- CVE-2023/CVE-2023-350xx/CVE-2023-35049.json | 2 +- CVE-2023/CVE-2023-353xx/CVE-2023-35392.json | 2 +- CVE-2023/CVE-2023-358xx/CVE-2023-35899.json | 251 +- CVE-2023/CVE-2023-359xx/CVE-2023-35907.json | 50 +- CVE-2023/CVE-2023-359xx/CVE-2023-35949.json | 4 +- CVE-2023/CVE-2023-359xx/CVE-2023-35950.json | 4 +- CVE-2023/CVE-2023-359xx/CVE-2023-35951.json | 4 +- CVE-2023/CVE-2023-359xx/CVE-2023-35952.json | 4 +- CVE-2023/CVE-2023-359xx/CVE-2023-35953.json | 4 +- CVE-2023/CVE-2023-35xx/CVE-2023-3550.json | 4 +- CVE-2023/CVE-2023-365xx/CVE-2023-36569.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36570.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36571.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36572.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36573.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36574.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36575.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36589.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36591.json | 2 +- CVE-2023/CVE-2023-365xx/CVE-2023-36592.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36702.json | 2 +- CVE-2023/CVE-2023-367xx/CVE-2023-36718.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36845.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36883.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36887.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36888.json | 2 +- CVE-2023/CVE-2023-368xx/CVE-2023-36894.json | 2 +- CVE-2023/CVE-2023-370xx/CVE-2023-37024.json | 58 +- CVE-2023/CVE-2023-370xx/CVE-2023-37025.json | 64 +- CVE-2023/CVE-2023-370xx/CVE-2023-37026.json | 62 +- CVE-2023/CVE-2023-370xx/CVE-2023-37027.json | 63 +- CVE-2023/CVE-2023-370xx/CVE-2023-37028.json | 63 +- CVE-2023/CVE-2023-373xx/CVE-2023-37398.json | 50 +- CVE-2023/CVE-2023-381xx/CVE-2023-38157.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38158.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38173.json | 2 +- CVE-2023/CVE-2023-381xx/CVE-2023-38180.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38187.json | 2 +- CVE-2023/CVE-2023-383xx/CVE-2023-38366.json | 53 +- CVE-2023/CVE-2023-385xx/CVE-2023-38534.json | 2 +- CVE-2023/CVE-2023-385xx/CVE-2023-38535.json | 2 +- CVE-2023/CVE-2023-385xx/CVE-2023-38536.json | 2 +- CVE-2023/CVE-2023-386xx/CVE-2023-38693.json | 4 + CVE-2023/CVE-2023-395xx/CVE-2023-39541.json | 4 +- CVE-2023/CVE-2023-399xx/CVE-2023-39997.json | 2 +- CVE-2023/CVE-2023-412xx/CVE-2023-41243.json | 2 +- CVE-2023/CVE-2023-416xx/CVE-2023-41665.json | 42 +- CVE-2023/CVE-2023-432xx/CVE-2023-43208.json | 4 +- CVE-2023/CVE-2023-43xx/CVE-2023-4308.json | 2 +- CVE-2023/CVE-2023-449xx/CVE-2023-44999.json | 2 +- CVE-2023/CVE-2023-455xx/CVE-2023-45591.json | 52 +- CVE-2023/CVE-2023-455xx/CVE-2023-45592.json | 52 +- CVE-2023/CVE-2023-455xx/CVE-2023-45593.json | 32 +- CVE-2023/CVE-2023-455xx/CVE-2023-45594.json | 32 +- CVE-2023/CVE-2023-455xx/CVE-2023-45595.json | 52 +- CVE-2023/CVE-2023-455xx/CVE-2023-45596.json | 32 +- CVE-2023/CVE-2023-455xx/CVE-2023-45597.json | 52 +- CVE-2023/CVE-2023-455xx/CVE-2023-45598.json | 32 +- CVE-2023/CVE-2023-455xx/CVE-2023-45599.json | 62 +- CVE-2023/CVE-2023-456xx/CVE-2023-45600.json | 52 +- CVE-2023/CVE-2023-458xx/CVE-2023-45824.json | 2 +- CVE-2023/CVE-2023-461xx/CVE-2023-46197.json | 2 +- CVE-2023/CVE-2023-466xx/CVE-2023-46604.json | 4 +- CVE-2023/CVE-2023-471xx/CVE-2023-47159.json | 45 +- CVE-2023/CVE-2023-471xx/CVE-2023-47166.json | 51 +- CVE-2023/CVE-2023-478xx/CVE-2023-47805.json | 47 +- CVE-2023/CVE-2023-482xx/CVE-2023-48290.json | 50 +- CVE-2023/CVE-2023-482xx/CVE-2023-48296.json | 2 +- CVE-2023/CVE-2023-483xx/CVE-2023-48318.json | 2 +- CVE-2023/CVE-2023-501xx/CVE-2023-50168.json | 2 +- CVE-2023/CVE-2023-503xx/CVE-2023-50312.json | 2 +- CVE-2023/CVE-2023-503xx/CVE-2023-50324.json | 56 +- CVE-2023/CVE-2023-509xx/CVE-2023-50949.json | 103 +- CVE-2023/CVE-2023-513xx/CVE-2023-51353.json | 2 +- CVE-2023/CVE-2023-515xx/CVE-2023-51511.json | 2 +- CVE-2023/CVE-2023-522xx/CVE-2023-52214.json | 2 +- CVE-2023/CVE-2023-522xx/CVE-2023-52231.json | 2 +- CVE-2023/CVE-2023-522xx/CVE-2023-52234.json | 2 +- CVE-2023/CVE-2023-522xx/CVE-2023-52292.json | 57 +- CVE-2023/CVE-2023-523xx/CVE-2023-52371.json | 79 +- CVE-2023/CVE-2023-526xx/CVE-2023-52675.json | 201 +- CVE-2023/CVE-2023-526xx/CVE-2023-52686.json | 216 +- CVE-2023/CVE-2023-526xx/CVE-2023-52690.json | 197 +- CVE-2023/CVE-2023-528xx/CVE-2023-52847.json | 200 +- CVE-2023/CVE-2023-528xx/CVE-2023-52878.json | 139 +- CVE-2023/CVE-2023-529xx/CVE-2023-52943.json | 90 +- CVE-2023/CVE-2023-529xx/CVE-2023-52944.json | 90 +- CVE-2023/CVE-2023-54xx/CVE-2023-5456.json | 52 +- CVE-2023/CVE-2023-54xx/CVE-2023-5457.json | 52 +- CVE-2023/CVE-2023-56xx/CVE-2023-5663.json | 2 +- CVE-2023/CVE-2023-59xx/CVE-2023-5993.json | 104 +- CVE-2023/CVE-2023-62xx/CVE-2023-6267.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6327.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6345.json | 2 +- CVE-2023/CVE-2023-65xx/CVE-2023-6565.json | 2 +- CVE-2023/CVE-2023-68xx/CVE-2023-6897.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6962.json | 2 +- CVE-2023/CVE-2023-70xx/CVE-2023-7015.json | 56 +- CVE-2023/CVE-2023-70xx/CVE-2023-7016.json | 102 +- CVE-2023/CVE-2023-70xx/CVE-2023-7067.json | 2 +- CVE-2023/CVE-2023-70xx/CVE-2023-7081.json | 4 +- CVE-2023/CVE-2023-71xx/CVE-2023-7103.json | 32 +- CVE-2024/CVE-2024-01xx/CVE-2024-0114.json | 4 + CVE-2024/CVE-2024-01xx/CVE-2024-0141.json | 4 + CVE-2024/CVE-2024-01xx/CVE-2024-0148.json | 2 +- CVE-2024/CVE-2024-01xx/CVE-2024-0197.json | 74 +- CVE-2024/CVE-2024-03xx/CVE-2024-0368.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0369.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0379.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0392.json | 2 +- CVE-2024/CVE-2024-04xx/CVE-2024-0447.json | 2 +- CVE-2024/CVE-2024-04xx/CVE-2024-0449.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0551.json | 74 +- CVE-2024/CVE-2024-05xx/CVE-2024-0590.json | 74 +- CVE-2024/CVE-2024-05xx/CVE-2024-0591.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0592.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0610.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0621.json | 84 +- CVE-2024/CVE-2024-06xx/CVE-2024-0658.json | 74 +- CVE-2024/CVE-2024-06xx/CVE-2024-0680.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0681.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0682.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0687.json | 2 +- CVE-2024/CVE-2024-07xx/CVE-2024-0700.json | 2 +- CVE-2024/CVE-2024-07xx/CVE-2024-0702.json | 54 +- CVE-2024/CVE-2024-07xx/CVE-2024-0759.json | 64 +- CVE-2024/CVE-2024-07xx/CVE-2024-0763.json | 74 +- CVE-2024/CVE-2024-08xx/CVE-2024-0821.json | 74 +- CVE-2024/CVE-2024-08xx/CVE-2024-0827.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0828.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0829.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0830.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0839.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0898.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0957.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0975.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0978.json | 54 +- CVE-2024/CVE-2024-100xx/CVE-2024-10094.json | 2 +- CVE-2024/CVE-2024-101xx/CVE-2024-10152.json | 2 +- CVE-2024/CVE-2024-101xx/CVE-2024-10174.json | 4 +- CVE-2024/CVE-2024-103xx/CVE-2024-10356.json | 40 +- CVE-2024/CVE-2024-104xx/CVE-2024-10483.json | 2 +- CVE-2024/CVE-2024-105xx/CVE-2024-10520.json | 4 +- CVE-2024/CVE-2024-105xx/CVE-2024-10563.json | 2 +- CVE-2024/CVE-2024-106xx/CVE-2024-10654.json | 2 +- CVE-2024/CVE-2024-107xx/CVE-2024-10716.json | 2 +- CVE-2024/CVE-2024-107xx/CVE-2024-10798.json | 32 +- CVE-2024/CVE-2024-108xx/CVE-2024-10804.json | 4 + CVE-2024/CVE-2024-109xx/CVE-2024-10918.json | 2 +- CVE-2024/CVE-2024-109xx/CVE-2024-10925.json | 6 +- CVE-2024/CVE-2024-109xx/CVE-2024-10930.json | 4 + CVE-2024/CVE-2024-109xx/CVE-2024-10962.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1043.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1044.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1053.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1057.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1062.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1071.json | 95 +- CVE-2024/CVE-2024-10xx/CVE-2024-1083.json | 2 +- CVE-2024/CVE-2024-110xx/CVE-2024-11035.json | 4 + CVE-2024/CVE-2024-111xx/CVE-2024-11132.json | 25 +- CVE-2024/CVE-2024-111xx/CVE-2024-11135.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11153.json | 4 + CVE-2024/CVE-2024-113xx/CVE-2024-11316.json | 2 +- CVE-2024/CVE-2024-113xx/CVE-2024-11317.json | 2 +- CVE-2024/CVE-2024-113xx/CVE-2024-11364.json | 2 +- CVE-2024/CVE-2024-116xx/CVE-2024-11650.json | 90 +- CVE-2024/CVE-2024-117xx/CVE-2024-11731.json | 4 + CVE-2024/CVE-2024-119xx/CVE-2024-11951.json | 4 + CVE-2024/CVE-2024-119xx/CVE-2024-11957.json | 4 + CVE-2024/CVE-2024-11xx/CVE-2024-1136.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1158.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1176.json | 2 +- CVE-2024/CVE-2024-120xx/CVE-2024-12035.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12036.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12038.json | 64 +- CVE-2024/CVE-2024-120xx/CVE-2024-12097.json | 4 + CVE-2024/CVE-2024-121xx/CVE-2024-12144.json | 4 + CVE-2024/CVE-2024-122xx/CVE-2024-12281.json | 4 + CVE-2024/CVE-2024-123xx/CVE-2024-12314.json | 4 +- CVE-2024/CVE-2024-123xx/CVE-2024-12315.json | 2 +- CVE-2024/CVE-2024-123xx/CVE-2024-12331.json | 32 +- CVE-2024/CVE-2024-124xx/CVE-2024-12427.json | 42 +- CVE-2024/CVE-2024-124xx/CVE-2024-12434.json | 2 +- CVE-2024/CVE-2024-124xx/CVE-2024-12467.json | 72 +- CVE-2024/CVE-2024-125xx/CVE-2024-12544.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12607.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12609.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12610.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12611.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12634.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12650.json | 4 + CVE-2024/CVE-2024-127xx/CVE-2024-12737.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12742.json | 4 + CVE-2024/CVE-2024-127xx/CVE-2024-12799.json | 4 + CVE-2024/CVE-2024-128xx/CVE-2024-12811.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12815.json | 4 + CVE-2024/CVE-2024-128xx/CVE-2024-12820.json | 66 +- CVE-2024/CVE-2024-128xx/CVE-2024-12824.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12876.json | 4 + CVE-2024/CVE-2024-128xx/CVE-2024-12878.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12959.json | 82 +- CVE-2024/CVE-2024-12xx/CVE-2024-1203.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1206.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1294.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13004.json | 82 +- CVE-2024/CVE-2024-130xx/CVE-2024-13006.json | 83 +- CVE-2024/CVE-2024-131xx/CVE-2024-13113.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13147.json | 4 + CVE-2024/CVE-2024-131xx/CVE-2024-13148.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13182.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13217.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13231.json | 2 +- CVE-2024/CVE-2024-132xx/CVE-2024-13232.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13336.json | 62 +- CVE-2024/CVE-2024-133xx/CVE-2024-13350.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13358.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13365.json | 2 +- CVE-2024/CVE-2024-133xx/CVE-2024-13373.json | 6 +- CVE-2024/CVE-2024-134xx/CVE-2024-13402.json | 2 +- CVE-2024/CVE-2024-134xx/CVE-2024-13422.json | 32 +- CVE-2024/CVE-2024-134xx/CVE-2024-13423.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13431.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13471.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13518.json | 6 +- CVE-2024/CVE-2024-135xx/CVE-2024-13546.json | 6 +- CVE-2024/CVE-2024-135xx/CVE-2024-13552.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13559.json | 6 +- CVE-2024/CVE-2024-135xx/CVE-2024-13560.json | 2 +- CVE-2024/CVE-2024-135xx/CVE-2024-13564.json | 69 +- CVE-2024/CVE-2024-135xx/CVE-2024-13568.json | 6 +- CVE-2024/CVE-2024-135xx/CVE-2024-13571.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13611.json | 6 +- CVE-2024/CVE-2024-136xx/CVE-2024-13624.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13628.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13629.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13630.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13631.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13632.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13633.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13634.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13635.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13647.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13668.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13669.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13678.json | 2 +- CVE-2024/CVE-2024-136xx/CVE-2024-13679.json | 64 +- CVE-2024/CVE-2024-136xx/CVE-2024-13682.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13685.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13686.json | 46 +- CVE-2024/CVE-2024-136xx/CVE-2024-13697.json | 6 +- CVE-2024/CVE-2024-137xx/CVE-2024-13711.json | 62 +- CVE-2024/CVE-2024-137xx/CVE-2024-13712.json | 62 +- CVE-2024/CVE-2024-137xx/CVE-2024-13719.json | 62 +- CVE-2024/CVE-2024-137xx/CVE-2024-13724.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13734.json | 2 +- CVE-2024/CVE-2024-137xx/CVE-2024-13736.json | 73 +- CVE-2024/CVE-2024-137xx/CVE-2024-13746.json | 6 +- CVE-2024/CVE-2024-137xx/CVE-2024-13747.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13750.json | 6 +- CVE-2024/CVE-2024-137xx/CVE-2024-13757.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13777.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13778.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13779.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13780.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13781.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13787.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13794.json | 4 +- CVE-2024/CVE-2024-137xx/CVE-2024-13798.json | 62 +- CVE-2024/CVE-2024-138xx/CVE-2024-13803.json | 2 +- CVE-2024/CVE-2024-138xx/CVE-2024-13805.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13806.json | 6 +- CVE-2024/CVE-2024-138xx/CVE-2024-13809.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13810.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13811.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13815.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13821.json | 4 +- CVE-2024/CVE-2024-138xx/CVE-2024-13827.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13833.json | 6 +- CVE-2024/CVE-2024-138xx/CVE-2024-13839.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13854.json | 62 +- CVE-2024/CVE-2024-138xx/CVE-2024-13857.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13866.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13873.json | 2 +- CVE-2024/CVE-2024-138xx/CVE-2024-13892.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13893.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13894.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13897.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13899.json | 2 +- CVE-2024/CVE-2024-139xx/CVE-2024-13901.json | 6 +- CVE-2024/CVE-2024-139xx/CVE-2024-13902.json | 4 + CVE-2024/CVE-2024-139xx/CVE-2024-13904.json | 4 + CVE-2024/CVE-2024-139xx/CVE-2024-13905.json | 2 +- CVE-2024/CVE-2024-139xx/CVE-2024-13907.json | 2 +- CVE-2024/CVE-2024-139xx/CVE-2024-13910.json | 6 +- CVE-2024/CVE-2024-139xx/CVE-2024-13911.json | 6 +- CVE-2024/CVE-2024-13xx/CVE-2024-1303.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1322.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1337.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1340.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1363.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1364.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1365.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1368.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1370.json | 74 +- CVE-2024/CVE-2024-13xx/CVE-2024-1383.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1400.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1436.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1452.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1462.json | 54 +- CVE-2024/CVE-2024-14xx/CVE-2024-1468.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1472.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1475.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1476.json | 54 +- CVE-2024/CVE-2024-14xx/CVE-2024-1484.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1492.json | 72 +- CVE-2024/CVE-2024-15xx/CVE-2024-1501.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1509.json | 6 +- CVE-2024/CVE-2024-15xx/CVE-2024-1516.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1521.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1566.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1585.json | 84 +- CVE-2024/CVE-2024-15xx/CVE-2024-1595.json | 58 +- CVE-2024/CVE-2024-16xx/CVE-2024-1604.json | 90 +- CVE-2024/CVE-2024-16xx/CVE-2024-1605.json | 90 +- CVE-2024/CVE-2024-16xx/CVE-2024-1606.json | 90 +- CVE-2024/CVE-2024-16xx/CVE-2024-1647.json | 4 +- CVE-2024/CVE-2024-16xx/CVE-2024-1648.json | 4 +- CVE-2024/CVE-2024-16xx/CVE-2024-1690.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1710.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1719.json | 76 +- CVE-2024/CVE-2024-17xx/CVE-2024-1773.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1791.json | 74 +- CVE-2024/CVE-2024-17xx/CVE-2024-1799.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1847.json | 83 +- CVE-2024/CVE-2024-18xx/CVE-2024-1885.json | 59 +- CVE-2024/CVE-2024-18xx/CVE-2024-1886.json | 59 +- CVE-2024/CVE-2024-18xx/CVE-2024-1889.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1893.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1941.json | 62 +- CVE-2024/CVE-2024-19xx/CVE-2024-1954.json | 54 +- CVE-2024/CVE-2024-19xx/CVE-2024-1960.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1965.json | 36 +- CVE-2024/CVE-2024-19xx/CVE-2024-1986.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20759.json | 4 +- CVE-2024/CVE-2024-207xx/CVE-2024-20765.json | 4 +- CVE-2024/CVE-2024-209xx/CVE-2024-20915.json | 2 +- CVE-2024/CVE-2024-209xx/CVE-2024-20953.json | 4 +- CVE-2024/CVE-2024-20xx/CVE-2024-2005.json | 62 +- CVE-2024/CVE-2024-20xx/CVE-2024-2006.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2045.json | 63 +- CVE-2024/CVE-2024-20xx/CVE-2024-2057.json | 91 +- CVE-2024/CVE-2024-20xx/CVE-2024-2075.json | 73 +- CVE-2024/CVE-2024-20xx/CVE-2024-2076.json | 55 +- CVE-2024/CVE-2024-20xx/CVE-2024-2078.json | 52 +- CVE-2024/CVE-2024-210xx/CVE-2024-21034.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21101.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21118.json | 2 +- CVE-2024/CVE-2024-211xx/CVE-2024-21150.json | 2 +- CVE-2024/CVE-2024-212xx/CVE-2024-21281.json | 2 +- CVE-2024/CVE-2024-215xx/CVE-2024-21598.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21605.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21609.json | 674 +- CVE-2024/CVE-2024-216xx/CVE-2024-21610.json | 644 +- CVE-2024/CVE-2024-216xx/CVE-2024-21615.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21618.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21677.json | 107 +- CVE-2024/CVE-2024-217xx/CVE-2024-21728.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21785.json | 4 +- CVE-2024/CVE-2024-218xx/CVE-2024-21885.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21886.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2121.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2123.json | 124 +- CVE-2024/CVE-2024-21xx/CVE-2024-2188.json | 63 +- CVE-2024/CVE-2024-221xx/CVE-2024-22100.json | 62 +- CVE-2024/CVE-2024-221xx/CVE-2024-22181.json | 4 +- CVE-2024/CVE-2024-221xx/CVE-2024-22187.json | 4 +- CVE-2024/CVE-2024-222xx/CVE-2024-22267.json | 94 +- CVE-2024/CVE-2024-222xx/CVE-2024-22268.json | 106 +- CVE-2024/CVE-2024-223xx/CVE-2024-22316.json | 45 +- CVE-2024/CVE-2024-223xx/CVE-2024-22329.json | 59 +- CVE-2024/CVE-2024-223xx/CVE-2024-22354.json | 79 +- CVE-2024/CVE-2024-22xx/CVE-2024-2245.json | 51 +- CVE-2024/CVE-2024-22xx/CVE-2024-2297.json | 2 +- CVE-2024/CVE-2024-231xx/CVE-2024-23186.json | 86 +- CVE-2024/CVE-2024-231xx/CVE-2024-23187.json | 86 +- CVE-2024/CVE-2024-231xx/CVE-2024-23193.json | 66 +- CVE-2024/CVE-2024-233xx/CVE-2024-23315.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23601.json | 4 +- CVE-2024/CVE-2024-236xx/CVE-2024-23604.json | 98 +- CVE-2024/CVE-2024-239xx/CVE-2024-23947.json | 4 +- CVE-2024/CVE-2024-239xx/CVE-2024-23948.json | 4 +- CVE-2024/CVE-2024-239xx/CVE-2024-23949.json | 4 +- CVE-2024/CVE-2024-239xx/CVE-2024-23950.json | 4 +- CVE-2024/CVE-2024-239xx/CVE-2024-23951.json | 4 +- CVE-2024/CVE-2024-23xx/CVE-2024-2302.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2308.json | 72 +- CVE-2024/CVE-2024-23xx/CVE-2024-2321.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2326.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2344.json | 2 +- CVE-2024/CVE-2024-241xx/CVE-2024-24105.json | 2 +- CVE-2024/CVE-2024-243xx/CVE-2024-24389.json | 69 +- CVE-2024/CVE-2024-245xx/CVE-2024-24583.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24584.json | 4 +- CVE-2024/CVE-2024-246xx/CVE-2024-24684.json | 4 +- CVE-2024/CVE-2024-246xx/CVE-2024-24685.json | 4 +- CVE-2024/CVE-2024-246xx/CVE-2024-24686.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24778.json | 6 +- CVE-2024/CVE-2024-247xx/CVE-2024-24799.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24851.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24857.json | 48 +- CVE-2024/CVE-2024-248xx/CVE-2024-24858.json | 48 +- CVE-2024/CVE-2024-248xx/CVE-2024-24868.json | 52 +- CVE-2024/CVE-2024-249xx/CVE-2024-24946.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24947.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24954.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24955.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24956.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24957.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24958.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24959.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24962.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24963.json | 4 +- CVE-2024/CVE-2024-24xx/CVE-2024-2409.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2411.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2472.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25034.json | 53 +- CVE-2024/CVE-2024-254xx/CVE-2024-25400.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25552.json | 44 +- CVE-2024/CVE-2024-255xx/CVE-2024-25578.json | 52 +- CVE-2024/CVE-2024-256xx/CVE-2024-25644.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25711.json | 104 +- CVE-2024/CVE-2024-259xx/CVE-2024-25902.json | 52 +- CVE-2024/CVE-2024-259xx/CVE-2024-25905.json | 2 +- CVE-2024/CVE-2024-259xx/CVE-2024-25910.json | 32 +- CVE-2024/CVE-2024-259xx/CVE-2024-25927.json | 52 +- CVE-2024/CVE-2024-25xx/CVE-2024-2514.json | 73 +- CVE-2024/CVE-2024-25xx/CVE-2024-2534.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2543.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2554.json | 75 +- CVE-2024/CVE-2024-268xx/CVE-2024-26802.json | 161 +- CVE-2024/CVE-2024-268xx/CVE-2024-26842.json | 117 +- CVE-2024/CVE-2024-268xx/CVE-2024-26850.json | 133 +- CVE-2024/CVE-2024-268xx/CVE-2024-26856.json | 171 +- CVE-2024/CVE-2024-268xx/CVE-2024-26858.json | 145 +- CVE-2024/CVE-2024-268xx/CVE-2024-26859.json | 242 +- CVE-2024/CVE-2024-268xx/CVE-2024-26862.json | 218 +- CVE-2024/CVE-2024-268xx/CVE-2024-26867.json | 119 +- CVE-2024/CVE-2024-268xx/CVE-2024-26872.json | 199 +- CVE-2024/CVE-2024-268xx/CVE-2024-26874.json | 242 +- CVE-2024/CVE-2024-268xx/CVE-2024-26876.json | 116 +- CVE-2024/CVE-2024-268xx/CVE-2024-26883.json | 52 +- CVE-2024/CVE-2024-269xx/CVE-2024-26913.json | 5 +- CVE-2024/CVE-2024-269xx/CVE-2024-26930.json | 13 +- CVE-2024/CVE-2024-269xx/CVE-2024-26931.json | 246 +- CVE-2024/CVE-2024-269xx/CVE-2024-26933.json | 21 +- CVE-2024/CVE-2024-269xx/CVE-2024-26943.json | 146 +- CVE-2024/CVE-2024-269xx/CVE-2024-26954.json | 116 +- CVE-2024/CVE-2024-269xx/CVE-2024-26971.json | 122 +- CVE-2024/CVE-2024-269xx/CVE-2024-26973.json | 242 +- CVE-2024/CVE-2024-269xx/CVE-2024-26999.json | 217 +- CVE-2024/CVE-2024-26xx/CVE-2024-2621.json | 2 +- CVE-2024/CVE-2024-26xx/CVE-2024-2667.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27008.json | 220 +- CVE-2024/CVE-2024-272xx/CVE-2024-27239.json | 2 +- CVE-2024/CVE-2024-272xx/CVE-2024-27245.json | 2 +- CVE-2024/CVE-2024-272xx/CVE-2024-27246.json | 2 +- CVE-2024/CVE-2024-272xx/CVE-2024-27263.json | 45 +- CVE-2024/CVE-2024-272xx/CVE-2024-27294.json | 72 +- CVE-2024/CVE-2024-273xx/CVE-2024-27348.json | 4 +- CVE-2024/CVE-2024-273xx/CVE-2024-27399.json | 2 +- CVE-2024/CVE-2024-275xx/CVE-2024-27570.json | 107 +- CVE-2024/CVE-2024-277xx/CVE-2024-27776.json | 41 +- CVE-2024/CVE-2024-279xx/CVE-2024-27987.json | 52 +- CVE-2024/CVE-2024-27xx/CVE-2024-2732.json | 74 +- CVE-2024/CVE-2024-27xx/CVE-2024-2738.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2771.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2781.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2782.json | 2 +- CVE-2024/CVE-2024-280xx/CVE-2024-28000.json | 63 +- CVE-2024/CVE-2024-281xx/CVE-2024-28128.json | 99 +- CVE-2024/CVE-2024-284xx/CVE-2024-28401.json | 2 +- CVE-2024/CVE-2024-284xx/CVE-2024-28403.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2833.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2844.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2868.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29112.json | 2 +- CVE-2024/CVE-2024-294xx/CVE-2024-29419.json | 2 +- CVE-2024/CVE-2024-294xx/CVE-2024-29477.json | 79 +- CVE-2024/CVE-2024-297xx/CVE-2024-29759.json | 2 +- CVE-2024/CVE-2024-297xx/CVE-2024-29763.json | 52 +- CVE-2024/CVE-2024-297xx/CVE-2024-29774.json | 60 +- CVE-2024/CVE-2024-299xx/CVE-2024-29906.json | 52 +- CVE-2024/CVE-2024-299xx/CVE-2024-29921.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29925.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29932.json | 52 +- CVE-2024/CVE-2024-29xx/CVE-2024-2946.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2950.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2954.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2959.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2963.json | 72 +- CVE-2024/CVE-2024-29xx/CVE-2024-2964.json | 72 +- CVE-2024/CVE-2024-300xx/CVE-2024-30058.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30150.json | 2 +- CVE-2024/CVE-2024-302xx/CVE-2024-30231.json | 2 +- CVE-2024/CVE-2024-302xx/CVE-2024-30282.json | 6 +- CVE-2024/CVE-2024-303xx/CVE-2024-30378.json | 514 +- CVE-2024/CVE-2024-303xx/CVE-2024-30380.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30382.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30384.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30386.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30387.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30389.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30390.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30391.json | 369 +- CVE-2024/CVE-2024-303xx/CVE-2024-30394.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30395.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30397.json | 4 +- CVE-2024/CVE-2024-303xx/CVE-2024-30398.json | 4 +- CVE-2024/CVE-2024-304xx/CVE-2024-30403.json | 4 +- CVE-2024/CVE-2024-304xx/CVE-2024-30405.json | 409 +- CVE-2024/CVE-2024-304xx/CVE-2024-30409.json | 4 +- CVE-2024/CVE-2024-304xx/CVE-2024-30410.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3002.json | 89 +- CVE-2024/CVE-2024-30xx/CVE-2024-3047.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3054.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3067.json | 2 +- CVE-2024/CVE-2024-312xx/CVE-2024-31269.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31421.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31994.json | 94 +- CVE-2024/CVE-2024-31xx/CVE-2024-3107.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32113.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32786.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32838.json | 55 +- CVE-2024/CVE-2024-32xx/CVE-2024-3216.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3217.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3243.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3268.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33247.json | 68 +- CVE-2024/CVE-2024-335xx/CVE-2024-33552.json | 42 +- CVE-2024/CVE-2024-335xx/CVE-2024-33556.json | 52 +- CVE-2024/CVE-2024-336xx/CVE-2024-33606.json | 2 +- CVE-2024/CVE-2024-336xx/CVE-2024-33619.json | 120 +- CVE-2024/CVE-2024-33xx/CVE-2024-3345.json | 2 +- CVE-2024/CVE-2024-343xx/CVE-2024-34314.json | 68 +- CVE-2024/CVE-2024-343xx/CVE-2024-34374.json | 50 +- CVE-2024/CVE-2024-344xx/CVE-2024-34434.json | 32 +- CVE-2024/CVE-2024-344xx/CVE-2024-34436.json | 52 +- CVE-2024/CVE-2024-344xx/CVE-2024-34437.json | 50 +- CVE-2024/CVE-2024-344xx/CVE-2024-34445.json | 52 +- CVE-2024/CVE-2024-345xx/CVE-2024-34570.json | 52 +- CVE-2024/CVE-2024-347xx/CVE-2024-34767.json | 2 +- CVE-2024/CVE-2024-347xx/CVE-2024-34794.json | 52 +- CVE-2024/CVE-2024-347xx/CVE-2024-34795.json | 52 +- CVE-2024/CVE-2024-356xx/CVE-2024-35628.json | 50 +- CVE-2024/CVE-2024-357xx/CVE-2024-35788.json | 140 +- CVE-2024/CVE-2024-357xx/CVE-2024-35790.json | 131 +- CVE-2024/CVE-2024-357xx/CVE-2024-35792.json | 131 +- CVE-2024/CVE-2024-358xx/CVE-2024-35882.json | 111 +- CVE-2024/CVE-2024-359xx/CVE-2024-35920.json | 116 +- CVE-2024/CVE-2024-359xx/CVE-2024-35954.json | 100 +- CVE-2024/CVE-2024-35xx/CVE-2024-3519.json | 2 +- CVE-2024/CVE-2024-35xx/CVE-2024-3564.json | 2 +- CVE-2024/CVE-2024-360xx/CVE-2024-36046.json | 2 +- CVE-2024/CVE-2024-360xx/CVE-2024-36047.json | 2 +- CVE-2024/CVE-2024-361xx/CVE-2024-36116.json | 87 +- CVE-2024/CVE-2024-361xx/CVE-2024-36117.json | 65 +- CVE-2024/CVE-2024-361xx/CVE-2024-36118.json | 62 +- CVE-2024/CVE-2024-361xx/CVE-2024-36120.json | 72 +- CVE-2024/CVE-2024-361xx/CVE-2024-36124.json | 62 +- CVE-2024/CVE-2024-363xx/CVE-2024-36353.json | 6 +- CVE-2024/CVE-2024-363xx/CVE-2024-36388.json | 71 +- CVE-2024/CVE-2024-363xx/CVE-2024-36389.json | 41 +- CVE-2024/CVE-2024-363xx/CVE-2024-36390.json | 51 +- CVE-2024/CVE-2024-363xx/CVE-2024-36391.json | 71 +- CVE-2024/CVE-2024-363xx/CVE-2024-36392.json | 41 +- CVE-2024/CVE-2024-368xx/CVE-2024-36883.json | 2 +- CVE-2024/CVE-2024-36xx/CVE-2024-3606.json | 2 +- CVE-2024/CVE-2024-36xx/CVE-2024-3607.json | 2 +- CVE-2024/CVE-2024-375xx/CVE-2024-37566.json | 2 +- CVE-2024/CVE-2024-375xx/CVE-2024-37567.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37906.json | 72 +- CVE-2024/CVE-2024-37xx/CVE-2024-3714.json | 74 +- CVE-2024/CVE-2024-37xx/CVE-2024-3730.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3731.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3781.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3782.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3783.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3789.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3790.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3791.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3792.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3793.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3795.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3796.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38290.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38291.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38292.json | 2 +- CVE-2024/CVE-2024-385xx/CVE-2024-38529.json | 72 +- CVE-2024/CVE-2024-38xx/CVE-2024-3869.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3895.json | 2 +- CVE-2024/CVE-2024-393xx/CVE-2024-39313.json | 73 +- CVE-2024/CVE-2024-393xx/CVE-2024-39315.json | 62 +- CVE-2024/CVE-2024-393xx/CVE-2024-39350.json | 90 +- CVE-2024/CVE-2024-394xx/CVE-2024-39441.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39511.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39512.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39513.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39514.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39517.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39518.json | 168 +- CVE-2024/CVE-2024-395xx/CVE-2024-39539.json | 479 +- CVE-2024/CVE-2024-395xx/CVE-2024-39540.json | 223 +- CVE-2024/CVE-2024-395xx/CVE-2024-39550.json | 370 +- CVE-2024/CVE-2024-395xx/CVE-2024-39554.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39555.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39557.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39558.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39559.json | 4 +- CVE-2024/CVE-2024-395xx/CVE-2024-39561.json | 454 +- CVE-2024/CVE-2024-395xx/CVE-2024-39562.json | 4 +- CVE-2024/CVE-2024-398xx/CVE-2024-39897.json | 64 +- CVE-2024/CVE-2024-399xx/CVE-2024-39902.json | 95 +- CVE-2024/CVE-2024-39xx/CVE-2024-3927.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3945.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3947.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3962.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3991.json | 2 +- CVE-2024/CVE-2024-406xx/CVE-2024-40693.json | 31 +- CVE-2024/CVE-2024-409xx/CVE-2024-40901.json | 211 +- CVE-2024/CVE-2024-40xx/CVE-2024-4017.json | 75 +- CVE-2024/CVE-2024-410xx/CVE-2024-41014.json | 95 +- CVE-2024/CVE-2024-410xx/CVE-2024-41023.json | 127 +- CVE-2024/CVE-2024-413xx/CVE-2024-41334.json | 2 +- CVE-2024/CVE-2024-413xx/CVE-2024-41335.json | 2 +- CVE-2024/CVE-2024-413xx/CVE-2024-41336.json | 2 +- CVE-2024/CVE-2024-413xx/CVE-2024-41338.json | 2 +- CVE-2024/CVE-2024-413xx/CVE-2024-41339.json | 2 +- CVE-2024/CVE-2024-413xx/CVE-2024-41340.json | 2 +- CVE-2024/CVE-2024-417xx/CVE-2024-41778.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41785.json | 29 +- CVE-2024/CVE-2024-41xx/CVE-2024-4164.json | 107 +- CVE-2024/CVE-2024-41xx/CVE-2024-4165.json | 107 +- CVE-2024/CVE-2024-430xx/CVE-2024-43055.json | 391 +- CVE-2024/CVE-2024-431xx/CVE-2024-43150.json | 47 +- CVE-2024/CVE-2024-431xx/CVE-2024-43189.json | 49 +- CVE-2024/CVE-2024-432xx/CVE-2024-43220.json | 45 +- CVE-2024/CVE-2024-432xx/CVE-2024-43291.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43583.json | 4 +- CVE-2024/CVE-2024-440xx/CVE-2024-44043.json | 45 +- CVE-2024/CVE-2024-441xx/CVE-2024-44136.json | 70 +- CVE-2024/CVE-2024-44xx/CVE-2024-4427.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45421.json | 189 +- CVE-2024/CVE-2024-454xx/CVE-2024-45424.json | 159 +- CVE-2024/CVE-2024-454xx/CVE-2024-45425.json | 159 +- CVE-2024/CVE-2024-457xx/CVE-2024-45779.json | 67 +- CVE-2024/CVE-2024-457xx/CVE-2024-45780.json | 57 +- CVE-2024/CVE-2024-45xx/CVE-2024-4566.json | 2 +- CVE-2024/CVE-2024-462xx/CVE-2024-46226.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47051.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47053.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47092.json | 6 +- CVE-2024/CVE-2024-472xx/CVE-2024-47259.json | 6 +- CVE-2024/CVE-2024-472xx/CVE-2024-47260.json | 6 +- CVE-2024/CVE-2024-472xx/CVE-2024-47262.json | 6 +- CVE-2024/CVE-2024-473xx/CVE-2024-47329.json | 45 +- CVE-2024/CVE-2024-473xx/CVE-2024-47353.json | 45 +- CVE-2024/CVE-2024-473xx/CVE-2024-47373.json | 45 +- CVE-2024/CVE-2024-473xx/CVE-2024-47374.json | 45 +- CVE-2024/CVE-2024-476xx/CVE-2024-47637.json | 55 +- CVE-2024/CVE-2024-478xx/CVE-2024-47823.json | 83 +- CVE-2024/CVE-2024-478xx/CVE-2024-47832.json | 59 +- CVE-2024/CVE-2024-482xx/CVE-2024-48248.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4885.json | 2 +- CVE-2024/CVE-2024-492xx/CVE-2024-49281.json | 2 +- CVE-2024/CVE-2024-493xx/CVE-2024-49310.json | 55 +- CVE-2024/CVE-2024-495xx/CVE-2024-49570.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49792.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49793.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49794.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49796.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49797.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49798.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4923.json | 89 +- CVE-2024/CVE-2024-503xx/CVE-2024-50311.json | 4 +- CVE-2024/CVE-2024-505xx/CVE-2024-50550.json | 55 +- CVE-2024/CVE-2024-505xx/CVE-2024-50572.json | 6 +- CVE-2024/CVE-2024-506xx/CVE-2024-50623.json | 2 +- CVE-2024/CVE-2024-507xx/CVE-2024-50704.json | 4 + CVE-2024/CVE-2024-507xx/CVE-2024-50705.json | 4 + CVE-2024/CVE-2024-507xx/CVE-2024-50706.json | 4 + CVE-2024/CVE-2024-507xx/CVE-2024-50707.json | 4 + CVE-2024/CVE-2024-50xx/CVE-2024-5049.json | 89 +- CVE-2024/CVE-2024-50xx/CVE-2024-5063.json | 89 +- CVE-2024/CVE-2024-50xx/CVE-2024-5084.json | 2 +- CVE-2024/CVE-2024-511xx/CVE-2024-51138.json | 2 +- CVE-2024/CVE-2024-511xx/CVE-2024-51139.json | 2 +- CVE-2024/CVE-2024-514xx/CVE-2024-51476.json | 4 + CVE-2024/CVE-2024-515xx/CVE-2024-51542.json | 2 +- CVE-2024/CVE-2024-515xx/CVE-2024-51544.json | 2 +- CVE-2024/CVE-2024-515xx/CVE-2024-51546.json | 2 +- CVE-2024/CVE-2024-517xx/CVE-2024-51787.json | 45 +- CVE-2024/CVE-2024-519xx/CVE-2024-51944.json | 10 +- CVE-2024/CVE-2024-51xx/CVE-2024-5137.json | 89 +- CVE-2024/CVE-2024-51xx/CVE-2024-5142.json | 62 +- CVE-2024/CVE-2024-51xx/CVE-2024-5147.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52053.json | 82 +- CVE-2024/CVE-2024-520xx/CVE-2024-52054.json | 82 +- CVE-2024/CVE-2024-520xx/CVE-2024-52055.json | 82 +- CVE-2024/CVE-2024-520xx/CVE-2024-52056.json | 82 +- CVE-2024/CVE-2024-523xx/CVE-2024-52359.json | 71 +- CVE-2024/CVE-2024-523xx/CVE-2024-52360.json | 63 +- CVE-2024/CVE-2024-525xx/CVE-2024-52560.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52925.json | 2 +- CVE-2024/CVE-2024-530xx/CVE-2024-53011.json | 6 +- CVE-2024/CVE-2024-530xx/CVE-2024-53012.json | 725 ++- CVE-2024/CVE-2024-530xx/CVE-2024-53028.json | 1007 ++- CVE-2024/CVE-2024-530xx/CVE-2024-53029.json | 747 ++- CVE-2024/CVE-2024-532xx/CVE-2024-53246.json | 2 +- CVE-2024/CVE-2024-533xx/CVE-2024-53382.json | 2 +- CVE-2024/CVE-2024-533xx/CVE-2024-53386.json | 2 +- CVE-2024/CVE-2024-533xx/CVE-2024-53388.json | 4 + CVE-2024/CVE-2024-534xx/CVE-2024-53408.json | 2 +- CVE-2024/CVE-2024-534xx/CVE-2024-53427.json | 2 +- CVE-2024/CVE-2024-534xx/CVE-2024-53458.json | 4 + CVE-2024/CVE-2024-538xx/CVE-2024-53870.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53871.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53872.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53873.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53874.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53875.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53876.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53877.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53878.json | 2 +- CVE-2024/CVE-2024-538xx/CVE-2024-53879.json | 2 +- CVE-2024/CVE-2024-539xx/CVE-2024-53974.json | 31 +- CVE-2024/CVE-2024-540xx/CVE-2024-54093.json | 62 +- CVE-2024/CVE-2024-541xx/CVE-2024-54169.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54170.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54173.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54175.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54179.json | 6 +- CVE-2024/CVE-2024-542xx/CVE-2024-54224.json | 45 +- CVE-2024/CVE-2024-544xx/CVE-2024-54456.json | 2 +- CVE-2024/CVE-2024-544xx/CVE-2024-54458.json | 2 +- CVE-2024/CVE-2024-544xx/CVE-2024-54468.json | 147 +- CVE-2024/CVE-2024-544xx/CVE-2024-54475.json | 91 +- CVE-2024/CVE-2024-544xx/CVE-2024-54478.json | 145 +- CVE-2024/CVE-2024-545xx/CVE-2024-54507.json | 83 +- CVE-2024/CVE-2024-545xx/CVE-2024-54519.json | 78 +- CVE-2024/CVE-2024-545xx/CVE-2024-54520.json | 91 +- CVE-2024/CVE-2024-545xx/CVE-2024-54523.json | 107 +- CVE-2024/CVE-2024-545xx/CVE-2024-54530.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54537.json | 91 +- CVE-2024/CVE-2024-545xx/CVE-2024-54539.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54540.json | 86 +- CVE-2024/CVE-2024-545xx/CVE-2024-54542.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54547.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54550.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54957.json | 2 +- CVE-2024/CVE-2024-54xx/CVE-2024-5463.json | 70 +- CVE-2024/CVE-2024-550xx/CVE-2024-55064.json | 55 +- CVE-2024/CVE-2024-551xx/CVE-2024-55160.json | 2 +- CVE-2024/CVE-2024-555xx/CVE-2024-55540.json | 76 +- CVE-2024/CVE-2024-555xx/CVE-2024-55541.json | 81 +- CVE-2024/CVE-2024-555xx/CVE-2024-55543.json | 76 +- CVE-2024/CVE-2024-559xx/CVE-2024-55907.json | 6 +- CVE-2024/CVE-2024-55xx/CVE-2024-5530.json | 2 +- CVE-2024/CVE-2024-560xx/CVE-2024-56062.json | 2 +- CVE-2024/CVE-2024-562xx/CVE-2024-56226.json | 2 +- CVE-2024/CVE-2024-562xx/CVE-2024-56227.json | 2 +- CVE-2024/CVE-2024-562xx/CVE-2024-56274.json | 2 +- CVE-2024/CVE-2024-563xx/CVE-2024-56340.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56463.json | 80 +- CVE-2024/CVE-2024-564xx/CVE-2024-56493.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56494.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56495.json | 2 +- CVE-2024/CVE-2024-564xx/CVE-2024-56496.json | 2 +- CVE-2024/CVE-2024-566xx/CVE-2024-56695.json | 70 +- CVE-2024/CVE-2024-568xx/CVE-2024-56810.json | 2 +- CVE-2024/CVE-2024-568xx/CVE-2024-56811.json | 2 +- CVE-2024/CVE-2024-568xx/CVE-2024-56812.json | 2 +- CVE-2024/CVE-2024-56xx/CVE-2024-5659.json | 210 +- CVE-2024/CVE-2024-56xx/CVE-2024-5667.json | 4 + CVE-2024/CVE-2024-570xx/CVE-2024-57011.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57012.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57013.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57014.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57015.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57016.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57017.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57018.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57019.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57020.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57021.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57022.json | 2 +- CVE-2024/CVE-2024-571xx/CVE-2024-57162.json | 64 +- CVE-2024/CVE-2024-578xx/CVE-2024-57852.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57929.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57974.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57975.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57976.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57979.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57981.json | 109 +- CVE-2024/CVE-2024-579xx/CVE-2024-57984.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57985.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57986.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57987.json | 85 +- CVE-2024/CVE-2024-579xx/CVE-2024-57988.json | 82 +- CVE-2024/CVE-2024-579xx/CVE-2024-57989.json | 85 +- CVE-2024/CVE-2024-579xx/CVE-2024-57990.json | 92 +- CVE-2024/CVE-2024-579xx/CVE-2024-57991.json | 78 +- CVE-2024/CVE-2024-579xx/CVE-2024-57992.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57993.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57994.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57995.json | 72 +- CVE-2024/CVE-2024-579xx/CVE-2024-57996.json | 106 +- CVE-2024/CVE-2024-579xx/CVE-2024-57997.json | 106 +- CVE-2024/CVE-2024-579xx/CVE-2024-57998.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57999.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58000.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58001.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58003.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58004.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58006.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58008.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58009.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58014.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58015.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58016.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58018.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58019.json | 2 +- CVE-2024/CVE-2024-580xx/CVE-2024-58043.json | 103 +- CVE-2024/CVE-2024-580xx/CVE-2024-58044.json | 105 +- CVE-2024/CVE-2024-580xx/CVE-2024-58045.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58046.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58047.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58048.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58049.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58050.json | 60 +- CVE-2024/CVE-2024-580xx/CVE-2024-58051.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58052.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58053.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58054.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58055.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58056.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58057.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58058.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58059.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58060.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58061.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58062.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58063.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58064.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58065.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58066.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58067.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58068.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58069.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58070.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58071.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58072.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58073.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58074.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58075.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58076.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58077.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58078.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58080.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58081.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58082.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58084.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58085.json | 4 + CVE-2024/CVE-2024-580xx/CVE-2024-58086.json | 4 + CVE-2024/CVE-2024-58xx/CVE-2024-5848.json | 2 +- CVE-2024/CVE-2024-58xx/CVE-2024-5871.json | 2 +- CVE-2024/CVE-2024-62xx/CVE-2024-6261.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6410.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6411.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6458.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6489.json | 2 +- CVE-2024/CVE-2024-64xx/CVE-2024-6491.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6567.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6635.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6636.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6637.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6638.json | 122 +- CVE-2024/CVE-2024-67xx/CVE-2024-6784.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6810.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6823.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7135.json | 50 +- CVE-2024/CVE-2024-73xx/CVE-2024-7389.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7484.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7503.json | 2 +- CVE-2024/CVE-2024-75xx/CVE-2024-7559.json | 42 +- CVE-2024/CVE-2024-76xx/CVE-2024-7624.json | 2 +- CVE-2024/CVE-2024-77xx/CVE-2024-7791.json | 77 +- CVE-2024/CVE-2024-78xx/CVE-2024-7855.json | 4 +- CVE-2024/CVE-2024-78xx/CVE-2024-7872.json | 4 + CVE-2024/CVE-2024-79xx/CVE-2024-7986.json | 102 +- CVE-2024/CVE-2024-80xx/CVE-2024-8000.json | 4 + CVE-2024/CVE-2024-81xx/CVE-2024-8105.json | 2 +- CVE-2024/CVE-2024-81xx/CVE-2024-8186.json | 86 +- CVE-2024/CVE-2024-82xx/CVE-2024-8261.json | 53 +- CVE-2024/CVE-2024-82xx/CVE-2024-8262.json | 53 +- CVE-2024/CVE-2024-85xx/CVE-2024-8548.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8584.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8632.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8682.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8911.json | 4 +- CVE-2024/CVE-2024-89xx/CVE-2024-8943.json | 4 +- CVE-2024/CVE-2024-91xx/CVE-2024-9135.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9149.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9169.json | 52 +- CVE-2024/CVE-2024-91xx/CVE-2024-9174.json | 57 +- CVE-2024/CVE-2024-91xx/CVE-2024-9193.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9195.json | 6 +- CVE-2024/CVE-2024-92xx/CVE-2024-9212.json | 6 +- CVE-2024/CVE-2024-92xx/CVE-2024-9217.json | 6 +- CVE-2024/CVE-2024-92xx/CVE-2024-9285.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9334.json | 2 +- CVE-2024/CVE-2024-94xx/CVE-2024-9444.json | 62 +- CVE-2024/CVE-2024-95xx/CVE-2024-9502.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9538.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9598.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9618.json | 4 + CVE-2024/CVE-2024-96xx/CVE-2024-9634.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9658.json | 4 + CVE-2024/CVE-2024-96xx/CVE-2024-9669.json | 4 +- CVE-2025/CVE-2025-01xx/CVE-2025-0159.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0160.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0234.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0235.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0236.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0286.json | 4 + CVE-2025/CVE-2025-03xx/CVE-2025-0316.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0336.json | 78 +- CVE-2025/CVE-2025-03xx/CVE-2025-0337.json | 4 + CVE-2025/CVE-2025-03xx/CVE-2025-0342.json | 80 +- CVE-2025/CVE-2025-03xx/CVE-2025-0359.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0360.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0433.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0469.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0514.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0527.json | 85 +- CVE-2025/CVE-2025-05xx/CVE-2025-0529.json | 84 +- CVE-2025/CVE-2025-05xx/CVE-2025-0530.json | 84 +- CVE-2025/CVE-2025-05xx/CVE-2025-0531.json | 84 +- CVE-2025/CVE-2025-05xx/CVE-2025-0555.json | 69 +- CVE-2025/CVE-2025-05xx/CVE-2025-0587.json | 53 +- CVE-2025/CVE-2025-06xx/CVE-2025-0684.json | 6 +- CVE-2025/CVE-2025-06xx/CVE-2025-0685.json | 6 +- CVE-2025/CVE-2025-06xx/CVE-2025-0686.json | 6 +- CVE-2025/CVE-2025-07xx/CVE-2025-0710.json | 84 +- CVE-2025/CVE-2025-07xx/CVE-2025-0719.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0731.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0759.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0760.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0767.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0769.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0820.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0823.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0863.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0865.json | 64 +- CVE-2025/CVE-2025-08xx/CVE-2025-0877.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0889.json | 2 +- CVE-2025/CVE-2025-08xx/CVE-2025-0895.json | 6 +- CVE-2025/CVE-2025-09xx/CVE-2025-0912.json | 66 +- CVE-2025/CVE-2025-09xx/CVE-2025-0914.json | 2 +- CVE-2025/CVE-2025-09xx/CVE-2025-0941.json | 2 +- CVE-2025/CVE-2025-09xx/CVE-2025-0954.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0956.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0959.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0975.json | 6 +- CVE-2025/CVE-2025-09xx/CVE-2025-0985.json | 6 +- CVE-2025/CVE-2025-09xx/CVE-2025-0990.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1008.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1080.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1091.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1148.json | 86 +- CVE-2025/CVE-2025-11xx/CVE-2025-1150.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1151.json | 57 +- CVE-2025/CVE-2025-12xx/CVE-2025-1249.json | 2 +- CVE-2025/CVE-2025-12xx/CVE-2025-1259.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1260.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1282.json | 2 +- CVE-2025/CVE-2025-12xx/CVE-2025-1291.json | 6 +- CVE-2025/CVE-2025-12xx/CVE-2025-1295.json | 2 +- CVE-2025/CVE-2025-13xx/CVE-2025-1300.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1307.json | 51 +- CVE-2025/CVE-2025-13xx/CVE-2025-1309.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1315.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1316.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1321.json | 68 +- CVE-2025/CVE-2025-13xx/CVE-2025-1332.json | 70 +- CVE-2025/CVE-2025-13xx/CVE-2025-1339.json | 2 +- CVE-2025/CVE-2025-13xx/CVE-2025-1340.json | 2 +- CVE-2025/CVE-2025-13xx/CVE-2025-1361.json | 74 +- CVE-2025/CVE-2025-13xx/CVE-2025-1383.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1393.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1404.json | 6 +- CVE-2025/CVE-2025-14xx/CVE-2025-1413.json | 6 +- CVE-2025/CVE-2025-14xx/CVE-2025-1424.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1425.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1435.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1450.json | 2 +- CVE-2025/CVE-2025-14xx/CVE-2025-1459.json | 6 +- CVE-2025/CVE-2025-14xx/CVE-2025-1463.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1491.json | 6 +- CVE-2025/CVE-2025-15xx/CVE-2025-1502.json | 6 +- CVE-2025/CVE-2025-15xx/CVE-2025-1506.json | 49 +- CVE-2025/CVE-2025-15xx/CVE-2025-1509.json | 63 +- CVE-2025/CVE-2025-15xx/CVE-2025-1510.json | 64 +- CVE-2025/CVE-2025-15xx/CVE-2025-1515.json | 4 + CVE-2025/CVE-2025-15xx/CVE-2025-1517.json | 2 +- CVE-2025/CVE-2025-15xx/CVE-2025-1539.json | 97 +- CVE-2025/CVE-2025-15xx/CVE-2025-1540.json | 4 + CVE-2025/CVE-2025-15xx/CVE-2025-1564.json | 6 +- CVE-2025/CVE-2025-15xx/CVE-2025-1571.json | 71 +- CVE-2025/CVE-2025-15xx/CVE-2025-1579.json | 82 +- CVE-2025/CVE-2025-15xx/CVE-2025-1599.json | 82 +- CVE-2025/CVE-2025-16xx/CVE-2025-1634.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1638.json | 6 +- CVE-2025/CVE-2025-16xx/CVE-2025-1666.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1671.json | 6 +- CVE-2025/CVE-2025-16xx/CVE-2025-1672.json | 4 + CVE-2025/CVE-2025-16xx/CVE-2025-1675.json | 58 +- CVE-2025/CVE-2025-16xx/CVE-2025-1681.json | 6 +- CVE-2025/CVE-2025-16xx/CVE-2025-1682.json | 6 +- CVE-2025/CVE-2025-16xx/CVE-2025-1686.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1687.json | 6 +- CVE-2025/CVE-2025-16xx/CVE-2025-1689.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1690.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1691.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1692.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1693.json | 2 +- CVE-2025/CVE-2025-16xx/CVE-2025-1696.json | 4 + CVE-2025/CVE-2025-17xx/CVE-2025-1716.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1717.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1723.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1726.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1730.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1738.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1739.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1741.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1742.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1743.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1744.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1745.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1746.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1747.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1748.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1749.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1751.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1755.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1756.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1757.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1768.json | 4 + CVE-2025/CVE-2025-17xx/CVE-2025-1776.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1780.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1786.json | 4 +- CVE-2025/CVE-2025-17xx/CVE-2025-1788.json | 4 +- CVE-2025/CVE-2025-17xx/CVE-2025-1791.json | 4 +- CVE-2025/CVE-2025-17xx/CVE-2025-1795.json | 6 +- CVE-2025/CVE-2025-17xx/CVE-2025-1797.json | 4 +- CVE-2025/CVE-2025-17xx/CVE-2025-1799.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1800.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1801.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1806.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1807.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1808.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1809.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1810.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1811.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1812.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1813.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1814.json | 95 +- CVE-2025/CVE-2025-18xx/CVE-2025-1815.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1816.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1817.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1818.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1819.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1820.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1821.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1829.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1830.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1831.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1832.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1833.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1834.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1835.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1836.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1840.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1841.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1842.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1843.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1844.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1845.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1846.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1847.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1848.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1849.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1850.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1851.json | 4 +- CVE-2025/CVE-2025-18xx/CVE-2025-1852.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1853.json | 96 +- CVE-2025/CVE-2025-18xx/CVE-2025-1854.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1855.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1856.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1857.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1858.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1859.json | 84 +- CVE-2025/CVE-2025-18xx/CVE-2025-1864.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1866.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1867.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1868.json | 6 +- CVE-2025/CVE-2025-18xx/CVE-2025-1876.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1877.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1882.json | 118 +- CVE-2025/CVE-2025-18xx/CVE-2025-1886.json | 4 + CVE-2025/CVE-2025-18xx/CVE-2025-1887.json | 4 + CVE-2025/CVE-2025-18xx/CVE-2025-1890.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1892.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1893.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1894.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1895.json | 2 +- CVE-2025/CVE-2025-18xx/CVE-2025-1896.json | 84 +- CVE-2025/CVE-2025-18xx/CVE-2025-1897.json | 84 +- CVE-2025/CVE-2025-18xx/CVE-2025-1898.json | 84 +- CVE-2025/CVE-2025-18xx/CVE-2025-1899.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1900.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1901.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1902.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1905.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1906.json | 85 +- CVE-2025/CVE-2025-19xx/CVE-2025-1925.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1931.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1932.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1933.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1934.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1935.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1936.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1937.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1938.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1940.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1941.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1942.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1946.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1947.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1949.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1952.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1953.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1954.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1955.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1958.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1961.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1962.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1963.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1964.json | 4 + CVE-2025/CVE-2025-19xx/CVE-2025-1967.json | 2 +- CVE-2025/CVE-2025-19xx/CVE-2025-1969.json | 4 + CVE-2025/CVE-2025-200xx/CVE-2025-20002.json | 4 + CVE-2025/CVE-2025-200xx/CVE-2025-20011.json | 50 +- CVE-2025/CVE-2025-200xx/CVE-2025-20049.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20060.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20091.json | 52 +- CVE-2025/CVE-2025-201xx/CVE-2025-20111.json | 2 +- CVE-2025/CVE-2025-201xx/CVE-2025-20116.json | 2 +- CVE-2025/CVE-2025-201xx/CVE-2025-20117.json | 2 +- CVE-2025/CVE-2025-201xx/CVE-2025-20118.json | 2 +- CVE-2025/CVE-2025-201xx/CVE-2025-20119.json | 2 +- CVE-2025/CVE-2025-201xx/CVE-2025-20161.json | 2 +- CVE-2025/CVE-2025-202xx/CVE-2025-20206.json | 4 + CVE-2025/CVE-2025-202xx/CVE-2025-20208.json | 4 + CVE-2025/CVE-2025-206xx/CVE-2025-20615.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20626.json | 52 +- CVE-2025/CVE-2025-206xx/CVE-2025-20647.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20651.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20653.json | 6 +- CVE-2025/CVE-2025-209xx/CVE-2025-20903.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20908.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20909.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20910.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20911.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20912.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20913.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20914.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20915.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20916.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20917.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20918.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20919.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20920.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20921.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20922.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20923.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20924.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20925.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20926.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20927.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20928.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20929.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20930.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20931.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20932.json | 4 + CVE-2025/CVE-2025-209xx/CVE-2025-20933.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2003.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2029.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2030.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2031.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2032.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2034.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2035.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2036.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2037.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2038.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2039.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2040.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2041.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2042.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2043.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2044.json | 4 + CVE-2025/CVE-2025-20xx/CVE-2025-2045.json | 4 + CVE-2025/CVE-2025-210xx/CVE-2025-21084.json | 4 + CVE-2025/CVE-2025-210xx/CVE-2025-21089.json | 52 +- CVE-2025/CVE-2025-210xx/CVE-2025-21092.json | 4 + CVE-2025/CVE-2025-210xx/CVE-2025-21095.json | 4 + CVE-2025/CVE-2025-210xx/CVE-2025-21097.json | 52 +- CVE-2025/CVE-2025-210xx/CVE-2025-21098.json | 62 +- CVE-2025/CVE-2025-211xx/CVE-2025-21156.json | 49 +- CVE-2025/CVE-2025-211xx/CVE-2025-21159.json | 52 +- CVE-2025/CVE-2025-211xx/CVE-2025-21160.json | 52 +- CVE-2025/CVE-2025-211xx/CVE-2025-21161.json | 27 +- CVE-2025/CVE-2025-211xx/CVE-2025-21163.json | 64 +- CVE-2025/CVE-2025-211xx/CVE-2025-21171.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21172.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21173.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21176.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21178.json | 4 +- CVE-2025/CVE-2025-211xx/CVE-2025-21198.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21325.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21395.json | 4 +- CVE-2025/CVE-2025-214xx/CVE-2025-21404.json | 4 +- CVE-2025/CVE-2025-214xx/CVE-2025-21424.json | 6467 ++++++++++++++++++- CVE-2025/CVE-2025-217xx/CVE-2025-21705.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21706.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21708.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21709.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21710.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21714.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21715.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21717.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21719.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21720.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21721.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21722.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21724.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21725.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21726.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21727.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21728.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21729.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21730.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21731.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21732.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21733.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21734.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21738.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21739.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21746.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21747.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21749.json | 109 +- CVE-2025/CVE-2025-217xx/CVE-2025-21750.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21751.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21752.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21753.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21754.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21756.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21757.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21758.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21759.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21760.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21761.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21762.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21763.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21764.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21765.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21766.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21767.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21768.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21771.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21772.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21777.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21778.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21779.json | 119 +- CVE-2025/CVE-2025-217xx/CVE-2025-21780.json | 118 +- CVE-2025/CVE-2025-217xx/CVE-2025-21781.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21782.json | 108 +- CVE-2025/CVE-2025-217xx/CVE-2025-21783.json | 106 +- CVE-2025/CVE-2025-217xx/CVE-2025-21784.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21785.json | 119 +- CVE-2025/CVE-2025-217xx/CVE-2025-21786.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21787.json | 119 +- CVE-2025/CVE-2025-217xx/CVE-2025-21788.json | 93 +- CVE-2025/CVE-2025-217xx/CVE-2025-21789.json | 106 +- CVE-2025/CVE-2025-217xx/CVE-2025-21790.json | 119 +- CVE-2025/CVE-2025-217xx/CVE-2025-21791.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21792.json | 154 +- CVE-2025/CVE-2025-217xx/CVE-2025-21795.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21796.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21797.json | 2 +- CVE-2025/CVE-2025-217xx/CVE-2025-21799.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21800.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21801.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21802.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21803.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21804.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21805.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21806.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21807.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21808.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21810.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21813.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21815.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21816.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21817.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21819.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21821.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21822.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21823.json | 2 +- CVE-2025/CVE-2025-218xx/CVE-2025-21826.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21827.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21828.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21829.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21830.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21831.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21832.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21833.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21834.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21835.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21836.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21837.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21839.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21840.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21841.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21842.json | 4 + CVE-2025/CVE-2025-218xx/CVE-2025-21843.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22211.json | 2 +- CVE-2025/CVE-2025-222xx/CVE-2025-22212.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22224.json | 345 +- CVE-2025/CVE-2025-222xx/CVE-2025-22225.json | 318 +- CVE-2025/CVE-2025-222xx/CVE-2025-22226.json | 352 +- CVE-2025/CVE-2025-222xx/CVE-2025-22280.json | 2 +- CVE-2025/CVE-2025-224xx/CVE-2025-22443.json | 52 +- CVE-2025/CVE-2025-224xx/CVE-2025-22447.json | 4 + CVE-2025/CVE-2025-224xx/CVE-2025-22491.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22492.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22493.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22623.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22624.json | 2 +- CVE-2025/CVE-2025-228xx/CVE-2025-22835.json | 52 +- CVE-2025/CVE-2025-228xx/CVE-2025-22837.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22841.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22847.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22868.json | 2 +- CVE-2025/CVE-2025-228xx/CVE-2025-22869.json | 2 +- CVE-2025/CVE-2025-228xx/CVE-2025-22881.json | 2 +- CVE-2025/CVE-2025-228xx/CVE-2025-22897.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22952.json | 2 +- CVE-2025/CVE-2025-231xx/CVE-2025-23115.json | 6 +- CVE-2025/CVE-2025-232xx/CVE-2025-23225.json | 6 +- CVE-2025/CVE-2025-232xx/CVE-2025-23234.json | 4 + CVE-2025/CVE-2025-232xx/CVE-2025-23240.json | 4 + CVE-2025/CVE-2025-233xx/CVE-2025-23368.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23405.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23409.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23410.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23414.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23416.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23418.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23420.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23421.json | 2 +- CVE-2025/CVE-2025-234xx/CVE-2025-23425.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23433.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23437.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23439.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23440.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23441.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23446.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23447.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23450.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23451.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23464.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23465.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23468.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23472.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23473.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23478.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23479.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23480.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23481.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23482.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23484.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23485.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23487.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23488.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23490.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23493.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23494.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23496.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23502.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23505.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23515.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23516.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23517.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23518.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23519.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23520.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23521.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23524.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23526.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23536.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23538.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23539.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23549.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23552.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23553.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23555.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23556.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23563.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23564.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23565.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23570.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23575.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23576.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23579.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23584.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23585.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23586.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23587.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23595.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23600.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23613.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23615.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23616.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23619.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23635.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23637.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23663.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23668.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23670.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23687.json | 2 +- CVE-2025/CVE-2025-236xx/CVE-2025-23688.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23716.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23718.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23721.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23726.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23731.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23736.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23738.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23739.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23740.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23741.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23753.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23762.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23763.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23813.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23814.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23829.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23843.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23847.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23850.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23852.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23879.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23881.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23883.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23903.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23904.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23945.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23956.json | 6 +- CVE-2025/CVE-2025-240xx/CVE-2025-24023.json | 61 +- CVE-2025/CVE-2025-240xx/CVE-2025-24092.json | 2 +- CVE-2025/CVE-2025-240xx/CVE-2025-24093.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24102.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24103.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24106.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24108.json | 65 +- CVE-2025/CVE-2025-241xx/CVE-2025-24109.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24115.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24118.json | 90 +- CVE-2025/CVE-2025-241xx/CVE-2025-24122.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24123.json | 158 +- CVE-2025/CVE-2025-241xx/CVE-2025-24124.json | 158 +- CVE-2025/CVE-2025-241xx/CVE-2025-24126.json | 119 +- CVE-2025/CVE-2025-241xx/CVE-2025-24130.json | 91 +- CVE-2025/CVE-2025-241xx/CVE-2025-24134.json | 65 +- CVE-2025/CVE-2025-241xx/CVE-2025-24135.json | 65 +- CVE-2025/CVE-2025-241xx/CVE-2025-24146.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24159.json | 145 +- CVE-2025/CVE-2025-242xx/CVE-2025-24200.json | 4 +- CVE-2025/CVE-2025-243xx/CVE-2025-24301.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24309.json | 4 + CVE-2025/CVE-2025-243xx/CVE-2025-24316.json | 6 +- CVE-2025/CVE-2025-243xx/CVE-2025-24318.json | 6 +- CVE-2025/CVE-2025-244xx/CVE-2025-24406.json | 517 +- CVE-2025/CVE-2025-244xx/CVE-2025-24407.json | 117 +- CVE-2025/CVE-2025-244xx/CVE-2025-24408.json | 529 +- CVE-2025/CVE-2025-244xx/CVE-2025-24409.json | 529 +- CVE-2025/CVE-2025-244xx/CVE-2025-24410.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24411.json | 529 +- CVE-2025/CVE-2025-244xx/CVE-2025-24412.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24413.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24414.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24415.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24416.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24417.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24418.json | 127 +- CVE-2025/CVE-2025-244xx/CVE-2025-24419.json | 117 +- CVE-2025/CVE-2025-244xx/CVE-2025-24420.json | 117 +- CVE-2025/CVE-2025-244xx/CVE-2025-24421.json | 519 +- CVE-2025/CVE-2025-244xx/CVE-2025-24422.json | 127 +- CVE-2025/CVE-2025-244xx/CVE-2025-24423.json | 127 +- CVE-2025/CVE-2025-244xx/CVE-2025-24424.json | 127 +- CVE-2025/CVE-2025-244xx/CVE-2025-24425.json | 509 +- CVE-2025/CVE-2025-244xx/CVE-2025-24426.json | 127 +- CVE-2025/CVE-2025-244xx/CVE-2025-24427.json | 529 +- CVE-2025/CVE-2025-244xx/CVE-2025-24434.json | 4 +- CVE-2025/CVE-2025-244xx/CVE-2025-24435.json | 4 +- CVE-2025/CVE-2025-244xx/CVE-2025-24438.json | 4 +- CVE-2025/CVE-2025-244xx/CVE-2025-24494.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24521.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24591.json | 2 +- CVE-2025/CVE-2025-246xx/CVE-2025-24654.json | 6 +- CVE-2025/CVE-2025-246xx/CVE-2025-24694.json | 6 +- CVE-2025/CVE-2025-247xx/CVE-2025-24727.json | 2 +- CVE-2025/CVE-2025-247xx/CVE-2025-24758.json | 6 +- CVE-2025/CVE-2025-247xx/CVE-2025-24782.json | 2 +- CVE-2025/CVE-2025-247xx/CVE-2025-24796.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24832.json | 2 +- CVE-2025/CVE-2025-248xx/CVE-2025-24836.json | 2 +- CVE-2025/CVE-2025-248xx/CVE-2025-24843.json | 6 +- CVE-2025/CVE-2025-248xx/CVE-2025-24846.json | 6 +- CVE-2025/CVE-2025-248xx/CVE-2025-24849.json | 6 +- CVE-2025/CVE-2025-248xx/CVE-2025-24864.json | 4 + CVE-2025/CVE-2025-249xx/CVE-2025-24924.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25015.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25070.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25083.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25084.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25087.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25089.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25090.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25092.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25099.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25102.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25108.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25109.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25112.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25113.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25114.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25115.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25118.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25119.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25121.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25122.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25124.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25127.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25129.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25130.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25131.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25132.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25133.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25137.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25142.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25150.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25157.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25158.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25161.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25162.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25164.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25165.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25169.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25170.json | 6 +- CVE-2025/CVE-2025-251xx/CVE-2025-25191.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25280.json | 6 +- CVE-2025/CVE-2025-252xx/CVE-2025-25281.json | 51 +- CVE-2025/CVE-2025-252xx/CVE-2025-25294.json | 4 + CVE-2025/CVE-2025-253xx/CVE-2025-25302.json | 6 +- CVE-2025/CVE-2025-253xx/CVE-2025-25303.json | 6 +- CVE-2025/CVE-2025-253xx/CVE-2025-25323.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25324.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25325.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25326.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25329.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25330.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25331.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25333.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25334.json | 2 +- CVE-2025/CVE-2025-253xx/CVE-2025-25362.json | 4 + CVE-2025/CVE-2025-254xx/CVE-2025-25429.json | 6 +- CVE-2025/CVE-2025-254xx/CVE-2025-25461.json | 6 +- CVE-2025/CVE-2025-254xx/CVE-2025-25462.json | 2 +- CVE-2025/CVE-2025-254xx/CVE-2025-25477.json | 6 +- CVE-2025/CVE-2025-255xx/CVE-2025-25514.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25515.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25516.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25517.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25519.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25520.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25521.json | 2 +- CVE-2025/CVE-2025-255xx/CVE-2025-25570.json | 2 +- CVE-2025/CVE-2025-256xx/CVE-2025-25632.json | 4 + CVE-2025/CVE-2025-257xx/CVE-2025-25724.json | 6 +- CVE-2025/CVE-2025-257xx/CVE-2025-25727.json | 6 +- CVE-2025/CVE-2025-257xx/CVE-2025-25728.json | 6 +- CVE-2025/CVE-2025-257xx/CVE-2025-25729.json | 6 +- CVE-2025/CVE-2025-257xx/CVE-2025-25730.json | 2 +- CVE-2025/CVE-2025-257xx/CVE-2025-25761.json | 2 +- CVE-2025/CVE-2025-257xx/CVE-2025-25791.json | 2 +- CVE-2025/CVE-2025-257xx/CVE-2025-25792.json | 2 +- CVE-2025/CVE-2025-258xx/CVE-2025-25800.json | 2 +- CVE-2025/CVE-2025-258xx/CVE-2025-25818.json | 2 +- CVE-2025/CVE-2025-259xx/CVE-2025-25916.json | 6 +- CVE-2025/CVE-2025-260xx/CVE-2025-26091.json | 4 + CVE-2025/CVE-2025-262xx/CVE-2025-26206.json | 2 +- CVE-2025/CVE-2025-262xx/CVE-2025-26264.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26325.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26367.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26368.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26369.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26370.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26371.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26372.json | 47 +- CVE-2025/CVE-2025-263xx/CVE-2025-26373.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26374.json | 47 +- CVE-2025/CVE-2025-263xx/CVE-2025-26375.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26376.json | 27 +- CVE-2025/CVE-2025-263xx/CVE-2025-26377.json | 2 +- CVE-2025/CVE-2025-263xx/CVE-2025-26378.json | 27 +- CVE-2025/CVE-2025-264xx/CVE-2025-26465.json | 188 +- CVE-2025/CVE-2025-264xx/CVE-2025-26466.json | 168 +- CVE-2025/CVE-2025-264xx/CVE-2025-26473.json | 2 +- CVE-2025/CVE-2025-265xx/CVE-2025-26520.json | 60 +- CVE-2025/CVE-2025-265xx/CVE-2025-26534.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26535.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26540.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26557.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26563.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26585.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26586.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26587.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26588.json | 6 +- CVE-2025/CVE-2025-265xx/CVE-2025-26589.json | 6 +- CVE-2025/CVE-2025-266xx/CVE-2025-26698.json | 2 +- CVE-2025/CVE-2025-268xx/CVE-2025-26849.json | 4 + CVE-2025/CVE-2025-268xx/CVE-2025-26879.json | 6 +- CVE-2025/CVE-2025-268xx/CVE-2025-26885.json | 6 +- CVE-2025/CVE-2025-269xx/CVE-2025-26914.json | 6 +- CVE-2025/CVE-2025-269xx/CVE-2025-26917.json | 6 +- CVE-2025/CVE-2025-269xx/CVE-2025-26918.json | 6 +- CVE-2025/CVE-2025-269xx/CVE-2025-26925.json | 2 +- CVE-2025/CVE-2025-269xx/CVE-2025-26967.json | 51 +- CVE-2025/CVE-2025-269xx/CVE-2025-26970.json | 6 +- CVE-2025/CVE-2025-269xx/CVE-2025-26999.json | 6 +- CVE-2025/CVE-2025-270xx/CVE-2025-27094.json | 6 +- CVE-2025/CVE-2025-270xx/CVE-2025-27099.json | 6 +- CVE-2025/CVE-2025-271xx/CVE-2025-27111.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27148.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27150.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27154.json | 2 +- CVE-2025/CVE-2025-271xx/CVE-2025-27155.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27156.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27157.json | 2 +- CVE-2025/CVE-2025-272xx/CVE-2025-27263.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27264.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27268.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27269.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27270.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27271.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27273.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27275.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27278.json | 6 +- CVE-2025/CVE-2025-272xx/CVE-2025-27279.json | 6 +- CVE-2025/CVE-2025-273xx/CVE-2025-27399.json | 2 +- CVE-2025/CVE-2025-274xx/CVE-2025-27400.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27401.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27402.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27411.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27412.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27414.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27416.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27421.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27422.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27423.json | 6 +- CVE-2025/CVE-2025-274xx/CVE-2025-27424.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27425.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27497.json | 4 + CVE-2025/CVE-2025-274xx/CVE-2025-27498.json | 6 +- CVE-2025/CVE-2025-275xx/CVE-2025-27506.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27507.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27509.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27513.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27515.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27516.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27517.json | 4 + CVE-2025/CVE-2025-275xx/CVE-2025-27521.json | 60 +- CVE-2025/CVE-2025-275xx/CVE-2025-27554.json | 6 +- CVE-2025/CVE-2025-275xx/CVE-2025-27590.json | 6 +- CVE-2025/CVE-2025-276xx/CVE-2025-27600.json | 4 + README.md | 37 +- _state.csv | 5080 +++++++-------- 2538 files changed, 59031 insertions(+), 7129 deletions(-) diff --git a/CVE-2012/CVE-2012-03xx/CVE-2012-0391.json b/CVE-2012/CVE-2012-03xx/CVE-2012-0391.json index ea0f2ceaad0..b0e2b93df81 100644 --- a/CVE-2012/CVE-2012-03xx/CVE-2012-0391.json +++ b/CVE-2012/CVE-2012-03xx/CVE-2012-0391.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2012-01-08T15:55:01.217", "lastModified": "2025-02-10T21:15:09.680", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json index 3e833e80a5f..2c15f20eaa9 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Vulnerabilidad de liberaci\u00f3n despu\u00e9s de uso en la funci\u00f3n TableBackgroundPainter::TableBackgroundData::Destroy en Mozilla Firefox anterior a 18.0, Firefox ESR 10.x anterior a 10.0.12 y 17.x anterior a 17.0.2, Thunderbird anterior a 17.0.2, Thunderbird ESR 10.x anterior a 10.0.12 y 17.x anterior a 17.0.2, y SeaMonkey anterior a 2.15, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica) a trav\u00e9s de un documento HTML con una tabla que contiene multitud de columnas y grupos de estas." + "value": "Vulnerabilidad de uso despu\u00e9s de liberar memoria en la funci\u00f3n TableBackgroundPainter::TableBackgroundData::Destroy en Mozilla Firefox anterior a 18.0, Firefox ESR 10.x anterior a 10.0.12 y 17.x anterior a 17.0.2, Thunderbird anterior a 17.0.2, Thunderbird ESR 10.x anterior a 10.0.12 y 17.x anterior a 17.0.2, y SeaMonkey anterior a 2.15, permitir\u00eda a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica) a trav\u00e9s de un documento HTML con una tabla que contiene multitud de columnas y grupos de estas." } ], "metrics": { diff --git a/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json b/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json index dcefe23c4e8..975e9c017c7 100644 --- a/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json +++ b/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2017-04-27T14:59:00.233", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json b/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json index 31552b677c9..949d7373f20 100644 --- a/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json +++ b/CVE-2018/CVE-2018-118xx/CVE-2018-11816.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "product-security@qualcomm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2018/CVE-2018-199xx/CVE-2018-19943.json b/CVE-2018/CVE-2018-199xx/CVE-2018-19943.json index bd24eef7ed1..db02fa7b1bb 100644 --- a/CVE-2018/CVE-2018-199xx/CVE-2018-19943.json +++ b/CVE-2018/CVE-2018-199xx/CVE-2018-19943.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2020-10-28T18:15:12.520", "lastModified": "2024-11-21T03:58:51.453", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-199xx/CVE-2018-19949.json b/CVE-2018/CVE-2018-199xx/CVE-2018-19949.json index 5ff9c6266fc..355d8ef8075 100644 --- a/CVE-2018/CVE-2018-199xx/CVE-2018-19949.json +++ b/CVE-2018/CVE-2018-199xx/CVE-2018-19949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2020-10-28T18:15:12.647", "lastModified": "2025-02-06T21:15:12.333", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-199xx/CVE-2018-19953.json b/CVE-2018/CVE-2018-199xx/CVE-2018-19953.json index c28e2059444..4a92bd45623 100644 --- a/CVE-2018/CVE-2018-199xx/CVE-2018-19953.json +++ b/CVE-2018/CVE-2018-199xx/CVE-2018-19953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2020-10-28T18:15:12.740", "lastModified": "2025-02-06T21:15:12.550", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json index ae8c6725048..883b420a201 100644 --- a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json +++ b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2018-03-01T17:29:00.413", "lastModified": "2025-01-29T21:15:08.910", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-86xx/CVE-2018-8639.json b/CVE-2018/CVE-2018-86xx/CVE-2018-8639.json index a9c648b4dd1..0dd87ac3c7f 100644 --- a/CVE-2018/CVE-2018-86xx/CVE-2018-8639.json +++ b/CVE-2018/CVE-2018-86xx/CVE-2018-8639.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2018-12-12T00:29:01.840", "lastModified": "2025-03-04T02:00:01.987", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -121,33 +119,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" }, { "vulnerable": true, diff --git a/CVE-2019/CVE-2019-18xx/CVE-2019-1815.json b/CVE-2019/CVE-2019-18xx/CVE-2019-1815.json index 27c22802a43..f3ff55aea4c 100644 --- a/CVE-2019/CVE-2019-18xx/CVE-2019-1815.json +++ b/CVE-2019/CVE-2019-18xx/CVE-2019-1815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A security vulnerability was discovered in the local status page functionality of Cisco Meraki\u2019s MX67 and MX68 security appliance models that may allow unauthenticated individuals to access and download logs containing sensitive, privileged device information. The vulnerability is due to improper access control to the files holding debugging and maintenance information, and is only exploitable when the local status page is enabled on the device. An attacker exploiting this vulnerability may obtain access to wireless pre-shared keys, Site-to-Site VPN key and other sensitive information. Under certain circumstances, this information may allow an attacker to obtain administrative-level access to the device." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de seguridad en la funcionalidad de la p\u00e1gina de estado local de los modelos de dispositivos de seguridad MX67 y MX68 de Cisco Meraki que puede permitir que personas no autenticadas accedan y descarguen registros que contienen informaci\u00f3n confidencial y privilegiada del dispositivo. La vulnerabilidad se debe a un control de acceso inadecuado a los archivos que contienen informaci\u00f3n de depuraci\u00f3n y mantenimiento, y solo se puede explotar cuando la p\u00e1gina de estado local est\u00e1 habilitada en el dispositivo. Un atacante que aproveche esta vulnerabilidad puede obtener acceso a claves precompartidas inal\u00e1mbricas, claves de VPN de sitio a sitio y otra informaci\u00f3n confidencial. En determinadas circunstancias, esta informaci\u00f3n puede permitir que un atacante obtenga acceso de nivel administrativo al dispositivo." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-201xx/CVE-2019-20171.json b/CVE-2019/CVE-2019-201xx/CVE-2019-20171.json index 0bfacc8978d..8a15b0e93bd 100644 --- a/CVE-2019/CVE-2019-201xx/CVE-2019-20171.json +++ b/CVE-2019/CVE-2019-201xx/CVE-2019-20171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-12-31T00:15:13.307", "lastModified": "2025-03-07T14:24:42.067", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-202xx/CVE-2019-20208.json b/CVE-2019/CVE-2019-202xx/CVE-2019-20208.json index ebca2ed6686..b93d48a3291 100644 --- a/CVE-2019/CVE-2019-202xx/CVE-2019-20208.json +++ b/CVE-2019/CVE-2019-202xx/CVE-2019-20208.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2020-01-02T14:16:36.363", "lastModified": "2025-03-07T14:24:42.067", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json b/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json index 2cf5bc601ab..28234c407a4 100644 --- a/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json +++ b/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2019-12-17T23:15:14.923", "lastModified": "2025-02-06T20:15:33.540", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json b/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json index 21aed23a09a..9a9c22e431a 100644 --- a/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json +++ b/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2019-12-19T01:15:10.803", "lastModified": "2025-02-06T20:15:33.757", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json index 41e2238cd27..caf05c10f46 100644 --- a/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:07.517", "lastModified": "2024-11-21T04:58:46.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-119xx/CVE-2020-11978.json b/CVE-2020/CVE-2020-119xx/CVE-2020-11978.json index e7a1816f3ef..b7e13810065 100644 --- a/CVE-2020/CVE-2020-119xx/CVE-2020-11978.json +++ b/CVE-2020/CVE-2020-119xx/CVE-2020-11978.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11978", "sourceIdentifier": "security@apache.org", "published": "2020-07-17T00:15:10.337", - "lastModified": "2025-02-06T21:15:14.453", - "vulnStatus": "Modified", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json index e35842f8c34..4c78511ec0d 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13927.json @@ -2,8 +2,8 @@ "id": "CVE-2020-13927", "sourceIdentifier": "security@apache.org", "published": "2020-11-10T16:15:11.807", - "lastModified": "2024-11-21T05:02:09.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json b/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json index 34c47e2c5d2..5230d8d2ff6 100644 --- a/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json +++ b/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation." + }, + { + "lang": "es", + "value": "Wondershare Filmora 9.2.11 se ve afectado por el secuestro de Dll de Trojan, lo que conduce a una escalada de privilegios." } ], "metrics": {}, diff --git a/CVE-2020/CVE-2020-248xx/CVE-2020-24829.json b/CVE-2020/CVE-2020-248xx/CVE-2020-24829.json index 560fdc991a5..7cdfe46a7fa 100644 --- a/CVE-2020/CVE-2020-248xx/CVE-2020-24829.json +++ b/CVE-2020/CVE-2020-248xx/CVE-2020-24829.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-08-04T21:15:08.077", "lastModified": "2025-03-05T23:15:13.040", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.5.2", + "versionEndIncluding": "0.8.0", + "matchCriteriaId": "F43ACAFD-35AA-4E48-9EAE-D451DDCEB625" } ] } @@ -96,11 +98,17 @@ "references": [ { "url": "https://github.com/gpac/gpac/blob/v0.5.2/src/media_tools/mpegts.c#L2204", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gpac/gpac/commit/8c5e847185d74462d674ee7d28fb46c29dae6dd2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gpac/gpac/issues/1422", diff --git a/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json b/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json index 56cc4f6dce4..7e1343617e8 100644 --- a/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json +++ b/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2020-12-08T21:15:13.967", "lastModified": "2025-02-28T14:44:48.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json b/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json index af5b2d80c9c..74c0e2f508a 100644 --- a/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json +++ b/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json @@ -2,8 +2,8 @@ "id": "CVE-2020-28949", "sourceIdentifier": "cve@mitre.org", "published": "2020-11-19T19:15:11.937", - "lastModified": "2025-02-07T14:15:47.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-28xx/CVE-2020-2883.json b/CVE-2020/CVE-2020-28xx/CVE-2020-2883.json index 9d2f1d84382..018acbe012d 100644 --- a/CVE-2020/CVE-2020-28xx/CVE-2020-2883.json +++ b/CVE-2020/CVE-2020-28xx/CVE-2020-2883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-04-15T14:15:33.513", "lastModified": "2025-01-08T02:00:01.937", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3122.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3122.json index b99b4f15067..ce6feea8144 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3122.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto no autenticado obtenga informaci\u00f3n confidencial de la red." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-62xx/CVE-2020-6207.json b/CVE-2020/CVE-2020-62xx/CVE-2020-6207.json index ff27a191f3b..300a3b68d60 100644 --- a/CVE-2020/CVE-2020-62xx/CVE-2020-6207.json +++ b/CVE-2020/CVE-2020-62xx/CVE-2020-6207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2020-03-10T21:15:14.793", "lastModified": "2025-01-29T21:15:10.157", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1675.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1675.json index 53bb193e613..c84ee8a754f 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1675.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1675.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1675", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:08.267", - "lastModified": "2024-11-21T05:44:52.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-219xx/CVE-2021-21975.json b/CVE-2021/CVE-2021-219xx/CVE-2021-21975.json index a1e4cab244d..de92bc5cf77 100644 --- a/CVE-2021/CVE-2021-219xx/CVE-2021-21975.json +++ b/CVE-2021/CVE-2021-219xx/CVE-2021-21975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2021-03-31T18:15:14.597", "lastModified": "2025-01-29T18:15:39.043", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-238xx/CVE-2021-23820.json b/CVE-2021/CVE-2021-238xx/CVE-2021-23820.json index c943b206b83..2c97bf2772b 100644 --- a/CVE-2021/CVE-2021-238xx/CVE-2021-23820.json +++ b/CVE-2021/CVE-2021-238xx/CVE-2021-23820.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2021-11-03T18:15:08.287", "lastModified": "2024-11-21T05:51:54.017", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -105,8 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jsonpointer_project:jsonpointer:-:*:*:*:*:node.js:*:*", - "matchCriteriaId": "022D6B15-C334-4816-B768-08157B45EFF1" + "criteria": "cpe:2.3:a:manuelstofer:json-pointer:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "0.6.2", + "matchCriteriaId": "EE5D54EA-6AE7-49E6-A061-3E7B0AB430A2" } ] } diff --git a/CVE-2021/CVE-2021-275xx/CVE-2021-27561.json b/CVE-2021/CVE-2021-275xx/CVE-2021-27561.json index fdb3ac334ad..167214565f5 100644 --- a/CVE-2021/CVE-2021-275xx/CVE-2021-27561.json +++ b/CVE-2021/CVE-2021-275xx/CVE-2021-27561.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27561", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-15T18:15:07.490", - "lastModified": "2025-02-04T20:15:41.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-287xx/CVE-2021-28799.json b/CVE-2021/CVE-2021-287xx/CVE-2021-28799.json index 142500e1215..558a1a158ea 100644 --- a/CVE-2021/CVE-2021-287xx/CVE-2021-28799.json +++ b/CVE-2021/CVE-2021-287xx/CVE-2021-28799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2021-05-13T03:15:06.843", "lastModified": "2024-11-21T06:00:13.537", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-300xx/CVE-2021-30014.json b/CVE-2021/CVE-2021-300xx/CVE-2021-30014.json index 08ad6ce043f..363b13f8931 100644 --- a/CVE-2021/CVE-2021-300xx/CVE-2021-30014.json +++ b/CVE-2021/CVE-2021-300xx/CVE-2021-30014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-04-19T20:15:14.363", "lastModified": "2025-03-05T23:15:13.217", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "D002A87F-B63B-4BD4-88AE-6CC56716D387" } ] } @@ -96,7 +98,10 @@ "references": [ { "url": "https://github.com/gpac/gpac/blob/v0.9.0-preview/src/media_tools/av_parsers.c#L6731", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788", diff --git a/CVE-2021/CVE-2021-300xx/CVE-2021-30022.json b/CVE-2021/CVE-2021-300xx/CVE-2021-30022.json index 35e08e98ea8..dbaba824945 100644 --- a/CVE-2021/CVE-2021-300xx/CVE-2021-30022.json +++ b/CVE-2021/CVE-2021-300xx/CVE-2021-30022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2021-04-19T20:15:14.647", "lastModified": "2025-03-05T23:15:13.390", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.5.2", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "1EA72C5E-2E4C-4A00-B736-3994DA7C73C3" } ] } @@ -96,7 +98,10 @@ "references": [ { "url": "https://github.com/gpac/gpac/blob/v0.5.2/src/media_tools/av_parsers.c#L2344", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788", diff --git a/CVE-2021/CVE-2021-308xx/CVE-2021-30883.json b/CVE-2021/CVE-2021-308xx/CVE-2021-30883.json index 5d96b0db707..1a2584d17b8 100644 --- a/CVE-2021/CVE-2021-308xx/CVE-2021-30883.json +++ b/CVE-2021/CVE-2021-308xx/CVE-2021-30883.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30883", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:16.403", - "lastModified": "2025-01-29T18:15:42.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,9 +119,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.8.1", - "matchCriteriaId": "A9DB9916-6DA1-4A32-86A2-AD8DC5246709" + "matchCriteriaId": "DD8D9814-E083-498D-BAC3-6E8FD1A259B7" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json b/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json index 9dd15e09202..0f1e067c0a4 100644 --- a/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json +++ b/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31010", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:24.967", - "lastModified": "2025-01-29T18:15:43.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json index cf1e19b4d30..6f94b1a697b 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31196.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31196", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:09.463", - "lastModified": "2024-11-21T06:05:17.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31199.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31199.json index f1cc8e3f7f6..d37b8da7717 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31199.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31199.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31199", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:08.360", - "lastModified": "2024-11-21T06:05:17.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json index 999605ed955..bb7bad86903 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json index 9efe746ed7e..431df77bd1e 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31982.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2021/CVE-2021-345xx/CVE-2021-34523.json b/CVE-2021/CVE-2021-345xx/CVE-2021-34523.json index 8215fd07a5c..b738ed5eb1d 100644 --- a/CVE-2021/CVE-2021-345xx/CVE-2021-34523.json +++ b/CVE-2021/CVE-2021-345xx/CVE-2021-34523.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34523", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:12.347", - "lastModified": "2024-11-21T06:10:35.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-350xx/CVE-2021-35001.json b/CVE-2021/CVE-2021-350xx/CVE-2021-35001.json index 7741278ace1..3bacde2c22b 100644 --- a/CVE-2021/CVE-2021-350xx/CVE-2021-35001.json +++ b/CVE-2021/CVE-2021-350xx/CVE-2021-35001.json @@ -2,8 +2,8 @@ "id": "CVE-2021-35001", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-07T23:15:14.120", - "lastModified": "2024-11-21T06:11:40.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.01:*:*:*:*:*:*:*", + "matchCriteriaId": "74E8F32E-A350-4EF5-ACD2-CF001101F474" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.02:*:*:*:*:*:*:*", + "matchCriteriaId": "9F31ED78-C6B7-4BB4-AB79-F7AE38546BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.03:*:*:*:*:*:*:*", + "matchCriteriaId": "80B5F6EB-E001-4D1F-8428-99AF9DC3D4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.01:*:*:*:*:*:*:*", + "matchCriteriaId": "8D2C30FF-FF7C-4F8C-ACB8-A3BC3CFE1EAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.02:*:*:*:*:*:*:*", + "matchCriteriaId": "9F8B4BD9-9197-49C7-9E1D-EEA831E0CCF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.03:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA184EF-A951-4E16-B11B-EE7A6456D974" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.21.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5A0E5F78-3CA7-4E92-B714-09E2FCC51DB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-001/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-350xx/CVE-2021-35002.json b/CVE-2021/CVE-2021-350xx/CVE-2021-35002.json index 322b8233065..9a522869421 100644 --- a/CVE-2021/CVE-2021-350xx/CVE-2021-35002.json +++ b/CVE-2021/CVE-2021-350xx/CVE-2021-35002.json @@ -2,8 +2,8 @@ "id": "CVE-2021-35002", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-07T23:15:14.313", - "lastModified": "2024-11-21T06:11:40.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.01:*:*:*:*:*:*:*", + "matchCriteriaId": "74E8F32E-A350-4EF5-ACD2-CF001101F474" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.02:*:*:*:*:*:*:*", + "matchCriteriaId": "9F31ED78-C6B7-4BB4-AB79-F7AE38546BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.19.03:*:*:*:*:*:*:*", + "matchCriteriaId": "80B5F6EB-E001-4D1F-8428-99AF9DC3D4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.01:*:*:*:*:*:*:*", + "matchCriteriaId": "8D2C30FF-FF7C-4F8C-ACB8-A3BC3CFE1EAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.02:*:*:*:*:*:*:*", + "matchCriteriaId": "9F8B4BD9-9197-49C7-9E1D-EEA831E0CCF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.20.03:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA184EF-A951-4E16-B11B-EE7A6456D974" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:track-it\\!:20.21.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5A0E5F78-3CA7-4E92-B714-09E2FCC51DB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-002/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-002/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-355xx/CVE-2021-35587.json b/CVE-2021/CVE-2021-355xx/CVE-2021-35587.json index be4af5e413d..d8284e1328e 100644 --- a/CVE-2021/CVE-2021-355xx/CVE-2021-35587.json +++ b/CVE-2021/CVE-2021-355xx/CVE-2021-35587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-01-19T12:15:09.727", "lastModified": "2024-11-21T06:12:35.493", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json index 82bd1a2902c..46073ec2914 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36380.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36380", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-13T16:15:07.607", - "lastModified": "2024-11-21T06:13:38.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-369xx/CVE-2021-36942.json b/CVE-2021/CVE-2021-369xx/CVE-2021-36942.json index 8d46b44447a..566ebef3c2c 100644 --- a/CVE-2021/CVE-2021-369xx/CVE-2021-36942.json +++ b/CVE-2021/CVE-2021-369xx/CVE-2021-36942.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36942", "sourceIdentifier": "secure@microsoft.com", "published": "2021-08-12T18:15:10.000", - "lastModified": "2024-11-21T06:14:21.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-369xx/CVE-2021-36948.json b/CVE-2021/CVE-2021-369xx/CVE-2021-36948.json index dcb44b4f379..65ba33a3569 100644 --- a/CVE-2021/CVE-2021-369xx/CVE-2021-36948.json +++ b/CVE-2021/CVE-2021-369xx/CVE-2021-36948.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36948", "sourceIdentifier": "secure@microsoft.com", "published": "2021-08-12T18:15:10.190", - "lastModified": "2024-11-21T06:14:21.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-369xx/CVE-2021-36955.json b/CVE-2021/CVE-2021-369xx/CVE-2021-36955.json index 3a78cb73407..aa353a555ff 100644 --- a/CVE-2021/CVE-2021-369xx/CVE-2021-36955.json +++ b/CVE-2021/CVE-2021-369xx/CVE-2021-36955.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36955", "sourceIdentifier": "secure@microsoft.com", "published": "2021-09-15T12:15:13.197", - "lastModified": "2024-11-21T06:14:22.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json index 96bc72d16af..b039c89e8f4 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37973", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T22:15:08.287", - "lastModified": "2025-02-03T14:15:32.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38645.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38645.json index 780bb1a3cf7..d36b0292cc5 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38645.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38645.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38645", "sourceIdentifier": "secure@microsoft.com", "published": "2021-09-15T12:15:14.967", - "lastModified": "2024-11-21T06:17:48.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json index 51bba6210f0..2bf0ab1d69c 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.317", "lastModified": "2025-03-05T23:15:13.557", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "D002A87F-B63B-4BD4-88AE-6CC56716D387" } ] } @@ -96,11 +98,17 @@ "references": [ { "url": "https://github.com/gpac/gpac/blob/v0.9.0-preview/src/filters/load_text.c#L232", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gpac/gpac/blob/v0.9.0-preview/src/filters/load_text.c#L304", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb", @@ -121,7 +129,11 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5411", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb", @@ -142,7 +154,11 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5411", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-417xx/CVE-2021-41719.json b/CVE-2021/CVE-2021-417xx/CVE-2021-41719.json index 63170cb1dae..dc486e44234 100644 --- a/CVE-2021/CVE-2021-417xx/CVE-2021-41719.json +++ b/CVE-2021/CVE-2021-417xx/CVE-2021-41719.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Maharashtra State Electricity Distribution Company Limited Mahavitran IOS Application 16.1 application till version 16.1 communicates using the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources." + }, + { + "lang": "es", + "value": "Maharashtra State Electricity Distribution Company Limited Mahavitran IOS Application 16.1 la aplicaci\u00f3n hasta la versi\u00f3n 16.1 se comunica utilizando el m\u00e9todo GET para procesar solicitudes que contienen informaci\u00f3n confidencial como el nombre de la cuenta de usuario y la contrase\u00f1a, que pueden exponer dicha informaci\u00f3n a trav\u00e9s del historial del navegador, referentes, registros web y otras fuentes." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-442xx/CVE-2021-44207.json b/CVE-2021/CVE-2021-442xx/CVE-2021-44207.json index 82c85deac02..047c4703a23 100644 --- a/CVE-2021/CVE-2021-442xx/CVE-2021-44207.json +++ b/CVE-2021/CVE-2021-442xx/CVE-2021-44207.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44207", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-21T18:15:08.143", - "lastModified": "2024-12-24T02:00:01.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4453.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4453.json index e17e5b41611..2be7c890775 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4453.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:29.820", "lastModified": "2025-02-26T06:37:29.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json index 8ad00efbb62..5308b239e93 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47186", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.430", - "lastModified": "2025-02-21T17:15:10.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: verifique si hay valores nulos despu\u00e9s de llamar a kmemdup kmemdup puede devolver un puntero nulo, por lo que es necesario verificarlo; de lo contrario, se eliminar\u00e1 la referencia a la clave nula m\u00e1s adelante en tipc_crypto_key_xmit, como se puede ver en el seguimiento. [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json index 5e4e52ca06d..da10719683e 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47188", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.527", - "lastModified": "2024-11-21T06:35:35.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,98 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: core: Mejorar el manejo de la interrupci\u00f3n de SCSI Se ha observado lo siguiente en una configuraci\u00f3n de prueba: ADVERTENCIA: CPU: 4 PID: 250 en drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c Rastreo de llamadas: ufshcd_queuecommand+0x468/0x65c scsi_send_eh_cmnd+0x224/0x6a0 scsi_eh_test_devices+0x248/0x418 scsi_eh_ready_devs+0xc34/0xe58 scsi_error_handler+0x204/0x80c kthread+0x150/0x1b4 ret_from_fork+0x10/0x30 Esa advertencia se activa por lo siguiente: declaraci\u00f3n: WARN_ON(lrbp->cmd); Corrija esta advertencia borrando lrbp->cmd del controlador de aborto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "3C95FCA8-3E24-46CE-91BF-CBED93B2065C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3ff1f6b6ba6f97f50862aa50e79959cc8ddc2566", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c36baca06efa833adaefba61f45fefdc49b6d070", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3ff1f6b6ba6f97f50862aa50e79959cc8ddc2566", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c36baca06efa833adaefba61f45fefdc49b6d070", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json index 95b29308e03..5b591767650 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47196", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.897", - "lastModified": "2024-11-21T06:35:36.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,98 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/core: Establecer el CQ de env\u00edo y recepci\u00f3n antes de reenviar al controlador Preestablecer los punteros CQ de env\u00edo y recepci\u00f3n antes de llamar a los controladores y sobrescribirlos m\u00e1s tarde nuevamente hasta que se vaya a cambiar mlx4 no sobrescribir las propiedades ibqp. Este cambio es necesario para mlx5, porque en caso de falla en la creaci\u00f3n de QP, ir\u00e1 a la ruta de destrucci\u00f3n de QP que depende de punteros CQ adecuados. BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib] Write of size 8 at addr ffff8880064c55c0 by task a.out/246 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x45/0x59 print_address_description.constprop.0+0x1f/0x140 kasan_report.cold+0x83/0xdf create_qp.cold+0x164/0x16e [mlx5_ib] mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib] create_qp.part.0+0x45b/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae Allocated by task 246: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0xa4/0xd0 create_qp.part.0+0x92/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae Freed by task 246: kasan_save_stack+0x1b/0x40 kasan_set_track+0x1c/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0x10c/0x150 slab_free_freelist_hook+0xb4/0x1b0 kfree+0xe7/0x2a0 create_qp.part.0+0x52b/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "3DE5A3A1-0D1D-4E9D-82C3-064537088279" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6cd7397d01c4a3e09757840299e4f114f0aa5fa0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b70e072feffa0ba5c41a99b9524b9878dee7748e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6cd7397d01c4a3e09757840299e4f114f0aa5fa0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b70e072feffa0ba5c41a99b9524b9878dee7748e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json index 230bd92a2ca..883a32b5240 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47205", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.310", - "lastModified": "2024-11-21T06:35:37.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,92 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: sunxi-ng: Anular el registro de relojes/reinicios al desvincular Actualmente, desvincular un controlador CCU anula la asignaci\u00f3n de la regi\u00f3n MMIO del dispositivo, mientras que deja sus relojes/reinicios y sus proveedores registrados. Esto puede causar una falla de p\u00e1gina m\u00e1s adelante cuando alguna operaci\u00f3n de reloj intenta realizar MMIO. Solucione esto separando la inicializaci\u00f3n de CCU de la asignaci\u00f3n de memoria y luego usando una devoluci\u00f3n de llamada devres para anular el registro de los relojes y reinicios. Esto tambi\u00e9n corrige una p\u00e9rdida de memoria de `struct ccu_reset` y usa el propietario correcto (el controlador de plataforma espec\u00edfico) para los relojes y reinicios. Los primeros proveedores de reloj OF nunca se anulan del registro y es posible un manejo de errores limitado, por lo que en su mayor\u00eda no se modifican. El informe de errores se hace m\u00e1s consistente moviendo el mensaje dentro de of_sunxi_ccu_probe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "B2845F69-264B-45BD-B7E7-D12B24338382" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json index 589a5097bb1..b56506fd609 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47219", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.903", - "lastModified": "2024-11-21T06:35:39.137", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: scsi_debug: Corregir lectura fuera de los l\u00edmites en resp_report_tgtpgs() Se observ\u00f3 el siguiente problema al ejecutar syzkaller: ERROR: KASAN: slab-out-of-bounds en memcpy include/linux/string.h:377 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 Lectura de tama\u00f1o 2132 en la direcci\u00f3n ffff8880aea95dc8 por la tarea syz-executor.0/9815 CPU: 0 PID: 9815 Comm: syz-executor.0 No contaminado 4.19.202-00874-gfc0fe04215a9 #2 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:77 [en l\u00ednea] dump_stack+0xe4/0x14a lib/dump_stack.c:118 print_address_description+0x73/0x280 mm/kasan/report.c:253 kasan_report_error mm/kasan/report.c:352 [en l\u00ednea] kasan_report+0x272/0x370 mm/kasan/report.c:410 memcpy+0x1f/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [en l\u00ednea] sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 rellenar_desde_buffer_dev+0x14f/0x340 drivers/scsi/scsi_debug.c:1021 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034 __blk_run_queue_uncond bloque/blk-core.c:464 [en l\u00ednea] __blk_run_queue+0x1a4/0x380 bloque/blk-core.c:484 blk_execute_rq_nowait+0x1c2/0x2d0 bloque/blk-exec.c:78 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716 sg_write+0x64/0xa0 drivers/scsi/sg.c:622 __vfs_write+0xed/0x690 fs/read_write.c:485 kill_bdev:block_device:00000000e138492c vfs_write+0x184/0x4c0 fs/read_write.c:549 ksys_write+0x107/0x240 fs/read_write.c:599 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Obtenemos 'alen' del comando, su tipo es int. Si el espacio de usuario pasa una longitud grande, obtendremos un 'alen' negativo. Cambie n, alen y rlen a u32." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "49103CD7-A3F7-441A-AAF4-11B8B707979D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json index af4d2248aba..1cf429ecc0a 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:26.247", "lastModified": "2024-11-21T06:36:04.980", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Manejar el error de inicializaci\u00f3n de SRCU durante el inicio del seguimiento de la p\u00e1gina. Verifique el retorno de init_srcu_struct(), que puede fallar debido a OOM, al inicializar el mecanismo de seguimiento de la p\u00e1gina. La falta de verificaci\u00f3n conduce a un puntero NULL deref encontrado por un syzkaller modificado. [Mueva la llamada hacia el principio de kvm_arch_init_vm. -Paolo]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.71", + "matchCriteriaId": "7A97507B-D1C6-49E3-9F7E-BFCDE3EA3905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.14.10", + "matchCriteriaId": "1A437B0D-8305-4C72-B691-D26986A126CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", + "matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0460DA88-8FE1-46A2-9DDA-1F1ABA552E71" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json index 48ecf8e5d00..110863e2c5f 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:04.400", "lastModified": "2025-02-26T06:37:04.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json index 7390bd1d458..f687dbae481 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:04.943", "lastModified": "2025-02-26T06:37:04.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47633.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47633.json index 88d38fc9ae5..c233e29f52d 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47633.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.060", "lastModified": "2025-02-26T06:37:05.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47634.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47634.json index e3d7fdb8202..0fd1ce763c5 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47634.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.173", "lastModified": "2025-02-27T19:15:40.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47635.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47635.json index b330afeb52d..966cf9c1490 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47635.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47635.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.280", "lastModified": "2025-02-26T06:37:05.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json index 9038f3fa9bd..4d384fe00cc 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.377", "lastModified": "2025-02-26T06:37:05.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json index 180b8b13e35..a82c201e20f 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.477", "lastModified": "2025-02-26T06:37:05.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: Se corrige el bloqueo en el cambio de nombre simult\u00e1neo whiteout y la escritura diferida de inodo Siguientes tareas colgadas: [ 77.028764] task:kworker/u8:4 state:D stack: 0 pid: 132 [ 77.028820] Seguimiento de llamadas: [ 77.029027] schedule+0x8c/0x1b0 [ 77.029067] mutex_lock+0x50/0x60 [ 77.029074] ubifs_write_inode+0x68/0x1f0 [ubifs] [ 77.029117] __writeback_single_inode+0x43c/0x570 [ 77.029128] writeback_sb_inodes+0x259/0x740 [ 77.029148] wb_writeback+0x107/0x4d0 [ 77.029163] wb_workfn+0x162/0x7b0 [ 92.390442] tarea:aa estado:D pila: 0 pid: 1506 [ 92.390448] Seguimiento de llamadas: [ 92.390458] schedule+0x8c/0x1b0 [ 92.390461] wb_wait_for_completion+0x82/0xd0 [ 92.390469] __writeback_inodes_sb_nr+0xb2/0x110 [ 92.390472] writeback_inodes_sb_nr+0x14/0x20 [ 92.390476] ubifs_budget_space+0x705/0xdd0 [ubifs] [ 92.390503] do_rename.cold+0x7f/0x187 [ubifs] [ 92.390549] ubifs_rename+0x8b/0x180 [ubifs] [ 92.390571] vfs_rename+0xdb2/0x1170 [ 92.390580] do_renameat2+0x554/0x770 , son causados por procesos simult\u00e1neos de whiteout de cambio de nombre y de escritura diferida de inodo: rename_whiteout(Subproceso 1) wb_workfn(Subproceso2) ubifs_rename do_rename lock_4_inodes (Mantener mutex ui) ubifs_budget_space make_free_space shrink_liability __writeback_inodes_sb_nr bdi_split_work_to_wbs (Poner en cola nuevo trabajo de wb) wb_do_writeback(trabajo de wb) __writeback_single_inode ubifs_write_inode LOCK(ui_mutex) ? wb_wait_for_completion (Esperar trabajo de wb) <-- \u00a1bloqueo! Reproductor (Programa detallado en [Enlace]): 1. SYS_renameat2(\"/mp/dir/file\", \"/mp/dir/whiteout\", RENAME_WHITEOUT) 2. Consumir todo el espacio antes de que kernel(mdelay) haga el presupuesto para whiteout Arr\u00e9glelo haciendo el presupuesto de espacio de whiteout antes de bloquear los inodos de ubifs. Por cierto, tambi\u00e9n corrige la etiqueta goto incorrecta 'out_release' en la ruta de manejo de errores del presupuesto de whiteout (al menos deber\u00eda recuperar el directorio i_size y desbloquear 4 inodos de ubifs)." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad:\n\nubifs: Se corrige interbloqueo en concurrencia de un renombrado con whiteout simult\u00e1neo a la escritura del inodo.\n\nTareas colgadas:\n[ 77.028764] task:kworker/u8:4 state:D stack: 0 pid: 132\n[ 77.028820] Call Trace:\n[ 77.029027] schedule+0x8c/0x1b0\n[ 77.029067] mutex_lock+0x50/0x60\n[ 77.029074] ubifs_write_inode+0x68/0x1f0 [ubifs]\n[ 77.029117] __writeback_single_inode+0x43c/0x570\n[ 77.029128] writeback_sb_inodes+0x259/0x740\n[ 77.029148] wb_writeback+0x107/0x4d0\n[ 77.029163] wb_workfn+0x162/0x7b0\n\n[ 92.390442] task:aa state:D stack: 0 pid: 1506\n[ 92.390448] Call Trace:\n[ 92.390458] schedule+0x8c/0x1b0\n[ 92.390461] wb_wait_for_completion+0x82/0xd0\n[ 92.390469] __writeback_inodes_sb_nr+0xb2/0x110\n[ 92.390472] writeback_inodes_sb_nr+0x14/0x20\n[ 92.390476] ubifs_budget_space+0x705/0xdd0 [ubifs]\n[ 92.390503] do_rename.cold+0x7f/0x187 [ubifs]\n[ 92.390549] ubifs_rename+0x8b/0x180 [ubifs]\n[ 92.390571] vfs_rename+0xdb2/0x1170\n[ 92.390580] do_renameat2+0x554/0x770\n\n, ocasionado por procesos simult\u00e1neos de renombrado con whiteout y escritura del inodo:\n\trename_whiteout(Thread 1)\t wb_workfn(Thread2)\nubifs_rename\n do_rename\n lock_4_inodes (Hold ui_mutex)\n ubifs_budget_space\n make_free_space\n shrink_liability\n\t __writeback_inodes_sb_nr\n\t bdi_split_work_to_wbs (Queue new wb work)\n\t\t\t\t\t wb_do_writeback(wb work)\n\t\t\t\t\t\t__writeback_single_inode\n\t\t\t\t\t ubifs_write_inode\n\t\t\t\t\t LOCK(ui_mutex)\n\t\t\t\t\t\t\t ?\n\t wb_wait_for_completion (Wait wb work) <-- \u00a1interbloqueo!\n\nCaso de prueba:\n 1. SYS_renameat2(\"/mp/dir/file\", \"/mp/dir/whiteout\", RENAME_WHITEOUT)\n 2. Consumir todo el espacio antes de que kernel(mdelay) planifique el whiteout\n\nArreglado calculando el espacio de whiteout antes de bloquear los inodos de ubifs.\n\nTambi\u00e9n soluciona etiqueta la etiqueta goto err\u00f3nea 'out_release' en el flujo de errores\nde la planificaci\u00f3n del whiteout (al menos deber\u00eda recuperar el directorio i_size y desbloquear 4 inodos de ubifs).\n" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json index c71e612ddeb..e288b383c60 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.580", "lastModified": "2025-02-26T06:37:05.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47639.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47639.json index 7b62f3d04b9..125284c0760 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47639.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47639.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.677", "lastModified": "2025-02-27T19:15:40.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json index c71b0101e87..10153f03af7 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.780", "lastModified": "2025-02-26T06:37:05.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json index 0b844b460c3..6deee41468c 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.883", "lastModified": "2025-02-26T06:37:05.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47642.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47642.json index 3ca5159cc68..4b13efda436 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47642.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.993", "lastModified": "2025-02-26T06:37:05.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47643.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47643.json index 90e6ff55bb4..c2e1f5b07d5 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47643.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47643.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.097", "lastModified": "2025-02-26T06:37:06.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json index eec85ec693d..80be33a04d1 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.197", "lastModified": "2025-02-26T06:37:06.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json index 934f527cceb..c34de96c6b1 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.293", "lastModified": "2025-02-26T06:37:06.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47646.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47646.json index e4c857c4014..38a5d546231 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47646.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47646.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.390", "lastModified": "2025-02-27T18:15:22.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47647.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47647.json index e88153617bf..e422fcff0d2 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47647.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47647.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.490", "lastModified": "2025-02-26T06:37:06.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json index 2f5f5f62a96..a620ffc07ec 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.597", "lastModified": "2025-02-26T06:37:06.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47649.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47649.json index 21d4f54d7b5..d3f502167c3 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47649.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47649.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.687", "lastModified": "2025-02-26T06:37:06.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47650.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47650.json index a623b286019..f1c80b1be3c 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47650.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47650.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.780", "lastModified": "2025-02-26T06:37:06.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json index e28843718e0..54ac3919ef9 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.880", "lastModified": "2025-02-26T06:37:06.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json index 770f80c020d..bb2e4d3c9fa 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.973", "lastModified": "2025-02-26T06:37:06.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47653.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47653.json index 2a8fd78a549..bc2ab4ca98a 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47653.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.080", "lastModified": "2025-02-27T19:15:40.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47654.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47654.json index 12735091b04..015320170f5 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47654.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47654.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.170", "lastModified": "2025-02-26T06:37:07.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47655.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47655.json index e3587f38554..4e4ed359428 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47655.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47655.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.267", "lastModified": "2025-02-26T06:37:07.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47656.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47656.json index af988876dd3..df635c71054 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47656.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47656.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.360", "lastModified": "2025-02-27T18:15:23.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47657.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47657.json index 52abc0e161c..48a7639cd64 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47657.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.467", "lastModified": "2025-02-26T06:37:07.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47658.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47658.json index 1ec9ac4b628..ae0a10caefc 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47658.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47658.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.557", "lastModified": "2025-02-26T06:37:07.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47659.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47659.json index f70fc9c8694..f7586718fcc 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47659.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.640", "lastModified": "2025-02-26T06:37:07.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47660.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47660.json index 491826d2783..adbb16aaa65 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47660.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47660.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:07.733", "lastModified": "2025-02-26T06:37:07.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-214xx/CVE-2022-21445.json b/CVE-2022/CVE-2022-214xx/CVE-2022-21445.json index 63bd8fde2e7..c71f353427e 100644 --- a/CVE-2022/CVE-2022-214xx/CVE-2022-21445.json +++ b/CVE-2022/CVE-2022-214xx/CVE-2022-21445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-04-19T21:15:15.907", "lastModified": "2025-02-26T17:15:12.863", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json index 663ca5d5f73..2e10260997e 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22047", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:10.343", - "lastModified": "2024-11-21T06:45:59.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-227xx/CVE-2022-22718.json b/CVE-2022/CVE-2022-227xx/CVE-2022-22718.json index 1df9fa37868..fba10a1a7be 100644 --- a/CVE-2022/CVE-2022-227xx/CVE-2022-22718.json +++ b/CVE-2022/CVE-2022-227xx/CVE-2022-22718.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22718", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:10.280", - "lastModified": "2024-11-21T06:47:18.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23227.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23227.json index 8c497bbd7b6..895c6355975 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23227.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23227.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T18:15:10.303", "lastModified": "2025-01-03T02:00:01.953", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25773.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25773.json index f47040c23d5..61923cbf22b 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25773.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25773.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2025-02-26T13:15:32.550", "lastModified": "2025-02-26T13:15:32.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json b/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json index 042cc3b385d..7f8c2f48da6 100644 --- a/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json +++ b/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-03-28T00:15:07.813", "lastModified": "2025-01-29T17:15:18.150", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json b/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json index 75419879597..a00d940da60 100644 --- a/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json +++ b/CVE-2022/CVE-2022-279xx/CVE-2022-27924.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27924", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-21T00:15:08.360", - "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,11 +91,11 @@ "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-74" + "value": "CWE-77" } ] }, diff --git a/CVE-2022/CVE-2022-279xx/CVE-2022-27925.json b/CVE-2022/CVE-2022-279xx/CVE-2022-27925.json index b3ce03b2db7..fc1c8aaaa7e 100644 --- a/CVE-2022/CVE-2022-279xx/CVE-2022-27925.json +++ b/CVE-2022/CVE-2022-279xx/CVE-2022-27925.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27925", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-21T00:15:08.407", - "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,13 +119,128 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", - "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:-:*:*:*:*:*:*", + "matchCriteriaId": "9E39A855-C0EB-4448-AE96-177757C40C66" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", - "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1" + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "32AFCE22-5ADA-4FF7-A165-5EC12B325DEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "D3577FE6-F1F4-4555-8D27-84D6DE731EA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "931BD98E-1A5F-4634-945B-BDD7D2FAA8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "2E7C0A57-A887-4D29-B601-4275313F46B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "B7248B91-D136-4DD5-A631-737E4C220A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "494F6FD4-36ED-4E40-8336-7F077FA80FA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "9DF8C0CE-A71D-4BB1-83FB-1EA5ED77E0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "E0648498-2EE5-4B68-8360-ED5914285356" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "24282FF8-548B-415B-95CA-1EFD404D21D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "ACFDF2D9-ED72-4969-AA3B-E8D48CB1922D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "2B7D0A8B-7A72-4C1A-85F2-BE336CA47E0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "019AFC34-289E-4A01-B08B-A5807F7F909A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7E7B3976-DA6F-4285-93E6-2328006F7F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "062E586F-0E02-45A6-93AD-895048FC2D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "3EE37BEE-4BDB-4E62-8DE3-98CF74DFBE01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "ADF51BCA-37DD-4642-B201-74A6D1A545FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "39611F3D-A898-4C35-8915-3334CDFB78E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "FA310AFA-492D-4A6C-A7F6-740E82CB6E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "2AF337B5-B296-449B-8848-7636EC7C46C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "52232ACA-C158-48C8-A0DB-7689040CB8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "3B4D0040-86D0-46C3-8A9A-3DD12138B9ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "D2BB9BC7-078D-4E08-88E4-9432D74CA9BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "F04D4B77-D386-4BC8-8169-9846693F6F11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "992370FA-F171-4FB3-9C1C-58AC37038CE4" } ] } diff --git a/CVE-2022/CVE-2022-279xx/CVE-2022-27926.json b/CVE-2022/CVE-2022-279xx/CVE-2022-27926.json index 00b6212954c..3d97f6ea46c 100644 --- a/CVE-2022/CVE-2022-279xx/CVE-2022-27926.json +++ b/CVE-2022/CVE-2022-279xx/CVE-2022-27926.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-04-21T00:15:08.450", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-293xx/CVE-2022-29303.json b/CVE-2022/CVE-2022-293xx/CVE-2022-29303.json index b7f3861d131..641df286565 100644 --- a/CVE-2022/CVE-2022-293xx/CVE-2022-29303.json +++ b/CVE-2022/CVE-2022-293xx/CVE-2022-29303.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-05-12T16:15:07.600", "lastModified": "2025-01-29T17:15:19.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json index 51c73f6d42d..34a0665d571 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-05-09T08:15:06.937", "lastModified": "2025-01-29T17:15:20.117", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-317xx/CVE-2022-31766.json b/CVE-2022/CVE-2022-317xx/CVE-2022-31766.json index 9980606c86f..ed506f9d0a9 100644 --- a/CVE-2022/CVE-2022-317xx/CVE-2022-31766.json +++ b/CVE-2022/CVE-2022-317xx/CVE-2022-31766.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-359xx/CVE-2022-35914.json b/CVE-2022/CVE-2022-359xx/CVE-2022-35914.json index 3b604f934dc..4139feb7f45 100644 --- a/CVE-2022/CVE-2022-359xx/CVE-2022-35914.json +++ b/CVE-2022/CVE-2022-359xx/CVE-2022-35914.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-09-19T16:15:11.253", "lastModified": "2025-01-29T17:15:21.063", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json b/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json index 18b2c1b5a29..6be744d1c9c 100644 --- a/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json +++ b/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36537", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-26T20:15:08.303", - "lastModified": "2025-01-29T16:15:30.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37042.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37042.json index cc6d8adefe9..631ea673116 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37042.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37042.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-08-12T15:15:16.053", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json index d61a288078d..7f636a2a627 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json index 46ec28bcbcf..845718a8d01 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41061.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json index 8baa14f0b9d..25abab71fb0 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41091", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:22.093", - "lastModified": "2024-11-21T07:22:35.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json index bd4de7eea35..a627b1bd040 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41128", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:25.453", - "lastModified": "2024-11-21T07:22:40.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json index df181c346db..16637e4c431 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-25T01:15:09.957", "lastModified": "2025-02-03T14:15:33.897", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42966.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42966.json index cf5e9270116..e557715ce2e 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42966.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42966.json @@ -3,7 +3,7 @@ "sourceIdentifier": "reefs@jfrog.com", "published": "2022-11-09T20:15:10.993", "lastModified": "2024-11-21T07:25:41.930", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,8 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python-poetry:cleo:-:*:*:*:*:*:*:*", - "matchCriteriaId": "24FBF783-D72D-45DC-B30E-FED2651AA5A1" + "criteria": "cpe:2.3:a:python-poetry:cleo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "34A6ED46-77E8-4120-826C-009F276CC3A2" } ] } diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json index 54d703f8197..d911150856d 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45374.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45374", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:15:47.833", - "lastModified": "2024-11-21T07:29:08.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yarpp:yet_another_related_posts_plugin:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.30.5", + "matchCriteriaId": "B593E344-0D40-4629-A4E4-C38D9CDF1244" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/yet-another-related-posts-plugin/wordpress-yet-another-related-posts-plugin-yarpp-plugin-5-30-2-local-file-inclusion?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/yet-another-related-posts-plugin/wordpress-yet-another-related-posts-plugin-yarpp-plugin-5-30-2-local-file-inclusion?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json index b4355cb87ad..06aada707de 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47966", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T18:15:10.570", - "lastModified": "2024-11-21T07:32:38.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json index af58bbc66b4..b805b7bc4a7 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47986.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47986", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-02-17T16:15:10.873", - "lastModified": "2025-02-13T17:15:49.797", - "vulnStatus": "Modified", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48219.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48219.json index de9f10a1f0e..4c8d3e8715c 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48219.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48219.json @@ -3,7 +3,7 @@ "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-02-14T23:15:07.960", "lastModified": "2024-11-21T07:32:58.903", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json index bb63dca90e1..dc599e8f8db 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48632.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48632", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.517", - "lastModified": "2024-11-21T07:33:39.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,169 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: mlxbf: evita el desbordamiento de pila en mlxbf_i2c_smbus_start_transaction() memcpy() se llama en un bucle mientras que el l\u00edmite superior 'operation->length' no est\u00e1 marcado y 'data_idx' tambi\u00e9n aumenta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.146", + "matchCriteriaId": "26BCCE2C-EE0C-437D-A9D6-6714B5AE47CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.71", + "matchCriteriaId": "080C1827-D257-4D5A-9071-779EF7F5EF0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.19.12", + "matchCriteriaId": "03B0F56B-C5CC-4E81-BB51-D07D569DE4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", + "matchCriteriaId": "8E5FB72F-67CE-43CC-83FE-541604D98182" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3A0A7397-F5F8-4753-82DC-9A11288E696D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json index 9e314b801e9..8238c497039 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48647.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48647", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.237", - "lastModified": "2024-11-21T07:33:41.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,176 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: sfc: corrige el desplazamiento del canal TX cuando se usan interrupciones heredadas En el modo de interrupci\u00f3n heredado, tx_channel_offset estaba codificado en 1, pero eso no es correcto si efx_sepparate_tx_channels es falso. En ese caso, el desplazamiento es 0 porque las colas de transmisi\u00f3n est\u00e1n en el \u00fanico canal existente en el \u00edndice 0, junto con la cola de recepci\u00f3n. Sin esta soluci\u00f3n, tan pronto como intenta enviar tr\u00e1fico, intenta obtener las colas de transmisi\u00f3n de un canal no inicializado y obtiene estos errores: ADVERTENCIA: CPU: 1 PID: 0 en drivers/net/ethernet/sfc/tx.c: 540 efx_hard_start_xmit+0x12e/0x170 [sfc] [...] RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc] [...] Seguimiento de llamadas: dev_hard_start_xmit+0xd7/0x230 sch_direct_xmit+0x9f/0x360 +0x890 /0xa40 [...] ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 0000000000000020 [...] RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc] [...] Seguimiento de llamadas: dev_hard_start_xmit+0xd7/ 0x230 sch_direct_xmit+0x9f/0x360 __dev_queue_xmit+0x890/0xa40 [...]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.122", + "versionEndExcluding": "5.10.146", + "matchCriteriaId": "2C926FD5-E217-4A0F-B399-3AB0A6E31F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.47", + "versionEndExcluding": "5.15.71", + "matchCriteriaId": "CAA0DB20-1738-4B59-886F-A631F8384A9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17.15", + "versionEndExcluding": "5.18", + "matchCriteriaId": "5BF6ED63-C6AF-4B5E-9814-C77A3C45349D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18.4", + "versionEndExcluding": "5.19.12", + "matchCriteriaId": "BB7FD601-08D8-4088-ACF5-7A4ABA272435" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*", + "matchCriteriaId": "8E5FB72F-67CE-43CC-83FE-541604D98182" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3A0A7397-F5F8-4753-82DC-9A11288E696D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json index 8d8296a1a41..c0c2e0cf003 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48717.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T11:15:55.287", "lastModified": "2024-11-21T07:33:51.117", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,183 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: max9759: corrige el desbordamiento en altavoz_gain_control_put() Compruebe si hay valores negativos de \"priv->gain\" para evitar un acceso fuera de los l\u00edmites. La preocupaci\u00f3n es que estos puedan provenir del usuario a trav\u00e9s de: -> snd_ctl_elem_write_user() -> snd_ctl_elem_write() -> kctl->put()" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.17", + "versionEndExcluding": "4.19.228", + "matchCriteriaId": "6130CE5E-0A47-4763-921D-FAFBFECB34B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.178", + "matchCriteriaId": "6F090A25-CDC9-43D2-912A-64923DD7D182" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.99", + "matchCriteriaId": "FA1C3B80-458E-4F34-A0BF-5223557F2863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.22", + "matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.8", + "matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4c907bcd9dcd233da6707059d777ab389dcbd964", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a45448ac95b715173edb1cd090ff24b6586d921", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71e60c170105d153e34d01766c1e4db26a4b24cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0f49d12547d45ea8b0f356a96632dd503941c1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/baead410e5db49e962a67fffc17ac30e44b50b7c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f114fd6165dfb52520755cc4d1c1dfbd447b88b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c907bcd9dcd233da6707059d777ab389dcbd964", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a45448ac95b715173edb1cd090ff24b6586d921", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71e60c170105d153e34d01766c1e4db26a4b24cc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0f49d12547d45ea8b0f356a96632dd503941c1e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/baead410e5db49e962a67fffc17ac30e44b50b7c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f114fd6165dfb52520755cc4d1c1dfbd447b88b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49044.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49044.json index 451a60e9e5f..b8db488a502 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49044.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49044.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:41.680", "lastModified": "2025-02-26T07:00:41.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49046.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49046.json index 38e326de17b..b15ce0c7784 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49046.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:41.890", "lastModified": "2025-02-26T07:00:41.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49047.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49047.json index f5015429398..df92fe522f9 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49047.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49047.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:41.983", "lastModified": "2025-02-27T18:15:23.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49048.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49048.json index 10bafffa851..5c9a3130a15 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49048.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49048.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.073", "lastModified": "2025-02-26T07:00:42.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49049.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49049.json index c2fbedd87ff..2c3bdf1a466 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49049.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.170", "lastModified": "2025-02-26T07:00:42.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49050.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49050.json index 63aac162efc..6958152f768 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49050.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49050.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.270", "lastModified": "2025-02-26T07:00:42.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49051.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49051.json index 75b9bc800bb..26ff4e16ed8 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49051.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49051.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.363", "lastModified": "2025-02-26T07:00:42.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49052.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49052.json index 742d33538ca..bf0c5350bba 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49052.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49052.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.463", "lastModified": "2025-02-26T07:00:42.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49053.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49053.json index 28e75de5112..1fe8ad3916d 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49053.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49053.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.563", "lastModified": "2025-02-27T18:15:23.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49054.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49054.json index 00751b6e1b6..ca2916aa89a 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49054.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49054.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.667", "lastModified": "2025-02-26T07:00:42.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json index 0943c3f2f1c..d4e7f445534 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.760", "lastModified": "2025-02-26T07:00:42.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49056.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49056.json index 01e54edbaae..24383280d56 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49056.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49056.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.863", "lastModified": "2025-02-26T07:00:42.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49057.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49057.json index fd0a7aab0a7..bde00275831 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49057.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49057.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.957", "lastModified": "2025-02-26T07:00:42.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json index 981c74543bb..3afe0170798 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.047", "lastModified": "2025-02-26T07:00:43.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49059.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49059.json index f4f922f8863..36ff65366b8 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49059.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.150", "lastModified": "2025-02-27T18:15:23.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49060.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49060.json index 371ba77f566..8a554b53fae 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49060.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49060.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.257", "lastModified": "2025-02-26T07:00:43.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49061.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49061.json index 44ba7496899..7f534a72e7e 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49061.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49061.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.353", "lastModified": "2025-02-26T07:00:43.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49062.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49062.json index 332b544041c..1a8ae3f15ca 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49062.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49062.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.450", "lastModified": "2025-02-26T07:00:43.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49063.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49063.json index ea61ef5a7e9..283fd584c73 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49063.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49063.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.547", "lastModified": "2025-02-27T19:15:41.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49064.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49064.json index a59c077c37c..ddb5bac8857 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49064.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.637", "lastModified": "2025-02-26T07:00:43.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49065.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49065.json index a16ffae6701..c9ae6ac1fba 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49065.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.723", "lastModified": "2025-02-26T07:00:43.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49066.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49066.json index d81457aa7c3..22bae4e4ed6 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49066.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.820", "lastModified": "2025-02-26T07:00:43.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49067.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49067.json index ca0c373ee73..8f46a80d629 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49067.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.927", "lastModified": "2025-02-26T07:00:43.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49068.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49068.json index 5407c8fadb2..ad3d844768a 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49068.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.027", "lastModified": "2025-02-26T07:00:44.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49069.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49069.json index 7201d173796..104e73e39fc 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49069.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.120", "lastModified": "2025-02-26T07:00:44.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49070.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49070.json index e61bffeaf34..3f1747cbbf8 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49070.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49070.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.217", "lastModified": "2025-02-26T07:00:44.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49071.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49071.json index 4eef5e3a53b..d6738753dee 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49071.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49071.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.323", "lastModified": "2025-02-26T07:00:44.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49072.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49072.json index 7f4e370ff8e..1303560e587 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49072.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49072.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.423", "lastModified": "2025-02-26T07:00:44.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49073.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49073.json index 4c2f448c546..7187282d277 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49073.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49073.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.647", "lastModified": "2025-02-26T07:00:44.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49074.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49074.json index df925d68f88..40f3da618c4 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49074.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.750", "lastModified": "2025-02-26T07:00:44.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49075.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49075.json index 3134a91d741..3e0feec43b9 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49075.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.847", "lastModified": "2025-02-26T07:00:44.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49076.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49076.json index 956ad98fc9b..2e8e61c6013 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49076.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49076.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:44.943", "lastModified": "2025-02-27T19:15:41.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49077.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49077.json index 3fff3a1f4e5..a2100092406 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49077.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49077.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.043", "lastModified": "2025-02-26T07:00:45.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49078.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49078.json index 57f070b9479..486e837b8e5 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49078.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49078.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.153", "lastModified": "2025-02-27T18:15:24.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49079.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49079.json index 53325b16899..e2b18469cff 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49079.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.250", "lastModified": "2025-02-26T07:00:45.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49080.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49080.json index a7df5f66a29..9a4c522e39c 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49080.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49080.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.347", "lastModified": "2025-02-26T07:00:45.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49081.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49081.json index 5032457c0fa..81b639c5c58 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49081.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49081.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.450", "lastModified": "2025-02-26T07:00:45.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49082.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49082.json index 85598c38afa..38d081ba09d 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49082.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.540", "lastModified": "2025-02-27T19:15:41.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49083.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49083.json index 7b8de08f7b9..f016ec4f434 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49083.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.643", "lastModified": "2025-02-26T07:00:45.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49084.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49084.json index 43d3f3a8cb2..2b4973c9ec7 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49084.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.737", "lastModified": "2025-02-26T07:00:45.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49085.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49085.json index 77a5243b382..83c84cba6ad 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49085.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49085.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.833", "lastModified": "2025-02-27T18:15:24.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49086.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49086.json index e2a3159eb48..b3827859d36 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49086.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49086.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:45.940", "lastModified": "2025-02-26T07:00:45.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49087.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49087.json index 1d8003d1c28..4ebd82fec42 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49087.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49087.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.043", "lastModified": "2025-02-27T19:15:41.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49088.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49088.json index b7cbeac2482..558cfd143e9 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49088.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49088.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.143", "lastModified": "2025-02-26T07:00:46.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49089.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49089.json index 0eebe691fc4..ad0d5bc65f3 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49089.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49089.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.240", "lastModified": "2025-02-26T07:00:46.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49090.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49090.json index 0b137444737..c4a41eac10d 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49090.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49090.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.337", "lastModified": "2025-02-26T07:00:46.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49091.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49091.json index 0e9f7a79080..6043e39d122 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49091.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49091.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.430", "lastModified": "2025-02-26T07:00:46.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49092.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49092.json index f3e4c770d65..a21fab5ed68 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49092.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49092.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.530", "lastModified": "2025-02-26T07:00:46.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49093.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49093.json index 984393d98b9..ffd956847f9 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49093.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49093.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.633", "lastModified": "2025-02-27T19:15:41.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49094.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49094.json index ab7cf0d4ede..b74f2eb0ca3 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49094.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.747", "lastModified": "2025-02-26T07:00:46.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49095.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49095.json index 296b0588921..fac5e3367a1 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49095.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49095.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:46.887", "lastModified": "2025-02-26T07:00:46.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49096.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49096.json index 25cfae446e2..dbccd788fa8 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49096.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49096.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.010", "lastModified": "2025-02-26T07:00:47.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49097.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49097.json index 69d4b7d20f3..3eb95c8ca34 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49097.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.127", "lastModified": "2025-02-26T07:00:47.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49098.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49098.json index 0dfcc5289a2..05d38674798 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49098.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.247", "lastModified": "2025-02-26T07:00:47.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49099.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49099.json index dda55808c46..753c7312d92 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49099.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49099.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.347", "lastModified": "2025-02-26T07:00:47.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49100.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49100.json index 66143667e3e..3fbd2312700 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49100.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49100.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.437", "lastModified": "2025-02-26T07:00:47.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49102.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49102.json index afcf28cf884..bae9e2c0d16 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49102.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.633", "lastModified": "2025-02-26T07:00:47.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49103.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49103.json index 296079486b4..3da234b499e 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49103.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49103.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.723", "lastModified": "2025-02-26T07:00:47.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49104.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49104.json index 6a5846c7c53..270bf9c3f48 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49104.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49104.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.817", "lastModified": "2025-02-26T07:00:47.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49105.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49105.json index 3bf1cd5b9a4..3b6d1f933a5 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49105.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:47.910", "lastModified": "2025-02-26T07:00:47.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49106.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49106.json index 40600c0bac1..076f40a140e 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49106.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.003", "lastModified": "2025-02-26T07:00:48.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49107.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49107.json index 0c5107b5848..9d91aef83d4 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49107.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49107.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.093", "lastModified": "2025-02-26T07:00:48.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49108.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49108.json index 45dc6bc596d..1b5caf2633a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49108.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49108.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.183", "lastModified": "2025-02-26T07:00:48.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49109.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49109.json index 1715491dd67..4b1947266de 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49109.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49109.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.273", "lastModified": "2025-02-26T07:00:48.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49110.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49110.json index d517745cdd4..14aa833fb74 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49110.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49110.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.363", "lastModified": "2025-02-26T07:00:48.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49111.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49111.json index 509fb41e1e2..b3e5b3fb3b2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49111.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49111.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.470", "lastModified": "2025-02-27T19:15:41.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49112.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49112.json index 4324c0ba5d5..d85ff6eab8a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49112.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49112.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.577", "lastModified": "2025-02-26T07:00:48.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49113.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49113.json index 5406de89fe8..26ee2719bf2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49113.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.677", "lastModified": "2025-02-26T07:00:48.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49115.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49115.json index 865a2651452..2385a80c651 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49115.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49115.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.873", "lastModified": "2025-02-26T07:00:48.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49116.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49116.json index e2c191b64a1..16442cf25a9 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49116.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:48.967", "lastModified": "2025-02-26T07:00:48.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49117.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49117.json index 81b1868385a..277a7f25d91 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49117.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.057", "lastModified": "2025-02-26T07:00:49.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49118.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49118.json index 1d01b6ef1df..dff42061d9e 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49118.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49118.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.150", "lastModified": "2025-02-26T07:00:49.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49119.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49119.json index d4f41347afc..f81a6f27364 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49119.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.250", "lastModified": "2025-02-26T07:00:49.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49120.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49120.json index a84864cda6c..f4212ff5f5a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49120.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49120.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.350", "lastModified": "2025-02-26T07:00:49.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49121.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49121.json index adc8c8e02cd..c3a9798b671 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49121.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49121.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.450", "lastModified": "2025-02-26T07:00:49.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49122.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49122.json index 4fb97e8f63e..000b48cef5b 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49122.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49122.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.540", "lastModified": "2025-02-26T07:00:49.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49123.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49123.json index 184d7d8f156..72101a727a7 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49123.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49123.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.640", "lastModified": "2025-02-26T07:00:49.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49124.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49124.json index 54c32924a59..69d3a6c062f 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49124.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.740", "lastModified": "2025-02-26T07:00:49.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49125.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49125.json index 1739122bad7..35edd025760 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49125.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.837", "lastModified": "2025-02-26T07:00:49.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49126.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49126.json index 5cfea336835..7d12d0fb3ca 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49126.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49126.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:49.927", "lastModified": "2025-02-26T07:00:49.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49127.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49127.json index 7a06113a2e5..1d39d223497 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49127.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49127.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.023", "lastModified": "2025-02-27T19:15:41.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49128.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49128.json index 7929cb9dede..beaa6c0fb0a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49128.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.113", "lastModified": "2025-02-26T07:00:50.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49129.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49129.json index 0ba4a683617..c0bc1aadfcf 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49129.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.203", "lastModified": "2025-02-27T19:15:42.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49130.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49130.json index e37681bb980..72323a968e2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49130.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49130.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.300", "lastModified": "2025-02-26T07:00:50.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49131.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49131.json index c2defc00640..5f99c3926ec 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49131.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49131.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.393", "lastModified": "2025-02-26T07:00:50.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49132.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49132.json index fe40eb44576..c346190a7b2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49132.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.497", "lastModified": "2025-02-26T07:00:50.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49133.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49133.json index 640df7359ce..73d6f84416f 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49133.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.590", "lastModified": "2025-02-26T07:00:50.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49134.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49134.json index bacab0d8bac..3d92657d871 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49134.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49134.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.680", "lastModified": "2025-02-26T07:00:50.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49135.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49135.json index 2bce94dd881..54ebc5e3d9e 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49135.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.770", "lastModified": "2025-02-26T07:00:50.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49136.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49136.json index 856752090a6..6c7044657af 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49136.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.867", "lastModified": "2025-02-27T18:15:24.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49137.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49137.json index b66be90d517..8df66b604ad 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49137.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49137.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:50.953", "lastModified": "2025-02-26T07:00:50.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49138.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49138.json index c2806ae0be7..cb0b65d871d 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49138.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49138.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.047", "lastModified": "2025-02-26T07:00:51.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49139.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49139.json index 76071699e2f..d9c6ac39d1a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49139.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.133", "lastModified": "2025-02-26T07:00:51.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49141.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49141.json index b5384782dca..feb82751ddb 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49141.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49141.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.327", "lastModified": "2025-02-26T07:00:51.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49142.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49142.json index 8a38ccc6290..8bf42c35a52 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49142.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.420", "lastModified": "2025-02-26T07:00:51.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49144.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49144.json index b3461ac763a..8ee253747fa 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49144.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49144.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.600", "lastModified": "2025-02-26T07:00:51.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49145.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49145.json index 8fc20ebc78b..c40740d0606 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49145.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49145.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.693", "lastModified": "2025-02-26T07:00:51.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49146.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49146.json index 3995662e79e..001833386bf 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49146.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.793", "lastModified": "2025-02-26T07:00:51.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49147.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49147.json index 80380ed8b74..5c36c8a5627 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49147.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49147.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.887", "lastModified": "2025-02-26T07:00:51.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49148.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49148.json index 5a37f67a7b0..f1d84663960 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49148.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:51.973", "lastModified": "2025-02-26T07:00:51.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49149.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49149.json index 30763ee8cdf..27dbaaf25d2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49149.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49149.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.073", "lastModified": "2025-02-26T07:00:52.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49150.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49150.json index 9ee68c10915..50d3b78dbc8 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49150.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.203", "lastModified": "2025-02-26T07:00:52.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49151.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49151.json index a1cfa74e630..a4c924cc13d 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49151.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.330", "lastModified": "2025-02-26T07:00:52.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49152.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49152.json index 0e914610ed1..cd038a33686 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49152.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.440", "lastModified": "2025-02-26T07:00:52.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49153.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49153.json index 3fa645de513..584d676d246 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49153.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.533", "lastModified": "2025-02-26T07:00:52.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49154.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49154.json index 5de9349dd87..739273568cf 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49154.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.627", "lastModified": "2025-02-26T07:00:52.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49155.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49155.json index c481eb807d7..26b45d0ea2a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49155.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.717", "lastModified": "2025-02-26T07:00:52.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49156.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49156.json index 814d12e0336..2bf7f6032c4 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49156.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.823", "lastModified": "2025-02-26T07:00:52.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49157.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49157.json index 608b2b8a732..bada312a6e4 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49157.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49157.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:52.917", "lastModified": "2025-02-26T07:00:52.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49158.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49158.json index d34182de11e..1243951379d 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49158.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.013", "lastModified": "2025-02-26T07:00:53.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49159.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49159.json index 8c56c55334d..1f9027b4e77 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49159.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.103", "lastModified": "2025-02-26T07:00:53.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49160.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49160.json index f7796d4c2cc..65a17a5386a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49160.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.190", "lastModified": "2025-02-26T07:00:53.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49161.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49161.json index 1004820c4bd..64d274aa694 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49161.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.280", "lastModified": "2025-02-26T07:00:53.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49162.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49162.json index 201a3c231d3..0d54940ef52 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49162.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.373", "lastModified": "2025-02-26T07:00:53.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49163.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49163.json index 8534353d189..95c79b5117d 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49163.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.473", "lastModified": "2025-02-26T07:00:53.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49164.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49164.json index 355aad32697..a29e4d0b722 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49164.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49164.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.563", "lastModified": "2025-02-26T07:00:53.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49165.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49165.json index 975e0f61e32..a213c3ffaa1 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49165.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49165.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.653", "lastModified": "2025-02-26T07:00:53.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49166.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49166.json index 93bb277e759..3a126eaf072 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49166.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.743", "lastModified": "2025-02-26T07:00:53.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49167.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49167.json index 4a12d5fde21..bd7bf30ad35 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49167.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.837", "lastModified": "2025-02-26T07:00:53.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49168.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49168.json index 577bbfc51ee..1aa58431a77 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49168.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:53.927", "lastModified": "2025-02-27T19:15:42.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49169.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49169.json index 27a8bd7ea13..6d7677a0897 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49169.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.017", "lastModified": "2025-02-26T07:00:54.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49170.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49170.json index b73f7e56e5b..6a77b7674f7 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49170.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.110", "lastModified": "2025-02-26T07:00:54.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49171.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49171.json index 6d6877d4937..e5ae491e019 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49171.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.213", "lastModified": "2025-02-26T07:00:54.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49172.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49172.json index ecc93c5d498..3ebafd60229 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49172.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.313", "lastModified": "2025-02-26T07:00:54.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49173.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49173.json index a7b84815106..3b5bc78e197 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49173.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.407", "lastModified": "2025-02-26T07:00:54.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49174.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49174.json index 21f96b5ec55..13ab39a0949 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49174.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.503", "lastModified": "2025-02-26T07:00:54.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49175.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49175.json index 639b6ae7b78..1cd95cd45d6 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49175.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.600", "lastModified": "2025-02-26T07:00:54.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49176.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49176.json index 298b624fa1c..e5593cf2590 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49176.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.717", "lastModified": "2025-02-27T19:15:42.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49177.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49177.json index d7b7695a8ad..7b16c65696f 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49177.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49177.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.850", "lastModified": "2025-02-26T07:00:54.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49178.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49178.json index 386cd29e1ba..bdcb8b75813 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49178.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49178.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:54.947", "lastModified": "2025-02-26T07:00:54.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49179.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49179.json index 7d3e196c4d5..bfff3b5a5a0 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49179.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.037", "lastModified": "2025-02-27T18:15:24.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49180.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49180.json index 7a92294ef91..c1a6612931b 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49180.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.137", "lastModified": "2025-02-26T07:00:55.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49183.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49183.json index 4c3ad74502f..caca5d293e2 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49183.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.427", "lastModified": "2025-02-26T07:00:55.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49184.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49184.json index 705f3a1b789..402187c87d5 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49184.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.520", "lastModified": "2025-02-26T07:00:55.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49185.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49185.json index b2d2a6e28be..48463fc8fdb 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49185.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.607", "lastModified": "2025-02-26T07:00:55.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49186.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49186.json index 326b0514dcd..1f6a94a5ff9 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49186.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49186.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.710", "lastModified": "2025-02-26T07:00:55.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49187.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49187.json index 35a20685239..857e4450e4a 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49187.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.803", "lastModified": "2025-02-26T07:00:55.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49188.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49188.json index 93bbafbeca3..7b68fa61eea 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49188.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49188.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.897", "lastModified": "2025-02-26T07:00:55.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49189.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49189.json index acfa631d429..7fade450d75 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49189.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:55.990", "lastModified": "2025-02-26T07:00:55.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json index da99932be3c..4d6aceaf468 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.090", "lastModified": "2025-02-26T07:00:56.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49191.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49191.json index 9f9157b644d..7b0de50fe0c 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49191.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49191.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.183", "lastModified": "2025-02-26T07:00:56.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49192.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49192.json index 3dbe1410c01..e5a9003d893 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49192.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.287", "lastModified": "2025-02-26T07:00:56.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49193.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49193.json index 6a058337f9b..abdfe5ad8c5 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49193.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.383", "lastModified": "2025-02-26T07:00:56.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49194.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49194.json index f0ec7ba8679..4eadf54a5ae 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49194.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.483", "lastModified": "2025-02-26T07:00:56.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49195.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49195.json index b4eb10848e3..c520051c274 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49195.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.580", "lastModified": "2025-02-26T07:00:56.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49197.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49197.json index 837e8b661e4..c9a6ed8e071 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49197.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.770", "lastModified": "2025-02-26T07:00:56.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49198.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49198.json index 30dc92959d8..959f7361045 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49198.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.880", "lastModified": "2025-02-26T07:00:56.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49199.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49199.json index 830bbd659a6..49bb03c1905 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49199.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.970", "lastModified": "2025-02-26T07:00:56.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49200.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49200.json index 49d151860e6..15ea516d667 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49200.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.067", "lastModified": "2025-02-26T07:00:57.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json index 1225180dfe7..88aa5011b3b 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.160", "lastModified": "2025-02-26T07:00:57.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49202.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49202.json index 02e03649a46..49489232456 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49202.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49202.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.260", "lastModified": "2025-02-26T07:00:57.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json index bdebec5d3ac..7665c3aff7f 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.357", "lastModified": "2025-02-26T07:00:57.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49204.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49204.json index 1b50f3b8873..118c583b682 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49204.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.480", "lastModified": "2025-02-26T07:00:57.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49205.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49205.json index 16947577a1e..2a2b2d17942 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49205.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.620", "lastModified": "2025-02-26T07:00:57.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json index 06f8d263f14..988654482e3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.723", "lastModified": "2025-02-26T07:00:57.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json index daf359ee68f..db82764c607 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.817", "lastModified": "2025-02-26T07:00:57.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json index 8a3bd4cbbbe..2118196433a 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.910", "lastModified": "2025-02-26T07:00:57.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json index 257d7fd7f33..0a077a1bad6 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.007", "lastModified": "2025-02-26T07:00:58.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json index 4a6b703d140..2449d13f7a8 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.107", "lastModified": "2025-02-26T07:00:58.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json index f8ff95a45d2..b2a6a57b071 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.200", "lastModified": "2025-02-26T07:00:58.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json index 130b059fc15..b70123c7073 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.293", "lastModified": "2025-02-26T07:00:58.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json index a1b29d45a97..b80b68666ae 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.397", "lastModified": "2025-02-26T07:00:58.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49214.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49214.json index 4dffd56017a..38195218ea1 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49214.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.490", "lastModified": "2025-02-26T07:00:58.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json index cae3a2fa592..78673d1bc7c 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.590", "lastModified": "2025-02-26T07:00:58.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json index 07380f4b1ac..7bd482b57d3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.687", "lastModified": "2025-02-26T07:00:58.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49217.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49217.json index 5e0169a24b0..116e3e4d850 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49217.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49217.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.787", "lastModified": "2025-02-26T07:00:58.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json index 90eae73c6de..31bbbc2a476 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.890", "lastModified": "2025-02-26T07:00:58.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json index cf4d4b5d148..f04a8e73c6e 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.977", "lastModified": "2025-02-26T07:00:58.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49220.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49220.json index 43aa90b0406..e7fe45305e3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49220.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49220.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.070", "lastModified": "2025-02-26T07:00:59.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json index 1427d07121e..671d4a15566 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.167", "lastModified": "2025-02-26T07:00:59.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49222.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49222.json index 5f62e2406b3..cd32f07f501 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49222.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.260", "lastModified": "2025-02-26T07:00:59.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49223.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49223.json index 438f2e264a4..96cb61a59aa 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49223.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49223.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.363", "lastModified": "2025-02-27T19:15:42.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json index 4c32fd18503..954e146744f 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.457", "lastModified": "2025-02-26T07:00:59.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json index ac677dd96cf..354df126ede 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.563", "lastModified": "2025-02-26T07:00:59.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49226.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49226.json index 75bf80c3eb1..12529597188 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49226.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.650", "lastModified": "2025-02-26T07:00:59.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49227.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49227.json index 007c0ca0c85..d0cc84218b4 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49227.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49227.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.747", "lastModified": "2025-02-26T07:00:59.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49228.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49228.json index a410ca31d33..3afd708a051 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49228.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49228.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.840", "lastModified": "2025-02-26T07:00:59.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49229.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49229.json index f2df21075ff..d1a6c0a8a8f 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49229.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49229.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.943", "lastModified": "2025-02-26T07:00:59.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json index b5836791981..62fb47ab974 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.037", "lastModified": "2025-02-26T07:01:00.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json index 10bbd4cdaed..5bbd84d1b93 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.130", "lastModified": "2025-02-26T07:01:00.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json index 0bc6226ea86..438ce677b81 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.217", "lastModified": "2025-02-26T07:01:00.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json index 30051b0949d..becee9fba11 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.317", "lastModified": "2025-02-26T07:01:00.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49234.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49234.json index f4e818f7407..f246e6e17dd 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49234.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.407", "lastModified": "2025-02-26T07:01:00.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json index d7c534b65d9..85981c5a044 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.500", "lastModified": "2025-02-26T07:01:00.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49236.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49236.json index c765333a01c..b3ada8a37d7 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49236.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.600", "lastModified": "2025-02-27T18:15:24.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json index cd49d138683..9032c91eac8 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.700", "lastModified": "2025-02-26T07:01:00.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49238.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49238.json index 69134b40709..ef9d06d1ade 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49238.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49238.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.790", "lastModified": "2025-02-27T19:15:42.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json index 654e0f8c622..1a6bb18eaa4 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.887", "lastModified": "2025-02-26T07:01:00.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49240.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49240.json index 30afb208386..32343a1fc8c 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49240.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49240.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.977", "lastModified": "2025-02-26T07:01:00.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49241.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49241.json index 06589f22154..184213035ae 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49241.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49241.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.063", "lastModified": "2025-02-26T07:01:01.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49242.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49242.json index 4904ff88bad..be42ca9be64 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49242.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49242.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.153", "lastModified": "2025-02-26T07:01:01.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49243.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49243.json index 156226e1c58..70320757179 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49243.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49243.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.250", "lastModified": "2025-02-26T07:01:01.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49244.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49244.json index 2fd3c7a2930..15137eecf93 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49244.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.350", "lastModified": "2025-02-26T07:01:01.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49245.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49245.json index 6e056b3c119..c4880a2d15d 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49245.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49245.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.450", "lastModified": "2025-02-26T07:01:01.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49246.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49246.json index 722b16adf6e..b3a4aa2b20c 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49246.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.537", "lastModified": "2025-02-26T07:01:01.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49247.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49247.json index bd4b8911cf3..eac51dab5be 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49247.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49247.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.623", "lastModified": "2025-02-26T07:01:01.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49248.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49248.json index 3d40ba80416..9806e7a73f6 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49248.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49248.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.727", "lastModified": "2025-02-26T07:01:01.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49249.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49249.json index 2f0140e4ef9..7f5a5eee51d 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49249.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.830", "lastModified": "2025-02-26T07:01:01.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49250.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49250.json index 8fe2bb1150d..87db3a08b67 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49250.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49250.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:01.920", "lastModified": "2025-02-26T07:01:01.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49251.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49251.json index 8543603d3b4..d851646f7db 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49251.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.013", "lastModified": "2025-02-26T07:01:02.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49252.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49252.json index 8ed5b255801..e21330c7fe2 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49252.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49252.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.103", "lastModified": "2025-02-26T07:01:02.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49253.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49253.json index e41c168d2cb..062e89d0995 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49253.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49253.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.200", "lastModified": "2025-02-26T07:01:02.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49254.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49254.json index fd1ff7795a5..e2caa29c380 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49254.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49254.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.300", "lastModified": "2025-02-26T07:01:02.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49255.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49255.json index 632cf6edec5..3ed41c2dab8 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49255.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49255.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.397", "lastModified": "2025-02-26T07:01:02.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49256.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49256.json index 8c1680c10c0..b404a292601 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49256.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.497", "lastModified": "2025-02-26T07:01:02.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49257.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49257.json index a8ee85c1c8c..084eb90da70 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49257.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49257.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.597", "lastModified": "2025-02-26T07:01:02.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json index b967829162d..dfc9460ebc3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.720", "lastModified": "2025-02-27T18:15:24.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49259.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49259.json index 2e479cb85de..a21c5650dbb 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49259.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49259.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.850", "lastModified": "2025-02-26T07:01:02.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49260.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49260.json index 1c0eb04436d..bc998ac39ad 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49260.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49260.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:02.967", "lastModified": "2025-02-26T07:01:02.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49261.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49261.json index 0c2cb66aa97..73728895aa1 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49261.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.057", "lastModified": "2025-02-26T07:01:03.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49262.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49262.json index 6cfdaaa4ad9..0a2dfbecbce 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49262.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49262.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.153", "lastModified": "2025-02-26T07:01:03.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49263.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49263.json index 255c1d342c9..3adec9758bc 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49263.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49263.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.243", "lastModified": "2025-02-26T07:01:03.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49264.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49264.json index 4135519f870..6f68b7a5ede 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49264.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49264.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.337", "lastModified": "2025-02-26T07:01:03.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49265.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49265.json index 901285e9295..b12129a8f2b 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49265.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49265.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.437", "lastModified": "2025-02-26T07:01:03.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49266.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49266.json index 4ced4eda935..f95db7c0700 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49266.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.527", "lastModified": "2025-02-26T07:01:03.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49267.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49267.json index 6dd78a83178..b68dcdb2617 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49267.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49267.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.620", "lastModified": "2025-02-26T07:01:03.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49268.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49268.json index d64911f109b..d4e5c906680 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49268.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49268.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.710", "lastModified": "2025-02-26T07:01:03.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49269.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49269.json index e27b23fdb9b..6909c0df69d 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49269.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.813", "lastModified": "2025-02-26T07:01:03.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49270.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49270.json index 282fe545f13..2dba2420050 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49270.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49270.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:03.907", "lastModified": "2025-02-27T19:15:42.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49271.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49271.json index 057b6e8ba21..6107ddbb950 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49271.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49271.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.000", "lastModified": "2025-02-26T07:01:04.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49272.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49272.json index f290f60820f..e98b096c240 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49272.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.097", "lastModified": "2025-02-26T07:01:04.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49273.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49273.json index 142907a7e4c..3067f062bd6 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49273.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49273.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.190", "lastModified": "2025-02-26T07:01:04.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49274.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49274.json index 30ad14b421e..a2f0286c7c6 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49274.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49274.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.280", "lastModified": "2025-02-26T07:01:04.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49276.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49276.json index 3672c19a102..e1596bb2358 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49276.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49276.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.470", "lastModified": "2025-02-26T07:01:04.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49277.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49277.json index 534b3932ee6..53e7bb12bae 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49277.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.567", "lastModified": "2025-02-26T07:01:04.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49278.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49278.json index 5845891c76d..c63c7fa2171 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49278.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.660", "lastModified": "2025-02-26T07:01:04.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49279.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49279.json index 30eecee51a3..f654dc1d8c0 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49279.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.750", "lastModified": "2025-02-26T07:01:04.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49280.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49280.json index 3f3ca1e3a08..cbc16c20d2e 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49280.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.840", "lastModified": "2025-02-26T07:01:04.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49281.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49281.json index 644b0539193..e692ea17583 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49281.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:04.967", "lastModified": "2025-02-26T07:01:04.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49282.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49282.json index 554bc55114d..967f9fb7d39 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49282.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.073", "lastModified": "2025-02-26T07:01:05.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49283.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49283.json index d4a7ecba826..e7594a2a89c 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49283.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.167", "lastModified": "2025-02-26T07:01:05.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49284.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49284.json index e4798b29495..8a599019c45 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49284.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49284.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.260", "lastModified": "2025-02-26T07:01:05.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49285.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49285.json index ea95dd5191a..c01025ac111 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49285.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.360", "lastModified": "2025-02-26T07:01:05.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49286.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49286.json index fb48af84b7d..17aa7091eb3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49286.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.453", "lastModified": "2025-02-26T07:01:05.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49287.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49287.json index 3dca8a07c56..0accbf20eca 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49287.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49287.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.557", "lastModified": "2025-02-27T19:15:42.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49288.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49288.json index cee3cbe35ac..9661a9e5539 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49288.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49288.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.657", "lastModified": "2025-02-27T18:15:25.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49289.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49289.json index d83310dcf50..b4528e7b565 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49289.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49289.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.757", "lastModified": "2025-02-26T07:01:05.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49290.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49290.json index 75c899d6db6..c039acda096 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49290.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49290.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.853", "lastModified": "2025-02-26T07:01:05.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json index 9b22a37ffec..ad0bdec142f 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.950", "lastModified": "2025-02-27T18:15:25.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49292.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49292.json index 52539433d6b..c358ab8b447 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49292.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.047", "lastModified": "2025-02-26T07:01:06.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49293.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49293.json index 7ff509562f2..0529cd92766 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49293.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49293.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.140", "lastModified": "2025-02-26T07:01:06.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49294.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49294.json index 96f6c108790..7a143a05e1c 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49294.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.237", "lastModified": "2025-02-26T07:01:06.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49295.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49295.json index dda254bccf4..2342fa60610 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49295.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49295.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.333", "lastModified": "2025-02-26T07:01:06.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49296.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49296.json index 9091530dd7f..6d7093b5cf4 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49296.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49296.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.433", "lastModified": "2025-02-26T07:01:06.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49297.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49297.json index 3d571198425..53b560a1d28 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49297.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.527", "lastModified": "2025-02-26T07:01:06.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49298.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49298.json index b855285edce..f3fe600afcf 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49298.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49298.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.630", "lastModified": "2025-02-26T07:01:06.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json index 1cbc9264a21..5a13c0006ca 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49299.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.727", "lastModified": "2025-02-26T07:01:06.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49300.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49300.json index 98c62d308ca..be7c1415b75 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49300.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49300.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.830", "lastModified": "2025-02-26T07:01:06.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49301.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49301.json index f201a15ff07..382ff8eb8a7 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49301.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49301.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:06.923", "lastModified": "2025-02-26T07:01:06.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49302.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49302.json index 950721006eb..1d1bdde735a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49302.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49302.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.027", "lastModified": "2025-02-26T07:01:07.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49303.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49303.json index 93e0bf27c3d..b9b13e68988 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49303.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49303.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.123", "lastModified": "2025-02-26T07:01:07.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49304.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49304.json index 73b5051db05..61d67ae4e26 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49304.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49304.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.213", "lastModified": "2025-02-26T07:01:07.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49305.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49305.json index a9d255567fe..0cc8df86c83 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49305.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49305.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.310", "lastModified": "2025-02-26T07:01:07.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49306.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49306.json index 6ec79ec67c8..ff27cdb858a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49306.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49306.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.413", "lastModified": "2025-02-26T07:01:07.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49307.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49307.json index 15d7632e351..b197f46a817 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49307.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49307.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.503", "lastModified": "2025-02-26T07:01:07.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49308.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49308.json index a06ccff919d..2573b14957d 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49308.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49308.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.607", "lastModified": "2025-02-26T07:01:07.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49309.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49309.json index d8bb2d5dd68..f7530cd9e2a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49309.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49309.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.700", "lastModified": "2025-02-26T07:01:07.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49310.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49310.json index ebc9ffb2ccf..4284f1c5bff 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49310.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49310.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.793", "lastModified": "2025-02-26T07:01:07.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49311.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49311.json index 54fe3ad3874..34e64d79990 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49311.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49311.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.887", "lastModified": "2025-02-26T07:01:07.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49312.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49312.json index 3efa701fa12..1fc3ac3388b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49312.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:07.997", "lastModified": "2025-02-26T07:01:07.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49313.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49313.json index 7cc3b112598..c5f7a64ef23 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49313.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49313.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.143", "lastModified": "2025-02-26T07:01:08.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49314.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49314.json index f548c197cbf..4f4d270ef08 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49314.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49314.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.270", "lastModified": "2025-02-26T07:01:08.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49315.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49315.json index 8acf22c702f..b3ad1684b3c 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49315.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49315.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.373", "lastModified": "2025-02-26T07:01:08.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49316.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49316.json index ef5c4e23af6..2a3e28e3cc2 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49316.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.470", "lastModified": "2025-02-26T07:01:08.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49317.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49317.json index bff936a99e6..9e9680f7782 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49317.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.567", "lastModified": "2025-02-26T07:01:08.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49318.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49318.json index 7facefa599f..aff7ef66f64 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49318.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49318.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.660", "lastModified": "2025-02-26T07:01:08.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49319.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49319.json index 860fb081c7c..3523ba410f5 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49319.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49319.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.750", "lastModified": "2025-02-26T07:01:08.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49320.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49320.json index 3c644adc528..3b82d32e28d 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49320.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.840", "lastModified": "2025-02-26T07:01:08.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49321.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49321.json index 75f4ee0058c..fc2f87ef43b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49321.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:08.933", "lastModified": "2025-02-26T07:01:08.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49322.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49322.json index c657bec492f..d30e3aef245 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49322.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.030", "lastModified": "2025-02-26T07:01:09.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49323.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49323.json index 5c689bc24fc..43ca059e9f2 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49323.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49323.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.130", "lastModified": "2025-02-26T07:01:09.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49324.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49324.json index 57456c0cbea..20c1317ecc3 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49324.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.223", "lastModified": "2025-02-26T07:01:09.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49325.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49325.json index d9b91c201ec..36843ad11ec 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49325.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49325.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.323", "lastModified": "2025-02-26T07:01:09.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49326.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49326.json index 0821582f5f4..9371568eddc 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49326.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.417", "lastModified": "2025-02-26T07:01:09.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49327.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49327.json index a0f9a8612cb..7d0b149545a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49327.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.510", "lastModified": "2025-02-26T07:01:09.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json index 9d90f42a575..111b593e70f 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.610", "lastModified": "2025-02-27T19:15:43.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49329.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49329.json index 88fbd123d6d..87be2070671 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49329.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49329.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.703", "lastModified": "2025-02-26T07:01:09.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49330.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49330.json index 0bcb9e6f8f0..b935770ebc4 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49330.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49330.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.797", "lastModified": "2025-02-26T07:01:09.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49331.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49331.json index d0c2ba0f6d8..1374483353a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49331.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49331.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.900", "lastModified": "2025-02-26T07:01:09.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49332.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49332.json index 4ec0d52a8b6..c7ada7b7e1a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49332.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.997", "lastModified": "2025-02-26T07:01:09.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49333.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49333.json index 37c7c2752f4..b6c00da3c20 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49333.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.090", "lastModified": "2025-02-26T07:01:10.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49334.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49334.json index 8d316fb1867..9d1cae7d585 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49334.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.180", "lastModified": "2025-02-26T07:01:10.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49335.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49335.json index 0fb9a33ea84..4010b9bc186 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49335.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.270", "lastModified": "2025-02-26T07:01:10.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49336.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49336.json index ec5cd2866ff..b6e3afe5e80 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49336.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49336.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.370", "lastModified": "2025-02-26T07:01:10.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49337.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49337.json index 108085634a0..3c3d69bb9b3 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49337.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49337.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.457", "lastModified": "2025-02-26T07:01:10.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49338.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49338.json index 8ba3f65f49c..a335cc9c650 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49338.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49338.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.560", "lastModified": "2025-02-26T07:01:10.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49339.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49339.json index c3e923c838f..56ebbac2e3e 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49339.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49339.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.657", "lastModified": "2025-02-26T07:01:10.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49340.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49340.json index 83fd2c2bb03..76deb434911 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49340.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49340.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.753", "lastModified": "2025-02-26T07:01:10.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49341.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49341.json index be737ce2ca1..acfc6bea871 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49341.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.857", "lastModified": "2025-02-26T07:01:10.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49342.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49342.json index 7ee127d884a..f7f16b97efb 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49342.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49342.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:10.953", "lastModified": "2025-02-26T07:01:10.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49343.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49343.json index c65b76242b3..6ce365ee84b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49343.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.040", "lastModified": "2025-02-26T07:01:11.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49344.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49344.json index f3207941c60..f51993dc1b5 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49344.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.140", "lastModified": "2025-02-26T07:01:11.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49345.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49345.json index 2b94dd53eb7..f1ca45eb87b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49345.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49345.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.237", "lastModified": "2025-02-26T07:01:11.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49346.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49346.json index 7c4e4dbfcdb..0ca2a267295 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49346.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49346.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.340", "lastModified": "2025-02-26T07:01:11.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49347.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49347.json index 6dbbd010498..a6278396fc7 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49347.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.433", "lastModified": "2025-02-26T07:01:11.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49348.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49348.json index d1586ead862..606410f97e3 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49348.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49348.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.533", "lastModified": "2025-02-26T07:01:11.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json index ba85798ce18..4eb06f4ca41 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.623", "lastModified": "2025-02-27T19:15:43.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49350.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49350.json index 5a14649bc5e..1654be3e83b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49350.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49350.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.723", "lastModified": "2025-02-26T07:01:11.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49351.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49351.json index 7039f91c7ac..5862da8da65 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49351.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.823", "lastModified": "2025-02-26T07:01:11.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49352.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49352.json index 2cf0987ae0e..01184eb4269 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49352.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.920", "lastModified": "2025-02-26T07:01:11.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49353.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49353.json index f325e2ed7e4..98b9bab4b81 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49353.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49353.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.013", "lastModified": "2025-02-26T07:01:12.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49354.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49354.json index e9f0e766ce4..cad2dd8ec4f 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49354.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49354.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.103", "lastModified": "2025-02-26T07:01:12.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49356.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49356.json index c291fe30b6c..d7ff9bbe4e2 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49356.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.300", "lastModified": "2025-02-26T07:01:12.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49357.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49357.json index fc0a5e12e67..863fc479d00 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49357.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49357.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.390", "lastModified": "2025-02-26T07:01:12.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49358.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49358.json index d47e8c744ca..a1f7b97fe6c 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49358.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49358.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.487", "lastModified": "2025-02-26T07:01:12.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json index fcc815433e5..73e4a13af71 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.583", "lastModified": "2025-02-27T19:15:43.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49360.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49360.json index f6392adef3a..20656fa96b0 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49360.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49360.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.677", "lastModified": "2025-02-26T07:01:12.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49361.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49361.json index 57302c4f5b4..abd63acec87 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49361.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49361.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.770", "lastModified": "2025-02-26T07:01:12.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json index e04fef3275b..ac318a62249 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.860", "lastModified": "2025-02-27T19:15:43.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49363.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49363.json index 7be25b71718..266777e6d83 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49363.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49363.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.953", "lastModified": "2025-02-26T07:01:12.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49364.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49364.json index 2458d330ac1..3fdbb0c453b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49364.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.043", "lastModified": "2025-02-26T07:01:13.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49365.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49365.json index 7d3dd257997..de627c609fb 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49365.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.140", "lastModified": "2025-02-26T07:01:13.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49366.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49366.json index 8dd83b410b4..3ed423418da 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49366.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49366.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.230", "lastModified": "2025-02-26T07:01:13.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49367.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49367.json index 734c75dc21f..99c4d1a784b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49367.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49367.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.353", "lastModified": "2025-02-26T07:01:13.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49368.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49368.json index edd28d75186..85570ec0af6 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49368.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49368.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.483", "lastModified": "2025-02-26T07:01:13.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49369.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49369.json index c930cdcc6e7..737a01e29ae 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49369.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49369.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.583", "lastModified": "2025-02-26T07:01:13.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49370.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49370.json index 82e1499e23c..9aedfc51c79 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49370.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49370.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.677", "lastModified": "2025-02-26T07:01:13.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49371.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49371.json index 9a26fda16c7..90523bf6b96 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49371.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.777", "lastModified": "2025-02-26T07:01:13.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49372.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49372.json index a275f17ee7e..d533ce9aace 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49372.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49372.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.870", "lastModified": "2025-02-26T07:01:13.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49373.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49373.json index 81ec6d205fd..edb1758512b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49373.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:13.970", "lastModified": "2025-02-26T07:01:13.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49374.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49374.json index d5baf85c944..ac7705f6a56 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49374.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.060", "lastModified": "2025-02-26T07:01:14.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49375.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49375.json index f32105d8731..ac73b5b63a4 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49375.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49375.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.160", "lastModified": "2025-02-26T07:01:14.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49376.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49376.json index bcab3c8c90c..71fcb0ee651 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49376.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49376.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.260", "lastModified": "2025-02-26T07:01:14.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json index 4f7d864ccb0..ddb906594f2 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.357", "lastModified": "2025-02-27T19:15:43.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49378.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49378.json index 52ca07d2b0b..7ea9c73614b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49378.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49378.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.450", "lastModified": "2025-02-26T07:01:14.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49379.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49379.json index f144d316541..88b5ff4e81d 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49379.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49379.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.543", "lastModified": "2025-02-26T07:01:14.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49380.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49380.json index 7d2f7618897..a6e7246fb14 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49380.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.633", "lastModified": "2025-02-26T07:01:14.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49381.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49381.json index f158ce6c202..e1718024b27 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49381.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49381.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.727", "lastModified": "2025-02-26T07:01:14.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49382.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49382.json index 6c62f264603..1c32c988898 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49382.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.823", "lastModified": "2025-02-26T07:01:14.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49383.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49383.json index 0c87f09702e..088e9c4b6dd 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49383.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.917", "lastModified": "2025-02-26T07:01:14.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49384.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49384.json index f1e46a4a26a..eaf45c36545 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49384.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49384.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.007", "lastModified": "2025-02-26T07:01:15.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json index 594cf76f10d..6f3dcdc76db 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.103", "lastModified": "2025-02-27T18:15:25.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49386.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49386.json index f5d309de98d..0c7dde840d1 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49386.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.233", "lastModified": "2025-02-26T07:01:15.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49387.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49387.json index 9c6e7ad9414..057ab1760e8 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49387.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49387.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.343", "lastModified": "2025-02-26T07:01:15.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json index 8377d6d44d5..01273c711c9 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.430", "lastModified": "2025-02-27T18:15:25.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49389.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49389.json index 1959616faa2..c66b6182b23 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49389.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49389.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.527", "lastModified": "2025-02-26T07:01:15.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json index 6d6e2ca4dd2..7e930d1ad93 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.620", "lastModified": "2025-02-27T18:15:25.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49391.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49391.json index 4788742e746..83c07027fb5 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49391.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49391.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.713", "lastModified": "2025-02-26T07:01:15.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49392.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49392.json index e700071f6c2..048a38aa928 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49392.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.803", "lastModified": "2025-02-26T07:01:15.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49393.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49393.json index a508b982f6a..4767ec2e01b 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49393.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.890", "lastModified": "2025-02-26T07:01:15.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49394.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49394.json index 8f27dfcf9bd..91b8a85dc84 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49394.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49394.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.983", "lastModified": "2025-02-26T07:01:15.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49395.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49395.json index 6752918751c..666e986f13a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49395.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49395.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.080", "lastModified": "2025-02-26T07:01:16.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49396.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49396.json index d99c250e89d..5eda8a6912a 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49396.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49396.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.173", "lastModified": "2025-02-26T07:01:16.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49397.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49397.json index 323cbe96e08..25e720da2eb 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49397.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49397.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.270", "lastModified": "2025-02-26T07:01:16.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49398.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49398.json index c6b1d7c1f4f..bebb12ed283 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49398.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49398.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.377", "lastModified": "2025-02-26T07:01:16.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49399.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49399.json index 72376983c48..b310b458f69 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49399.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.470", "lastModified": "2025-02-26T07:01:16.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49400.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49400.json index a8239bef7b3..1d287c4276b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49400.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.570", "lastModified": "2025-02-26T07:01:16.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49401.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49401.json index 14068905c3c..843c6df273e 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49401.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.660", "lastModified": "2025-02-26T07:01:16.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49402.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49402.json index fcdbf8f6250..6aeed7684c9 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49402.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.750", "lastModified": "2025-02-26T07:01:16.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49403.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49403.json index d6fca8148bb..844f7a5269d 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49403.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49403.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.847", "lastModified": "2025-02-26T07:01:16.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49404.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49404.json index e6900453825..928d5db1be4 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49404.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49404.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:16.937", "lastModified": "2025-02-26T07:01:16.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49405.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49405.json index 44ef66999ee..d8586d0d8aa 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49405.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.037", "lastModified": "2025-02-26T07:01:17.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49406.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49406.json index 81b15de070a..80cbb85a2e7 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49406.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.123", "lastModified": "2025-02-26T07:01:17.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49407.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49407.json index 54c9c6ddbb0..6726f1b5091 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49407.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.217", "lastModified": "2025-02-26T07:01:17.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49408.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49408.json index de50d0e8566..c45245768bf 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49408.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.323", "lastModified": "2025-02-26T07:01:17.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49409.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49409.json index 4fa960f15e7..bc6fbb19f0d 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49409.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.420", "lastModified": "2025-02-26T07:01:17.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49410.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49410.json index ed158d7ac9b..2c01e9b348d 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49410.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49410.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.517", "lastModified": "2025-02-26T07:01:17.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49412.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49412.json index 34065657375..9542b6683dd 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49412.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49412.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.703", "lastModified": "2025-02-27T19:15:43.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49413.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49413.json index b615659e599..72bec98da64 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49413.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.800", "lastModified": "2025-02-27T19:15:43.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49414.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49414.json index 956a14e20bf..01923f2b2a7 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49414.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49414.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.890", "lastModified": "2025-02-26T07:01:17.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49415.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49415.json index 61db7c6d95f..5b811fdeba6 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49415.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.987", "lastModified": "2025-02-26T07:01:17.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49416.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49416.json index 771ed6bcc27..9b5d6966988 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49416.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49416.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.073", "lastModified": "2025-02-27T19:15:44.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49417.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49417.json index 33f58b161c3..99f1de7e3e0 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49417.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49417.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.170", "lastModified": "2025-02-26T07:01:18.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49418.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49418.json index f38b3a1002f..35b29a6f0ca 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49418.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49418.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.260", "lastModified": "2025-02-26T07:01:18.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49419.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49419.json index bd80a93451c..79287896df3 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49419.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.350", "lastModified": "2025-02-27T19:15:44.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49420.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49420.json index 1c44917bd20..6ed4dabb2e9 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49420.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49420.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.440", "lastModified": "2025-02-26T07:01:18.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49421.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49421.json index 5142bf77112..49807ece892 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49421.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.533", "lastModified": "2025-02-26T07:01:18.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49422.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49422.json index c1b4d5b143c..8c4bb70f8df 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49422.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49422.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.657", "lastModified": "2025-02-26T07:01:18.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49423.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49423.json index 7d45263ea5e..eff764156a0 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49423.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.783", "lastModified": "2025-02-26T07:01:18.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49424.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49424.json index f61417f01e4..c0a8a2c9575 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49424.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49424.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.880", "lastModified": "2025-02-26T07:01:18.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49425.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49425.json index f62b1e3e5b2..e4835f69bee 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49425.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49425.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:18.977", "lastModified": "2025-02-26T07:01:18.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49426.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49426.json index 82ebb96410a..328f612bd6e 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49426.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.073", "lastModified": "2025-02-27T19:15:44.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49427.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49427.json index a2b114580f6..426f7040d2c 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49427.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.187", "lastModified": "2025-02-26T07:01:19.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49428.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49428.json index 785ad8a50e5..47a4c796b25 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49428.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.290", "lastModified": "2025-02-26T07:01:19.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49429.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49429.json index fccf1c816d5..bd940a7db4d 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49429.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.383", "lastModified": "2025-02-26T07:01:19.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49430.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49430.json index f0a4ed911db..c4c4725f625 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49430.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49430.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.480", "lastModified": "2025-02-26T07:01:19.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49431.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49431.json index d2bf46dd915..21fcd9153e9 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49431.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49431.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.573", "lastModified": "2025-02-26T07:01:19.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49432.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49432.json index ec8ce55a98b..81bc0a25be7 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49432.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49432.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.667", "lastModified": "2025-02-26T07:01:19.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49433.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49433.json index cee4c92bda7..521fee18e0b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49433.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49433.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.763", "lastModified": "2025-02-26T07:01:19.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49434.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49434.json index 57d968ad8c7..471fb370cfe 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49434.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.863", "lastModified": "2025-02-26T07:01:19.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49435.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49435.json index 89b4f176df9..64a5fa71e49 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49435.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49435.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:19.957", "lastModified": "2025-02-26T07:01:19.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49436.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49436.json index 508cf5fcd08..df9626dd3df 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49436.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49436.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.057", "lastModified": "2025-02-26T07:01:20.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49437.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49437.json index e1c700fe1a5..831218b521d 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49437.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.150", "lastModified": "2025-02-26T07:01:20.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49438.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49438.json index 389abdbbd10..1c30712b896 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49438.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49438.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.240", "lastModified": "2025-02-26T07:01:20.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49439.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49439.json index 97b0ac7ff2a..470702040c2 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49439.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.337", "lastModified": "2025-02-26T07:01:20.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49440.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49440.json index ad25842abfd..e3636a0396b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49440.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49440.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.430", "lastModified": "2025-02-26T07:01:20.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49441.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49441.json index bad75ced551..5bf24f77868 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49441.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49441.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.523", "lastModified": "2025-02-26T07:01:20.523", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49442.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49442.json index e8383bdb938..eed44912a4b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49442.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49442.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.630", "lastModified": "2025-02-26T07:01:20.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49443.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49443.json index ad9ccb29e73..bdb1235472f 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49443.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.730", "lastModified": "2025-02-26T07:01:20.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49444.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49444.json index d6df8e739a0..831daf374cc 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49444.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.820", "lastModified": "2025-02-26T07:01:20.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49445.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49445.json index 01406c5363a..b4526fbd01b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49445.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:20.913", "lastModified": "2025-02-26T07:01:20.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49446.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49446.json index d422576cada..e550e3060c6 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49446.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49446.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.010", "lastModified": "2025-02-26T07:01:21.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49447.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49447.json index 004306ea6d7..adef6a278fd 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49447.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49447.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.103", "lastModified": "2025-02-26T07:01:21.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49448.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49448.json index b074ad8b582..6e6c3d02ae1 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49448.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49448.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.200", "lastModified": "2025-02-26T07:01:21.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49449.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49449.json index 649e4abf63b..4b50de51c66 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49449.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49449.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.290", "lastModified": "2025-02-26T07:01:21.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49450.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49450.json index aa61d52e0e3..09dbb95db86 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49450.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49450.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.390", "lastModified": "2025-02-26T07:01:21.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49451.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49451.json index 5b774ad8ae8..6462d7bbfd7 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49451.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49451.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.490", "lastModified": "2025-02-26T07:01:21.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49452.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49452.json index 52dca572ecb..6ba2847177b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49452.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49452.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.587", "lastModified": "2025-02-26T07:01:21.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49453.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49453.json index c94b0119911..ef35e7ab75b 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49453.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.673", "lastModified": "2025-02-26T07:01:21.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49454.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49454.json index 3ffcbcf00dc..9a4b7ffbe2f 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49454.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49454.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.767", "lastModified": "2025-02-26T07:01:21.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49455.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49455.json index b1777f936f7..4c4c802156a 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49455.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.857", "lastModified": "2025-02-26T07:01:21.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49456.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49456.json index 4e6ac727516..5083a6e1461 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49456.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.950", "lastModified": "2025-02-26T07:01:21.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49457.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49457.json index 9ea0f3662f5..1400f01fcb5 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49457.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49457.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.043", "lastModified": "2025-02-26T07:01:22.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49458.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49458.json index 7a023b3c781..9781aa2a8cc 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49458.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.133", "lastModified": "2025-02-26T07:01:22.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49459.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49459.json index 12ef91e9669..1a851e926ca 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49459.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.230", "lastModified": "2025-02-26T07:01:22.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49460.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49460.json index 5a55d90c2c1..453477e0c98 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49460.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.327", "lastModified": "2025-02-26T07:01:22.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49461.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49461.json index 2b81af0c116..a12546502e9 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49461.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49461.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.423", "lastModified": "2025-02-26T07:01:22.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49462.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49462.json index 0a2311d5289..9da86049f85 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49462.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49462.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.517", "lastModified": "2025-02-26T07:01:22.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49463.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49463.json index 049d537f8e9..5ea65f413d6 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49463.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.603", "lastModified": "2025-02-26T07:01:22.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49464.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49464.json index 63c60270625..b2cb97b5c3e 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49464.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.697", "lastModified": "2025-02-27T19:15:44.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49465.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49465.json index ea2180eaf0a..d3086092571 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49465.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49465.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.787", "lastModified": "2025-02-27T19:15:44.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49466.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49466.json index e6182bcfdda..b4105736e24 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49466.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49466.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.880", "lastModified": "2025-02-26T07:01:22.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49467.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49467.json index e67fc5e53c9..4e52df765bc 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49467.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:22.967", "lastModified": "2025-02-26T07:01:22.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49468.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49468.json index e97be6a1bc5..c81add54a67 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49468.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.063", "lastModified": "2025-02-26T07:01:23.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49469.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49469.json index ca65be5ddaa..ace36c97772 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49469.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.157", "lastModified": "2025-02-26T07:01:23.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49470.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49470.json index 201c78832d5..7717cb2c6a0 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49470.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.240", "lastModified": "2025-02-27T19:15:44.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49471.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49471.json index 9d4865734c8..6144bb2c8bc 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49471.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.333", "lastModified": "2025-02-26T07:01:23.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49472.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49472.json index 75f2cf0cb5e..c35b98ae104 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49472.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.423", "lastModified": "2025-02-26T07:01:23.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49473.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49473.json index 73a8cf43662..038447f2157 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49473.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.517", "lastModified": "2025-02-26T07:01:23.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49474.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49474.json index 978350e8140..99b7e4b1f12 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49474.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49474.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.613", "lastModified": "2025-02-27T19:15:44.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49475.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49475.json index 9a5ee47a89b..c33a62355c3 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49475.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.713", "lastModified": "2025-02-26T07:01:23.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49476.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49476.json index 0e4a3fee36a..85f2053deac 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49476.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.800", "lastModified": "2025-02-26T07:01:23.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49477.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49477.json index 7b179eef23f..518a498b386 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49477.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49477.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:23.920", "lastModified": "2025-02-26T07:01:23.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49478.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49478.json index 4971c47cd5e..53f56d236ca 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49478.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49478.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.050", "lastModified": "2025-02-26T07:01:24.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49479.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49479.json index b23b47a35ea..cd17ab41f51 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49479.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49479.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.153", "lastModified": "2025-02-27T19:15:45.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49480.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49480.json index bb47732ecfc..d283ac6c957 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49480.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.243", "lastModified": "2025-02-26T07:01:24.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49481.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49481.json index a58392f07a7..f35f5eb77b7 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49481.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49481.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.340", "lastModified": "2025-02-26T07:01:24.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49482.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49482.json index 126ee429d36..ab3d4ccdb57 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49482.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.433", "lastModified": "2025-02-26T07:01:24.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49483.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49483.json index f3be5f4c4bf..d3c7185ec16 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49483.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.527", "lastModified": "2025-02-26T07:01:24.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49484.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49484.json index 69516eefc88..f911c6b3692 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49484.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49484.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.620", "lastModified": "2025-02-26T07:01:24.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49485.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49485.json index 8da4d5f0f53..548a34c2311 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49485.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.710", "lastModified": "2025-02-26T07:01:24.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49486.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49486.json index 69d94884b15..fe93ab13778 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49486.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.803", "lastModified": "2025-02-26T07:01:24.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49487.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49487.json index be1b5d7f795..8cbc6c21dec 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49487.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.897", "lastModified": "2025-02-26T07:01:24.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49488.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49488.json index adb6899fda9..3d53fa48f9f 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49488.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:24.990", "lastModified": "2025-02-26T07:01:24.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49490.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49490.json index 5211a947725..2151c7339df 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49490.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49490.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.183", "lastModified": "2025-02-26T07:01:25.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49491.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49491.json index 8a8aabc43ef..e98d1f971b1 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49491.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.280", "lastModified": "2025-02-26T07:01:25.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49492.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49492.json index 63a8793da37..c53a703e9f9 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49492.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49492.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.410", "lastModified": "2025-02-26T07:01:25.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49493.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49493.json index 12e736612e8..e41df9d5be0 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49493.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49493.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.520", "lastModified": "2025-02-27T19:15:45.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49494.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49494.json index a5fc433c214..9f4b7ff3952 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49494.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49494.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.613", "lastModified": "2025-02-26T07:01:25.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49495.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49495.json index 9c6d03ede58..102a707627a 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49495.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.707", "lastModified": "2025-02-26T07:01:25.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49496.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49496.json index d866e5158b3..ff367cb6181 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49496.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49496.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.800", "lastModified": "2025-02-26T07:01:25.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49497.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49497.json index a49e5f001da..08b72305ddb 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49497.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49497.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.893", "lastModified": "2025-02-26T07:01:25.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49498.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49498.json index bf4e5f25470..1696ca23f24 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49498.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49498.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:25.987", "lastModified": "2025-02-26T07:01:25.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49499.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49499.json index cab62707ce6..ea0ecf707e0 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49499.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49499.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.077", "lastModified": "2025-02-26T07:01:26.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49500.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49500.json index d92bb5c1e43..e72174c0c98 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49500.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49500.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.163", "lastModified": "2025-02-26T07:01:26.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json index 5083610f3d2..66535d37eca 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49501.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.257", "lastModified": "2025-02-27T19:15:45.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49502.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49502.json index 32ddf368c4c..a9da9fe4180 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49502.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.353", "lastModified": "2025-02-26T07:01:26.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49503.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49503.json index 83dc5a82ae2..01402f14b7f 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49503.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49503.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.447", "lastModified": "2025-02-26T07:01:26.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49504.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49504.json index 954069289b0..3e03377021c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49504.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49504.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.543", "lastModified": "2025-02-26T07:01:26.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49505.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49505.json index 4ad4658db95..e3b04583ae8 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49505.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.633", "lastModified": "2025-02-27T18:15:26.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49506.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49506.json index 2f1ac1e51f5..9b80f18fe30 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49506.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.737", "lastModified": "2025-02-26T07:01:26.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49507.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49507.json index 3702cccb975..bcbeea86a01 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49507.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.830", "lastModified": "2025-02-26T07:01:26.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49508.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49508.json index 079e0fecc67..5feb95eeaaf 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49508.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49508.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:26.923", "lastModified": "2025-02-26T07:01:26.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49509.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49509.json index 2871c645bfa..4f2ade01ba6 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49509.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49509.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.017", "lastModified": "2025-02-26T07:01:27.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49510.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49510.json index 9615a041679..e084b9d8756 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49510.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49510.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.107", "lastModified": "2025-02-26T07:01:27.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49511.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49511.json index 258f1e25239..fb52004b736 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49511.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49511.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.193", "lastModified": "2025-02-26T07:01:27.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49512.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49512.json index 9872fcba73e..314e71c196d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49512.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49512.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.287", "lastModified": "2025-02-26T07:01:27.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49513.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49513.json index d23bc7d23ce..af981cea6fc 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49513.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49513.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.380", "lastModified": "2025-02-26T07:01:27.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49514.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49514.json index 54bebb7ea36..fa7d97c21da 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49514.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49514.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.470", "lastModified": "2025-02-26T07:01:27.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49515.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49515.json index 1e38126dc27..780cf01bfad 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49515.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.567", "lastModified": "2025-02-26T07:01:27.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49516.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49516.json index a21e49c625f..72d5040e8a2 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49516.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49516.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.653", "lastModified": "2025-02-26T07:01:27.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49517.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49517.json index 7b8b732dd83..ed420016364 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49517.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.740", "lastModified": "2025-02-26T07:01:27.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49518.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49518.json index 9aa715a8541..2d3e0002d47 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49518.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49518.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.837", "lastModified": "2025-02-26T07:01:27.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49519.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49519.json index 9746c426420..9085df055bb 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49519.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49519.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:27.923", "lastModified": "2025-02-26T07:01:27.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49520.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49520.json index 4459ab77d33..dd44e1e1090 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49520.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.017", "lastModified": "2025-02-26T07:01:28.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49521.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49521.json index 1ef13974aae..58acf91b552 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49521.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.113", "lastModified": "2025-02-26T07:01:28.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49522.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49522.json index c35ad704ca4..ff31dc80a8d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49522.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.210", "lastModified": "2025-02-26T07:01:28.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49523.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49523.json index 18e33e334ec..fd82eee969d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49523.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.310", "lastModified": "2025-02-26T07:01:28.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json index 03a197619f8..033e81f29d5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.407", "lastModified": "2025-02-27T19:15:45.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49525.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49525.json index 66d06171fbd..b7dfc5fffac 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49525.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49525.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.500", "lastModified": "2025-02-26T07:01:28.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49526.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49526.json index bac16989bb6..3cc3603c951 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49526.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49526.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.593", "lastModified": "2025-02-26T07:01:28.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json index 66d46b58b80..b23c72b2eba 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.690", "lastModified": "2025-02-26T07:01:28.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49528.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49528.json index bf70cb91b50..caca8f8745c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49528.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.780", "lastModified": "2025-02-26T07:01:28.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json index e6015220ddd..379b5a3e491 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.873", "lastModified": "2025-02-26T07:01:28.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json index 624185c1c90..0bc73325585 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.967", "lastModified": "2025-02-26T07:01:28.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49531.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49531.json index d448d52a673..2fc04126509 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49531.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.067", "lastModified": "2025-02-26T07:01:29.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json index b64b5ac43d0..f2fd6054d63 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.170", "lastModified": "2025-02-26T07:01:29.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49533.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49533.json index 7286a242359..7eb6654e383 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49533.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49533.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.293", "lastModified": "2025-02-26T07:01:29.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json index 71cd4447c40..8e0a953ee49 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.400", "lastModified": "2025-02-26T07:01:29.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49535.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49535.json index 0e7ac5666fd..1827be11e6c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49535.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.490", "lastModified": "2025-02-27T19:15:45.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json index 8e8556efba0..d0a70df0976 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.580", "lastModified": "2025-02-26T07:01:29.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49537.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49537.json index cd857cf8f58..278027c9f23 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49537.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49537.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.667", "lastModified": "2025-02-26T07:01:29.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json index d25f3b40966..9615b50a7db 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.760", "lastModified": "2025-02-26T07:01:29.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49539.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49539.json index a96532c0cde..a2b0c795086 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49539.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.857", "lastModified": "2025-02-26T07:01:29.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json index f5965654dd5..28b1a4a9d43 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.947", "lastModified": "2025-02-26T07:01:29.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json index 85243a91ec5..936c5167b51 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.043", "lastModified": "2025-02-26T07:01:30.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json index ee44bfd5a3a..781ed0b9113 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.133", "lastModified": "2025-02-26T07:01:30.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49543.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49543.json index 6203734e118..290572b6cea 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49543.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49543.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.220", "lastModified": "2025-02-26T07:01:30.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json index d86efcca80c..c39e34def8c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.313", "lastModified": "2025-02-26T07:01:30.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49545.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49545.json index 1bb6fe7153a..814b7a5563b 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49545.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49545.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.410", "lastModified": "2025-02-26T07:01:30.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json index 8ea6ffb50f2..3b10cf05529 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.500", "lastModified": "2025-02-26T07:01:30.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json index e7126e9a243..84c6430a80e 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.590", "lastModified": "2025-02-26T07:01:30.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json index 488ed8c959a..c169bc0f1b5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.683", "lastModified": "2025-02-26T07:01:30.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json index 9cd9f682246..4dffbd270eb 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.773", "lastModified": "2025-02-26T07:01:30.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json index 180f46cbbce..c162e897e64 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.863", "lastModified": "2025-02-26T07:01:30.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json index afc3a549ba4..a3022f00b43 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.950", "lastModified": "2025-02-26T07:01:30.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49552.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49552.json index 1035cf18a2d..fc26fb786d8 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49552.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49552.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.040", "lastModified": "2025-02-26T07:01:31.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49553.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49553.json index b4cfb1649e0..5b0e1772fe7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49553.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49553.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.133", "lastModified": "2025-02-26T07:01:31.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49554.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49554.json index 7d524bbbf99..409ae2e8b4b 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49554.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49554.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.223", "lastModified": "2025-02-26T07:01:31.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49555.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49555.json index 4415b96851d..b301ad40408 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49555.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49555.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.313", "lastModified": "2025-02-26T07:01:31.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49556.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49556.json index 71c2989acb8..ebea279cab2 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49556.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49556.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.407", "lastModified": "2025-02-26T07:01:31.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49557.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49557.json index cb2ce614942..5d22c4e6d36 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49557.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49557.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.503", "lastModified": "2025-02-26T07:01:31.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49558.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49558.json index 741806100a9..b5f16380d6a 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49558.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.597", "lastModified": "2025-02-26T07:01:31.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49559.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49559.json index 50c49199f53..a531a3f89b9 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49559.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49559.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.687", "lastModified": "2025-02-26T07:01:31.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json index 2542a23195e..59b54dcb7d1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.780", "lastModified": "2025-02-26T07:01:31.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49561.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49561.json index dfc5c671d8f..59b855f01b4 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49561.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49561.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.877", "lastModified": "2025-02-26T07:01:31.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49562.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49562.json index 0218e7aeb6d..aad6c08e953 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49562.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.970", "lastModified": "2025-02-26T07:01:31.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json index f1a115ee689..cf4b4cc24a1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.060", "lastModified": "2025-02-26T07:01:32.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json index bb2b9d6804b..9a8db132f4d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.150", "lastModified": "2025-02-26T07:01:32.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49565.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49565.json index 2105e1fdc04..692309504f7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49565.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49565.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.240", "lastModified": "2025-02-26T07:01:32.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json index 4602249e0be..d2f07950426 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.333", "lastModified": "2025-02-26T07:01:32.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json index 52667a4d2fb..dbdaafc52e4 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.420", "lastModified": "2025-02-26T07:01:32.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json index c3b394b1103..10837f071f1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.517", "lastModified": "2025-02-26T07:01:32.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json index ff9123149ef..f093e182341 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.607", "lastModified": "2025-02-26T07:01:32.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json index 9b4f3369e40..a73fe2bb1db 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.693", "lastModified": "2025-02-26T07:01:32.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json index 4bc7045cf61..3354d282b7e 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.780", "lastModified": "2025-02-26T07:01:32.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json index fb57042515a..6cd0e1313d5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.877", "lastModified": "2025-02-26T07:01:32.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json index 542edca315a..465e30f8811 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.970", "lastModified": "2025-02-26T07:01:32.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json index 2726dc71ad8..5f18248f0a1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.063", "lastModified": "2025-02-26T07:01:33.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json index ed06563453f..43342be320f 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.157", "lastModified": "2025-02-26T07:01:33.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json index c51a7cc308f..fa0e7270664 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.243", "lastModified": "2025-02-26T07:01:33.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json index 43866359ee8..0da83d45154 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.333", "lastModified": "2025-02-26T07:01:33.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json index 6866c06c30e..c2238585d94 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.433", "lastModified": "2025-02-26T07:01:33.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json index 91a23801e92..d9e38f9eb21 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.520", "lastModified": "2025-02-26T07:01:33.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json index c3d69925720..103341a8725 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.610", "lastModified": "2025-02-26T07:01:33.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49581.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49581.json index e9a810b3cd8..e54f9056165 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49581.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.703", "lastModified": "2025-02-26T07:01:33.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json index 00b91f7f8e4..ca42fb3f5d7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.807", "lastModified": "2025-02-26T07:01:33.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json index ec4b18e706f..8e5258681e0 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.897", "lastModified": "2025-02-26T07:01:33.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49584.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49584.json index 99f2628bae9..5b96e691c69 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49584.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49584.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.987", "lastModified": "2025-02-26T07:01:33.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json index 40695b8b855..c3f8686b09a 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.080", "lastModified": "2025-02-26T07:01:34.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json index 062a996b20d..4b021d1c8db 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.167", "lastModified": "2025-02-26T07:01:34.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json index c91fd6cbd3d..cddb36902cc 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.260", "lastModified": "2025-02-26T07:01:34.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json index 8813cb4c88c..15e797fd815 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.367", "lastModified": "2025-02-26T07:01:34.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json index 6b14f12d9c5..250ff72078e 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.470", "lastModified": "2025-02-26T07:01:34.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json index c37047499df..72190c15bd0 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.573", "lastModified": "2025-02-26T07:01:34.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json index dfbe5fdcd10..4679ddae7ad 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.667", "lastModified": "2025-02-26T07:01:34.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49592.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49592.json index e8013762768..06c71002dbc 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49592.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.760", "lastModified": "2025-02-26T07:01:34.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json index f766bd4c1b9..53bfc0a680f 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.853", "lastModified": "2025-02-26T07:01:34.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json index 8f073565301..448ca2d0172 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.947", "lastModified": "2025-02-26T07:01:34.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json index 9fdd391b7ff..0098c137b45 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.040", "lastModified": "2025-02-26T07:01:35.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json index 3f07caac815..59dc1083876 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.133", "lastModified": "2025-02-26T07:01:35.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json index 7a2e5fbcddb..3382a78dafb 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.220", "lastModified": "2025-02-26T07:01:35.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json index 81927359ff5..73e3360a7d7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.310", "lastModified": "2025-02-26T07:01:35.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json index b7efd84e36f..067a2b56da9 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.403", "lastModified": "2025-02-26T07:01:35.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49600.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49600.json index 1395707123a..10d2cc6e1c9 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49600.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.497", "lastModified": "2025-02-26T07:01:35.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49601.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49601.json index 95fd57670f2..495e7118238 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49601.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49601.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.603", "lastModified": "2025-02-26T07:01:35.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49602.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49602.json index b6cc16223ed..d10ef1fff75 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49602.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.717", "lastModified": "2025-02-26T07:01:35.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49603.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49603.json index 8e3174dfb2a..7e1f3a9ef0e 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49603.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.817", "lastModified": "2025-02-26T07:01:35.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49604.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49604.json index 56995cc69b3..20f98264c6b 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49604.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.910", "lastModified": "2025-02-26T07:01:35.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49605.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49605.json index ac0db72b795..fba46d77d98 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49605.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49605.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.000", "lastModified": "2025-02-26T07:01:36.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49606.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49606.json index 320b362ad58..1fbfeeeec95 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49606.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.093", "lastModified": "2025-02-26T07:01:36.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49607.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49607.json index 0e4b4ef6444..17b8a4bf171 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49607.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49607.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.180", "lastModified": "2025-02-26T07:01:36.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49608.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49608.json index 11eb5461772..4226d6b8e56 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49608.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49608.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.270", "lastModified": "2025-02-26T07:01:36.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49609.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49609.json index d9e90c16dea..e7b6eaf4ac6 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49609.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49609.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.363", "lastModified": "2025-02-26T07:01:36.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49610.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49610.json index d209b14df0b..8dab68c4123 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49610.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49610.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.463", "lastModified": "2025-02-26T07:01:36.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49611.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49611.json index a110cf80c33..df1fa217363 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49611.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49611.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.553", "lastModified": "2025-02-26T07:01:36.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49612.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49612.json index 381f3b07dd5..e565d3334c9 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49612.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49612.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.653", "lastModified": "2025-02-26T07:01:36.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49613.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49613.json index 1b224819a38..74b2a4037ad 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49613.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49613.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.747", "lastModified": "2025-02-26T07:01:36.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49615.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49615.json index 167aa03cd36..bcb48064e78 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49615.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.927", "lastModified": "2025-02-26T07:01:36.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49616.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49616.json index 477b358bdec..c0e26b034b0 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49616.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49616.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.017", "lastModified": "2025-02-26T07:01:37.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49617.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49617.json index d0e19010766..f40f681028c 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49617.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49617.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.107", "lastModified": "2025-02-26T07:01:37.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49618.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49618.json index 5383d6eb21c..80b879b0295 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49618.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49618.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.197", "lastModified": "2025-02-26T07:01:37.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49619.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49619.json index 56e84639466..16c5f153dc9 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49619.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49619.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.290", "lastModified": "2025-02-26T07:01:37.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49620.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49620.json index 283b69af5ea..be37f24bc93 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49620.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49620.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.387", "lastModified": "2025-02-26T07:01:37.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49621.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49621.json index 80b16c86027..555c66e47a5 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49621.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49621.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.487", "lastModified": "2025-02-26T07:01:37.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49622.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49622.json index 2660cbfa1a2..9181f4962dd 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49622.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49622.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.580", "lastModified": "2025-02-27T19:15:45.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49623.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49623.json index 4cff7674bed..23ba5e7cfb1 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49623.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49623.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.663", "lastModified": "2025-02-26T07:01:37.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49624.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49624.json index aaf390d7ac6..cd469a438ea 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49624.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.753", "lastModified": "2025-02-26T07:01:37.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49625.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49625.json index 77f580c5c54..9fadc8c45b1 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49625.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49625.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.847", "lastModified": "2025-02-26T07:01:37.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49626.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49626.json index 356ed3f9d2d..4a198b0edaa 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49626.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:37.937", "lastModified": "2025-02-27T19:15:45.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49627.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49627.json index d3ba40729ea..5aac2575ee5 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49627.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49627.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.030", "lastModified": "2025-02-26T07:01:38.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49628.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49628.json index 018648325db..c8c9c679e0a 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49628.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.117", "lastModified": "2025-02-26T07:01:38.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49629.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49629.json index 186a4b4f27c..42e66ea6342 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49629.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49629.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.200", "lastModified": "2025-02-26T07:01:38.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49630.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49630.json index 7f33f1c179a..432d8e39b8e 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49630.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.290", "lastModified": "2025-02-26T07:01:38.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49631.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49631.json index 9ca4f52d267..53d817d7742 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49631.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.380", "lastModified": "2025-02-26T07:01:38.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49632.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49632.json index e0f5b2100bb..571dd98e81a 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49632.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49632.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.470", "lastModified": "2025-02-26T07:01:38.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49633.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49633.json index 90d0c39d070..802de691c6b 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49633.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.560", "lastModified": "2025-02-26T07:01:38.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49634.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49634.json index f29b07b0e5b..524a83c0138 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49634.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.647", "lastModified": "2025-02-26T07:01:38.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49635.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49635.json index 0fe5d9fd15c..204e28c0a55 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49635.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49635.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.733", "lastModified": "2025-02-26T07:01:38.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49636.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49636.json index 545e7cddee8..7a41e537d50 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49636.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49636.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.827", "lastModified": "2025-02-26T07:01:38.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49637.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49637.json index 988e87dad02..5bb26e6e681 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49637.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49637.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:38.920", "lastModified": "2025-02-26T07:01:38.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49638.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49638.json index 06fa510f31d..b3c0425d882 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49638.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49638.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.010", "lastModified": "2025-02-26T07:01:39.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49639.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49639.json index 80a12c1d712..ea29d38e16e 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49639.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49639.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.100", "lastModified": "2025-02-26T07:01:39.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49640.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49640.json index 5c9c3bac1a6..45ee6847bb5 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49640.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49640.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.193", "lastModified": "2025-02-26T07:01:39.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49641.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49641.json index e8f9556dc02..6f0ca570c4a 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49641.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49641.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.280", "lastModified": "2025-02-26T07:01:39.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49642.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49642.json index 591372397c4..a48c2867280 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49642.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.373", "lastModified": "2025-02-26T07:01:39.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49643.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49643.json index f97872f9c8a..937b616f191 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49643.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49643.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.467", "lastModified": "2025-02-26T07:01:39.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49644.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49644.json index 14998451098..906bca53f02 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49644.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49644.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.567", "lastModified": "2025-02-26T07:01:39.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49645.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49645.json index 00f743486d5..4a89bf8e876 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49645.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49645.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.677", "lastModified": "2025-02-26T07:01:39.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49646.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49646.json index b2689e8b34a..975531ddae2 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49646.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49646.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.777", "lastModified": "2025-02-26T07:01:39.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49647.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49647.json index 4a372861635..03a90b23232 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49647.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49647.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.863", "lastModified": "2025-02-27T19:15:45.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49648.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49648.json index b108e3db5d1..d571667995c 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49648.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49648.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:39.957", "lastModified": "2025-02-26T07:01:39.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49649.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49649.json index 29e74b2209d..dd296d463a8 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49649.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49649.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.050", "lastModified": "2025-02-26T07:01:40.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49650.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49650.json index d5b40b522c4..37554193193 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49650.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49650.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.150", "lastModified": "2025-02-26T07:01:40.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49651.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49651.json index 660ac650ad3..8eb859d001d 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49651.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.237", "lastModified": "2025-02-27T19:15:46.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49652.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49652.json index df2ab0c135d..1f1c4b82653 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49652.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.323", "lastModified": "2025-02-26T07:01:40.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49653.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49653.json index 256fd74fa8a..020176c7678 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49653.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.420", "lastModified": "2025-02-26T07:01:40.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49654.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49654.json index be64ecc30ce..b4c7f2e095e 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49654.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49654.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.510", "lastModified": "2025-02-26T07:01:40.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49655.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49655.json index d35a7578750..16306885ea6 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49655.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49655.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.600", "lastModified": "2025-02-26T07:01:40.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49656.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49656.json index b969f527f56..65a91e9ca02 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49656.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49656.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.683", "lastModified": "2025-02-26T07:01:40.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49657.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49657.json index edf1b1fbd81..ca469f41b0c 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49657.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.777", "lastModified": "2025-02-26T07:01:40.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49658.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49658.json index 0077b039894..c582dcf17ef 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49658.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49658.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.867", "lastModified": "2025-02-26T07:01:40.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49659.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49659.json index 6c0189ced0f..84e40fb9eb4 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49659.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:40.957", "lastModified": "2025-02-26T07:01:40.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49661.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49661.json index 4540edd5ea8..3196a6e283b 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49661.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49661.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.137", "lastModified": "2025-02-26T07:01:41.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49662.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49662.json index 07bdf09df10..26a6f7e0f8d 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49662.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49662.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.230", "lastModified": "2025-02-26T07:01:41.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49663.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49663.json index bb0b993a78b..8895de5f04c 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49663.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.323", "lastModified": "2025-02-26T07:01:41.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49664.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49664.json index 08c8667a954..a5cb3d82561 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49664.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49664.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.420", "lastModified": "2025-02-26T07:01:41.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49665.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49665.json index 9a101c7b852..d7bad7f1bd8 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49665.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49665.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.513", "lastModified": "2025-02-26T07:01:41.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49666.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49666.json index aa6d428dd88..f42cdee5a6d 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49666.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49666.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.600", "lastModified": "2025-02-26T07:01:41.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49667.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49667.json index 05aca186429..7482a847ed1 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49667.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49667.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.687", "lastModified": "2025-02-27T19:15:46.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49668.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49668.json index 573fca44ad8..f3ab88d3673 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49668.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49668.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.780", "lastModified": "2025-02-26T07:01:41.780", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49669.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49669.json index 86b2066bcc1..43a8889b5b0 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49669.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49669.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.870", "lastModified": "2025-02-27T18:15:26.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49670.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49670.json index fb8b512f488..ce2da7761e2 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49670.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49670.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:41.953", "lastModified": "2025-02-26T07:01:41.953", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49671.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49671.json index 15e40f4298f..71840baa254 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49671.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49671.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.043", "lastModified": "2025-02-26T07:01:42.043", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49672.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49672.json index 1f7972ce48d..a4ead131b35 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49672.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49672.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.130", "lastModified": "2025-02-26T07:01:42.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49673.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49673.json index a851d62d30b..ffc2973bb47 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49673.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49673.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.223", "lastModified": "2025-02-26T07:01:42.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49674.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49674.json index c913e17e9c6..9544e514ae4 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49674.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49674.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.320", "lastModified": "2025-02-26T07:01:42.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49675.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49675.json index 4d60b6dc09e..a13ab9dd866 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49675.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49675.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.413", "lastModified": "2025-02-26T07:01:42.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49676.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49676.json index d13985e8558..b248960bbc1 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49676.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49676.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.500", "lastModified": "2025-02-26T07:01:42.500", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49677.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49677.json index 9b40a044b50..5cbab00ddc6 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49677.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49677.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.587", "lastModified": "2025-02-26T07:01:42.587", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49678.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49678.json index a018d394f3f..93ae806c876 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49678.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49678.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.680", "lastModified": "2025-02-26T07:01:42.680", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49679.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49679.json index 5e27d431c48..3617f26e28f 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49679.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49679.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.773", "lastModified": "2025-02-26T07:01:42.773", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49680.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49680.json index 3441211780f..835a15dc4de 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49680.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49680.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.867", "lastModified": "2025-02-26T07:01:42.867", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49681.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49681.json index 30ce3b8c746..0ab7327bc0b 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49681.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:42.963", "lastModified": "2025-02-26T07:01:42.963", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49682.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49682.json index e627bde8f4e..d64f4420a12 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49682.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49682.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.063", "lastModified": "2025-02-26T07:01:43.063", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49683.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49683.json index a88ba9b890c..c6a08b13900 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49683.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49683.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.153", "lastModified": "2025-02-26T07:01:43.153", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49684.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49684.json index 8a5e76debee..7c056ae2502 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49684.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49684.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.247", "lastModified": "2025-02-26T07:01:43.247", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49685.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49685.json index f22b015ab83..780784d21eb 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49685.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49685.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.340", "lastModified": "2025-02-27T19:15:46.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49686.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49686.json index f4886987258..0fa2b2d7c96 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49686.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.437", "lastModified": "2025-02-26T07:01:43.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49687.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49687.json index 3b1559dfb25..5317596bdda 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49687.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.527", "lastModified": "2025-02-26T07:01:43.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49688.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49688.json index 78abef4807c..a6b64f7e4a4 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49688.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49688.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.617", "lastModified": "2025-02-26T07:01:43.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49691.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49691.json index 12de4baf30e..0b9ebc0480e 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49691.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.893", "lastModified": "2025-02-26T07:01:43.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49692.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49692.json index e0961244f92..b1eb5f2940f 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49692.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49692.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:43.990", "lastModified": "2025-02-26T07:01:43.990", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49693.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49693.json index 93b3c5a6a81..631b59f6707 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49693.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49693.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.080", "lastModified": "2025-02-26T07:01:44.080", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49695.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49695.json index c750a0db777..af055598767 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49695.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49695.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.260", "lastModified": "2025-02-27T19:15:46.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json index a068aa4ea70..ef0dddcb575 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.357", "lastModified": "2025-02-27T19:15:46.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49697.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49697.json index e8fb1dd69f9..4c41f47df3d 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49697.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49697.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.450", "lastModified": "2025-02-26T07:01:44.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49698.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49698.json index a433d3df1c8..be719dca860 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49698.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.547", "lastModified": "2025-02-26T07:01:44.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49699.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49699.json index 938cabd1a1a..9fbbbc19952 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49699.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49699.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.640", "lastModified": "2025-02-26T07:01:44.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json index 00cf6eac03e..28c692f340f 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.740", "lastModified": "2025-02-27T19:15:46.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49701.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49701.json index b3be2ab685f..18b056fa1d1 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49701.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49701.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.930", "lastModified": "2025-02-26T07:01:44.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49702.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49702.json index 1419e574988..eb5ad814619 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49702.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49702.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:45.827", "lastModified": "2025-02-26T07:01:45.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49703.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49703.json index 65d4a2976af..a409ecdd48b 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49703.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49703.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:45.947", "lastModified": "2025-02-26T07:01:45.947", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49704.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49704.json index 772acfd6d84..c58fe005c2d 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49704.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49704.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.060", "lastModified": "2025-02-26T07:01:46.060", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49705.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49705.json index 5e181518bd7..5fb97763d2b 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49705.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.177", "lastModified": "2025-02-26T07:01:46.177", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49706.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49706.json index 05a6bf1600f..86e189b659f 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49706.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49706.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.403", "lastModified": "2025-02-26T07:01:46.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49707.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49707.json index 53cf45de36f..d843a50a27d 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49707.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49707.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.500", "lastModified": "2025-02-26T07:01:46.500", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49708.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49708.json index 6ec0538afb6..e2e95a7029e 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49708.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49708.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.607", "lastModified": "2025-02-26T07:01:46.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49709.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49709.json index 0fff5831e15..3cdb84e959a 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49709.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49709.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.710", "lastModified": "2025-02-26T07:01:46.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49710.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49710.json index e8feffaea5f..8b9fc808791 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49710.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49710.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.800", "lastModified": "2025-02-26T07:01:46.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json index 001295d79b5..3ac25941462 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49711.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.893", "lastModified": "2025-02-27T19:15:47.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49712.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49712.json index e77d27bc224..627a6032983 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49712.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49712.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:46.987", "lastModified": "2025-02-26T07:01:46.987", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49713.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49713.json index 91985dd9233..aebaf020d01 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49713.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49713.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.083", "lastModified": "2025-02-26T07:01:47.083", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49714.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49714.json index ea9353ef91d..03e9e2af6aa 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49714.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.170", "lastModified": "2025-02-26T07:01:47.170", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49715.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49715.json index a97d2c8602b..1b15762fc72 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49715.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49715.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.257", "lastModified": "2025-02-26T07:01:47.257", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49716.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49716.json index 9be50485d44..7ac420e140b 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49716.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49716.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.350", "lastModified": "2025-02-26T07:01:47.350", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49721.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49721.json index b64cac1efe8..db22e6fd784 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49721.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49721.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.793", "lastModified": "2025-02-26T07:01:47.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49722.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49722.json index ed2aa643084..a9456a19626 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49722.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49722.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.887", "lastModified": "2025-02-26T07:01:47.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49723.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49723.json index 727298fa0c5..dd904873e8e 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49723.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49723.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:47.980", "lastModified": "2025-02-26T07:01:47.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49724.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49724.json index c879669e4ac..d370e296944 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49724.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49724.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:48.073", "lastModified": "2025-02-26T07:01:48.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49725.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49725.json index d54637c3008..643ba526b24 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49725.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49725.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:48.167", "lastModified": "2025-02-26T07:01:48.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49726.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49726.json index fa19d0d705a..b6be6e83d90 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49726.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:48.257", "lastModified": "2025-02-26T07:01:48.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json index c6c429d915b..4ed783fe03e 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:48.620", "lastModified": "2025-02-27T19:15:47.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49732.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49732.json index b4079097b11..3b10fb4a8f8 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49732.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49732.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T15:15:17.843", "lastModified": "2025-02-26T15:15:17.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json index b2fde50035d..32aa0204f64 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@forgerock.com", "published": "2024-03-27T18:15:08.237", "lastModified": "2024-11-21T07:37:26.337", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json index c8917752a27..e7b77f5a54b 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1111.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-24T07:15:08.213", "lastModified": "2024-11-21T07:38:28.773", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,30 +140,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xjd2020:fastcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.1.5", + "matchCriteriaId": "6CF200B4-F238-440D-A1D3-56042183AAA9" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/dianbuapp_admin/fastcms/issues/I8ERNV", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.266126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.266126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://gitee.com/dianbuapp_admin/fastcms/issues/I8ERNV", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.266126", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.266126", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json index 362441f923f..7aefb4c74e1 100644 --- a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2023-01-20T07:15:14.490", "lastModified": "2024-11-21T07:40:22.940", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -69,16 +69,6 @@ "value": "CWE-293" } ] - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-20" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json index 5282f5b2646..b56794604ce 100644 --- a/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20118.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2023-04-13T07:15:21.080", "lastModified": "2025-03-04T02:00:01.987", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -72,11 +72,11 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-77" } ] } @@ -91,13 +91,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv016_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "54F4D39E-DA7A-4B04-B6E5-0C7988588640" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv016_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "2368A32B-7EB2-4FC0-B01B-64798BB3F1EF" + "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23" } ] }, @@ -123,13 +118,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0" + "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C" } ] }, @@ -155,13 +145,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE" + "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E" } ] }, @@ -187,13 +172,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv082_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "36C05CAC-0969-4EDC-80F6-494B0E4EDCF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv082_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "B7203F5C-F24C-43FE-968D-FD4FD967EDC9" + "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA" } ] }, @@ -219,13 +199,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9" + "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF" } ] }, @@ -251,13 +226,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", - "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7" + "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0" } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21001.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21001.json index 40a1562449b..88fdc4625ae 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21001.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In onContextItemSelected of NetworkProviderSettings.java, there is a possible way for users to change the Wi-Fi settings of other users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-237672190" + }, + { + "lang": "es", + "value": "En el m\u00e9todo onContextItemSelected de NetworkProviderSettings.java existe una manera de que a los usuarios cambien las configuraciones de Wi-Fi de otros usuarios debido a una falta de verificaci\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios adicionales de ejecuci\u00f3n. El usuario no necesita interactuar para explotar esta vulnerabilidad.\n\nProducto: Android\nVersiones: Android-13\nIdentificador de Android: A-237672190" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json index 39bb873e5d8..0ca88fcbeaa 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21674", "sourceIdentifier": "secure@microsoft.com", "published": "2023-01-10T22:15:16.307", - "lastModified": "2024-11-21T07:43:24.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json index bf4fb1262a9..664a9339ddd 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json index 90ea976caa9..7b9f7cc7b94 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json index 3352f06fabf..c6395388c1a 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:13.450", "lastModified": "2024-11-21T07:43:45.317", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23730.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23730.json index 15c0ebefc90..6b406e66b1d 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23730.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23730.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23738.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23738.json index addde285da7..cacd5db2e4f 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23738.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23738.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json index 5c394e2b126..d983a373a59 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23895.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:21.920", "lastModified": "2024-12-09T13:15:21.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json index 92b21eb5f3d..20975256140 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24860.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json index 40c102b1899..95fd3acce43 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24879.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json index aadc99cca10..07253d9daa3 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24882.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json index 2d253a2f23f..56971688d19 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json index 8ccb1a5bc6a..4db04e0ca9d 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24923.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json index 93875d096e4..a444abb3d75 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json index 422f6f734cc..47173928e78 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json index e8697cf7cd0..b9874a8244a 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-03-16T01:15:46.780", "lastModified": "2024-11-21T07:49:22.837", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json index 8bcaf0549a4..f28debdba0d 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25681", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-05T20:16:00.857", - "lastModified": "2024-11-21T07:49:55.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,22 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:spectrum_virtualize:8.5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0569CAF4-BA9D-4E4D-91CF-2E159A50D71C" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247033", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/6962203", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247033", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/6962203", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json index e0d7d992626..67d606e0213 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:10.973", "lastModified": "2025-01-29T16:15:39.253", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json index fec10498cad..2a1e4731f71 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T22:15:10.127", "lastModified": "2024-11-21T07:51:40.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json index 73ea0405bca..082006034ae 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T22:15:10.593", "lastModified": "2024-11-21T07:52:57.293", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json index b5d5a89627e..95267179ed2 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27524.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27524", "sourceIdentifier": "security@apache.org", "published": "2023-04-24T16:15:07.843", - "lastModified": "2024-11-21T07:53:05.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json index f9b056aea05..392d6533132 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "HPE OneView virtual appliance \"Migrate server hardware\" option may expose sensitive information in an HPE OneView support dump" + }, + { + "lang": "es", + "value": "La opci\u00f3n \"Migrate server hardware\" de los appliance virtuales HPE OneView puede exponer informaci\u00f3n sensible en un HPE volcado de soporte de OneView." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json index 3cbafef7ac0..415d4479a9c 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json index 5bca8d0cc15..d7b1a61bb94 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json index dc95892de62..b2db3335ba9 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json index 865b886d4c8..fb58079ab97 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json index 05b8be66be0..6c5f4ecd828 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28494.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T07:15:41.913", "lastModified": "2024-11-21T07:55:13.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json index dc0e78aefcc..3d727529de1 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json index c9e888e2396..2baafb4bb3c 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29053.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json index f12d83bc85e..a57986a4d45 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json index 41dd396d5ab..80a6c352ed0 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json index 70fe3d41b78..8fc502c0f52 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json index 8d0ee5dec82..922908269c3 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json index 273900788f3..b402f4d5b7e 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-04-11T05:15:07.393", "lastModified": "2024-11-21T07:57:10.087", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30630.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30630.json index 479551d2010..783da6adbab 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30630.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30630.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly)." + }, + { + "lang": "es", + "value": "Dmidecode antes de la versi\u00f3n 3.5 permite que el comando -dump-bin sobrescriba un archivo local. Esto tiene relevancia en seguridad porque, por ejemplo, la ejecuci\u00f3n de Dmidecode mediante `sudo` resulta plausible. NOTA: Terceros han indicado que la correcci\u00f3n implementada en la versi\u00f3n 3.5 no aborda adecuadamente la vulnerabilidad. El argumento es que el parche propuesto previene que dmidecode escriba en un archivo existente. Sin embargo, hay m\u00faltiples vectores de ataque que no requieren sobreescritura de un archivo existente para lograr una escalada de privilegios similar (por ejemplo, crear un nuevo archivo en /etc/cron.hourly)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32762.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32762.json index 3e2efd3b7dd..344eaccc724 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32762.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32762.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-05-28T23:15:09.570", "lastModified": "2024-11-21T08:03:59.967", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -68,6 +68,21 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, { "nodes": [ { @@ -77,8 +92,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9.0", "versionEndExcluding": "5.15.14", - "matchCriteriaId": "006030F9-35BF-489D-8C3F-14ECF93518C3" + "matchCriteriaId": "2E4BEFC6-2BE4-4E9E-8357-AE2243D6A6E5" }, { "vulnerable": true, @@ -116,7 +132,10 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.qt-project.org/pipermail/announce/2023-May/000414.html", @@ -142,7 +161,10 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.qt-project.org/pipermail/announce/2023-May/000414.html", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json index f573f0864b4..90c1d5b943a 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33131.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json index 92518cbae39..3e07b13bede 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json index a1d385cac2c..ac96271bfa4 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33148.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json index 54c27e9b9b9..071319305e5 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33150.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json index 3092658293c..e1e33e2eabe 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33157.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json index d27ae1f9f81..749065f35db 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33246", "sourceIdentifier": "security@apache.org", "published": "2023-05-24T15:15:09.553", - "lastModified": "2025-02-13T17:16:33.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -157,11 +157,17 @@ }, { "url": "https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/jakabakos/CVE-2023-33246_Apache_RocketMQ_RCE", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33995.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33995.json index a99c3477db0..7010089e0ab 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33995.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33995.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:14.100", "lastModified": "2024-12-13T15:15:14.100", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.16", + "matchCriteriaId": "CCE53A83-7654-4044-855A-B676C73D7B91" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/photo-gallery/vulnerability/wordpress-photo-gallery-by-10web-plugin-1-8-15-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34192.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34192.json index 93d2a31a513..47f222a8912 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34192.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34192.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34192", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-06T16:15:10.047", - "lastModified": "2025-02-27T02:00:01.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json index 062173d053b..cd8ca2b06a5 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T13:15:52.287", "lastModified": "2024-11-21T08:07:53.123", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json index 91802496ab6..2b3d8ce30b6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json index 1731e8cdc8c..cbdd7881b06 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35899", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-21T02:47:58.550", - "lastModified": "2024-11-21T08:08:57.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:24:35.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,22 +71,241 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D419EF8-4D41-4FBE-A41B-9F9EAF7F72EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C27956AA-CCEE-4073-A8D7-D1B9575EE25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "12A70646-ADD3-4CF7-A591-8BE96FBEF5A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF6CB2C4-800F-487A-B0E5-8A0A9718549D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D52711AA-0F11-47E7-8EE8-6B8D65403F8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2C6F84-C83F-4AE1-B0A7-740568F52C04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A641D-B7AB-41FA-AFDB-2C8EBDA6A1A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "250AC4D5-1D25-4EEE-B1CA-AA8E104BBF7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5B7FA4-A27C-40CA-AA53-183909D18C13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0413501D-975D-469E-A854-61E12039A8D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "06B0B413-0396-4213-9719-C22AEFC7B3E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", + "matchCriteriaId": "A8D6EB68-3804-494D-B12A-2E96E31D1B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "21D8DE68-5651-4068-B978-79B28F2DC5D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "BBEA972A-A41E-44C9-8D35-1A991D3384B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "D3009F4E-7157-43D3-B6A0-2531CDE619BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "1DA97C23-9B80-4956-9873-317902A0D804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "1D0B6203-C775-4C5E-BAE9-C956E718F261" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "257A7A17-7EDF-4E23-88A6-216BC29EC467" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "26FF217B-1BD4-46E5-8023-2B2989FF7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "C60E58EA-C4D5-4D4D-8C9B-3EC33A7027E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_009:*:*:*:*:*:*", + "matchCriteriaId": "7817670E-5649-42A9-B5F9-7586D7AEB4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_010:*:*:*:*:*:*", + "matchCriteriaId": "FC7F85E8-8185-418A-B25F-8E64A58177DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_011:*:*:*:*:*:*", + "matchCriteriaId": "37616DCD-C26C-44EA-AA7F-732DC128FFE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_012:*:*:*:*:*:*", + "matchCriteriaId": "26CAC076-6FED-49E2-BF33-230F1D1195F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_013:*:*:*:*:*:*", + "matchCriteriaId": "5A88C56C-22CC-4791-BB33-C1494E7F41EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_014:*:*:*:*:*:*", + "matchCriteriaId": "12652B2E-307E-4568-920B-A869914ED650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_015:*:*:*:*:*:*", + "matchCriteriaId": "8F4E242F-BDF4-4CFE-B808-4A4B7A6FAD0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_016:*:*:*:*:*:*", + "matchCriteriaId": "88E736CF-CA6E-400B-9AE3-2C58D2265752" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_017:*:*:*:*:*:*", + "matchCriteriaId": "02488B2F-8D6E-4BDC-8DA9-45F5EBC42049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_018:*:*:*:*:*:*", + "matchCriteriaId": "854F4AF8-B712-446E-9DE1-A2496D5E9C1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_019:*:*:*:*:*:*", + "matchCriteriaId": "CF3F1B62-089B-41ED-AD3E-F31F8E967F18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_020:*:*:*:*:*:*", + "matchCriteriaId": "ABB843C3-F26D-43A5-AD3E-9D30D00339D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_021:*:*:*:*:*:*", + "matchCriteriaId": "42A67A28-CBF1-4C37-A217-F4789ED1850E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_022:*:*:*:*:*:*", + "matchCriteriaId": "BFEF1033-B100-400A-9B2B-94AEE3A7B94A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_023:*:*:*:*:*:*", + "matchCriteriaId": "5F109F93-1CE8-4F86-9070-73012ED0FE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C35A26E3-D2F7-466C-9010-06AA76568A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "59BF1F79-6E1E-49EE-8D8E-B524F040AA29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "01632D44-1A4A-4C1A-A19D-8E815617B905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "12CE606B-49F1-425F-A00B-23E3C91CCB0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259354", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7030357", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259354", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7030357", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35907.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35907.json index 387a5696f17..9bcf028e53f 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35907.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35907.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35907", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-29T17:15:26.350", - "lastModified": "2025-01-29T17:15:26.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T21:43:48.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.0.10", + "matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7181814", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json index 870d36f73cb..0516a930c4a 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json index ebdd55f5751..e1fad568419 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json index bde7f2cb947..24f82b8232e 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json index a41ad2e036c..ed4cc56e3f9 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json index 9a307162584..2ce7963f8f4 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3550.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3550.json index ecd0864a5ce..871095c9464 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3550.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3550.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36569.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36569.json index 8735c025c8f..4747d0c4420 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36569.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36569.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json index b48aa3796f5..f6d887c7043 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36570.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json index fa84c9a2af5..20f34dcd134 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36571.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json index 96e0c7c21aa..f10278cf2ed 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36572.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json index 8e98e688ed4..a198aae2b28 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36573.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json index c0ec5f9b05c..e7e5fc8dcc6 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36574.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json index 83ef874b45e..d50590d7329 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36575.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json index f2437c724a6..d7f72105d94 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36589.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json index 7e2d9f0fd38..5353b210855 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36591.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json index 9bb75b93509..07061f68afe 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36592.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json index 11254d23146..489d3e2cc8f 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36702.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json index 2b4c0f547eb..46ac89be4d8 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36718.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json index c5348fa4946..d396db3fff6 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.360", "lastModified": "2025-02-13T17:16:43.583", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json index 36268571101..380c49d43b5 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json index 1e08c45c7a5..d58842eb1cf 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36887.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json index cd086a57772..53cf01044c6 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json index c4e58b8bd57..0c4c012ab55 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37024.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37024.json index 64022f7b37c..e402c68366a 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37024.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37024", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.500", - "lastModified": "2025-01-23T19:15:09.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T19:29:27.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:magma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "8F182F12-7A8E-4259-811F-25216420CBEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37025.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37025.json index 2c1785d50ca..03fdaf288ae 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37025.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37025.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37025", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.623", - "lastModified": "2025-01-23T18:15:28.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T19:29:27.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:magma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "8F182F12-7A8E-4259-811F-25216420CBEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://cellularsecurity.org/ransacked", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37026.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37026.json index 2d97eda553b..969271a23aa 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37026.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37026.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37026", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.747", - "lastModified": "2025-01-23T18:15:28.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T19:29:27.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:magma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "8F182F12-7A8E-4259-811F-25216420CBEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cellularsecurity.org/ransacked", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json index 6276d45592c..b528d687e9e 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.880", "lastModified": "2025-02-18T21:15:17.510", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "La vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `E-RAB Modification Indication` que carece de un campo `eNB_UE_S1AP_ID` ??esperado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:magma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "8F182F12-7A8E-4259-811F-25216420CBEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json index 1127afae0a3..d978d41e67d 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.000", "lastModified": "2025-02-18T21:15:17.727", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `E-RAB Modification Indication` que carece de un campo `eNB_UE_S1AP_ID` ??esperado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:magma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "8F182F12-7A8E-4259-811F-25216420CBEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37398.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37398.json index 7377ded0405..2e3b5adb820 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37398.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37398.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37398", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-29T17:15:26.513", - "lastModified": "2025-01-29T17:15:26.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T21:43:48.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.0.10", + "matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7181814", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json index 0524dae0140..adf60de59df 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json index d4bf6c5425b..35f924161c3 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json index eb561097e8e..1fa09407e11 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json index f916d96d0b5..b9caffd7fa6 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2023-08-08T19:15:10.367", "lastModified": "2025-02-26T17:15:21.023", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json index 4050976f4c6..83aadf0e391 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json index b62b0d227b5..9baba3d8352 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38366.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38366", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T03:15:06.077", - "lastModified": "2024-11-21T08:13:25.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:filenet_content_manager:5.5.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F706FB22-1226-4B24-AC03-3D28474D5CFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:filenet_content_manager:5.5.10:*:*:*:*:*:*:*", + "matchCriteriaId": "6657F198-FE38-4040-B07E-4DA8A900BF73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:filenet_content_manager:5.5.11:*:*:*:*:*:*:*", + "matchCriteriaId": "22D69599-B4F3-4012-9C42-388847D7EFBB" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261115", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7039783", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261115", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7039783", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json index b13a7c684f6..dd51cf18c90 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.197", "lastModified": "2024-11-21T08:13:46.917", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json index 280bcf64420..2da8ce46f97 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.463", "lastModified": "2024-11-21T08:13:47.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json index 71b8ff44c80..927021ff1ee 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.710", "lastModified": "2024-11-21T08:13:47.197", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json index e1122100699..9411d3fc6eb 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38693.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173." + }, + { + "lang": "es", + "value": "Lucee Server (o simplemente Lucee) es un lenguaje de etiquetas y scripts din\u00e1micos basados en Java que se utiliza para el desarrollo r\u00e1pido de aplicaciones web. El endpoint REST de Lucee es vulnerable a RCE a trav\u00e9s de un ataque XML XXE. Esta vulnerabilidad se ha corregido en Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236 y 5.3.9.173." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json index d407ab0c21c..bcb9ac87f43 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39997.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39997.json index 013b731a43d..bcb242c3b47 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39997.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39997.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:20.737", "lastModified": "2024-12-13T15:15:20.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41243.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41243.json index 24d2c234966..b6757948c50 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41243.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41243.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json index 9bc39d26fa0..4b9d1206984 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41665.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41665", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:15:59.170", - "lastModified": "2024-11-21T08:21:26.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.33.1", + "matchCriteriaId": "2E0DF885-13B0-41E2-B6EF-557EC68954FC" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-33-0-givewp-manager-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-33-0-givewp-manager-privilege-escalation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json index cbb03c23d64..d05ed4bab1e 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43208", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-26T17:15:09.033", - "lastModified": "2025-02-26T17:15:21.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json index c1b78d0f6ba..8781b8c32cc 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json index 92683aec36b..9ddc162d35f 100644 --- a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json +++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T14:15:09.253", "lastModified": "2024-11-21T08:26:12.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45591.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45591.json index e3e4f40ab6d..d19c2da8e54 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45591.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45591.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45591", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:45.833", - "lastModified": "2024-11-21T08:27:01.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45592.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45592.json index b37f4bc7a4d..c8041446fc9 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45592.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45592.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45592", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.037", - "lastModified": "2024-11-21T08:27:01.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45592", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45592", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json index 9b393e374e3..c5516462677 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45593.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45593", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.213", - "lastModified": "2024-11-21T08:27:01.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45593", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45593", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json index 064295d0cc4..cd1d8dddde2 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45594", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.493", - "lastModified": "2024-11-21T08:27:01.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45594", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45594", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45595.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45595.json index 244e635bfc2..5cad1e5f294 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45595.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45595", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.717", - "lastModified": "2024-11-21T08:27:01.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45595", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45595", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json index bbd97377efd..7bd289fce87 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45596", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.913", - "lastModified": "2024-11-21T08:27:01.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45596", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45596", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45597.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45597.json index 1d522a89e6f..3351dd28375 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45597.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45597.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45597", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.107", - "lastModified": "2024-11-21T08:27:01.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45597", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45597", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json index 7b6c1ab97b7..d2aff47fedb 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45598.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45598", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.277", - "lastModified": "2024-11-21T08:27:02.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45598", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json index 0034acf0bee..378ee894c2f 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45599.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45599", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.433", - "lastModified": "2024-11-21T08:27:02.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-646" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] } ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45599", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45599", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json index 39c421e13ab..0410b09d561 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45600.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45600", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.613", - "lastModified": "2024-11-21T08:27:02.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45600", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45600", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json index 57b91ab62f3..69e9f8eb2e1 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.027", "lastModified": "2024-11-21T08:27:25.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json index 4cd699c3d04..6503b6d5607 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:09.377", "lastModified": "2024-11-21T08:28:03.190", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json index 8413ea60631..5b7109f8a90 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46604", "sourceIdentifier": "security@apache.org", "published": "2023-10-27T15:15:14.017", - "lastModified": "2025-02-13T18:15:35.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json index 22333f2fd7b..a96db37867e 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47159", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-27T16:15:29.593", - "lastModified": "2025-01-27T16:15:29.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T14:08:19.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,51 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "BE64CEDD-66BE-4EE2-9B71-6524F63070A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.1", + "matchCriteriaId": "1DC0BFA3-EC19-445A-B049-51217DAF0A18" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176083", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json index 23357262d78..17995421b2b 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-01T16:15:06.807", "lastModified": "2024-11-21T08:29:53.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,61 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur32l_firmware:32.3.0.7-r2:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA0ADA6-58D8-4194-A8EE-5D8324211C79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "224B5936-7A7A-48E7-B0F3-754B74E4BF2D" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json index 9fc343399a1..bb802797f06 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47805", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:30.923", - "lastModified": "2024-12-09T13:15:30.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.23", + "matchCriteriaId": "E6287091-F38C-45A0-9321-CC6E0D2509D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wp-cafe/vulnerability/wordpress-wpcafe-plugin-2-2-19-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json index 2bb6d2bb1b1..0384f45f704 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48290.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T11:15:48.830", "lastModified": "2024-11-21T08:31:24.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.21", + "matchCriteriaId": "405D72F7-A038-4298-8453-602A29E6B49B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-plugin-1-15-20-captcha-bypass-vulnerability-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-plugin-1-15-20-captcha-bypass-vulnerability-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json index 4e76619484c..2d336b4e40a 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.300", "lastModified": "2024-11-21T08:31:25.800", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48318.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48318.json index 68e86c69972..7d78768eb0c 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48318.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48318.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T11:15:49.053", "lastModified": "2024-11-21T08:31:28.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json index 1869c2d6d15..5cbe13beb0d 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@pega.com", "published": "2024-03-14T16:15:49.863", "lastModified": "2024-11-21T08:36:36.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json index 36245373fcc..8e6a3f19f79 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50312.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json index 461e5739c76..2521778fd77 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50324.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50324", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-01T02:15:07.823", - "lastModified": "2024-11-21T08:36:50.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,68 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_command_center:10.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA2D482-F396-4704-ACBA-E81720686DDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_command_center:10.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E1F58E67-8E8F-4DA0-B9C0-68683BDAB5A8" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275038", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7112504", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275038", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7112504", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json index 7d1da4483c3..4f481059ce2 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50949.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50949", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-11T17:15:30.427", - "lastModified": "2024-11-21T08:37:35.503", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -51,22 +71,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "BD0A459A-C74A-4E18-83B3-4C29D47D2C2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "721EFDD7-EE35-430C-AF17-C54BDB10434E" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275706", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147933", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275706", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147933", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json index b925451fb0a..b3e9b855b5f 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51353.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:39.513", "lastModified": "2024-12-09T13:15:39.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json index 94b23bbb2de..878c495091c 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T13:15:49.430", "lastModified": "2024-11-21T08:38:16.797", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json index f97de5d2955..eceb6cbb385 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T13:15:44.857", "lastModified": "2024-11-21T08:39:24.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json index 8bcad2face9..2be98671c71 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T07:15:52.120", "lastModified": "2024-11-21T08:39:26.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json index 120ed58cf2d..7c67e962041 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T07:15:52.927", "lastModified": "2024-11-21T08:39:27.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json index 3c9e9ac0059..bd50637c7f7 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52292", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-27T16:15:29.767", - "lastModified": "2025-01-27T16:15:29.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T14:08:19.020", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "BE64CEDD-66BE-4EE2-9B71-6524F63070A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.3", + "matchCriteriaId": "A0BA4858-4187-460C-ADC7-B35A8BE4E48E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176079", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52371.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52371.json index 53146654334..462590da767 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52371.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T04:15:07.873", "lastModified": "2024-12-04T17:15:11.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,93 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json index 3645a68ecd7..092ac818f07 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52675.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:18.413", "lastModified": "2024-11-21T08:40:20.240", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,75 +15,238 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/imc-pmu: agregue una verificaci\u00f3n de puntero null en update_events_in_group() kasprintf() devuelve un puntero a la memoria asignada din\u00e1micamente que puede ser NULL en caso de fallo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14", + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "245BC69A-0457-423B-9265-433DFB832C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json index 70141de389c..317ddd0ab9b 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:19.733", "lastModified": "2024-11-21T08:40:21.573", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,75 +15,253 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/powernv: a\u00f1adir una verificaci\u00f3n de puntero nulo en opal_event_init() kasprintf() devuelve un puntero a la memoria asignada din\u00e1micamente que puede ser NULL en caso de fallo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "4A5CD3BC-38ED-4FF5-9CC1-82A520E27AC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json index 6ca9a2bb175..c47c597129b 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52690.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:20.020", "lastModified": "2024-11-21T08:40:22.153", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,230 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/powernv: agregue una verificaci\u00f3n de puntero null a scom_debug_init_one() kasprintf() devuelve un puntero a la memoria asignada din\u00e1micamente que puede ser NULL en caso de fallo. Agregue una verificaci\u00f3n de puntero null y suelte 'ent' para evitar p\u00e9rdidas de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "14D3181F-3B0A-49B9-A4D6-38DF3E9B5B9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json index fc67be06f6a..b0572ebb584 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52847.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:21.873", "lastModified": "2024-11-21T08:40:42.820", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,235 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medio: bttv: correcci\u00f3n de uso despu\u00e9s de error gratuito debido a btv->timeout timer. Puede haber alguna condici\u00f3n de ejecuci\u00f3n entre la funci\u00f3n del temporizador bttv_irq_timeout y bttv_remove. El temporizador est\u00e1 configurado en la sonda y no hay ninguna operaci\u00f3n timer_delete en la funci\u00f3n de eliminaci\u00f3n. Cuando llega a kfree btv, es posible que la funci\u00f3n a\u00fan se invoque, lo que provocar\u00e1 un error de use after free. Este error se encuentra mediante an\u00e1lisis est\u00e1tico y puede ser un falso positivo. Solucionelo agregando del_timer_sync invocando a la funci\u00f3n de eliminaci\u00f3n. cpu0 cpu1 bttv_probe ->timer_setup ->bttv_set_dma ->mod_timer; bttv_remove ->kfree(btv); ->bttv_irq_timeout ->USE btv" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.299", + "matchCriteriaId": "F51D1457-86F8-4A6C-A7B9-323058B3C5E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.261", + "matchCriteriaId": "286E50BB-5A21-49BA-A6E5-526C72ADFE34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.201", + "matchCriteriaId": "AF1ADC4E-CCC4-498A-876F-5136DDD36C1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.139", + "matchCriteriaId": "81424D14-B38F-47B3-A1B8-BC3B60BB96EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.63", + "matchCriteriaId": "80E1EA7E-2788-466C-9FFB-34AFA1B052F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.12", + "matchCriteriaId": "825F64D9-E99F-49AA-8A7B-EF7C2965C5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.2", + "matchCriteriaId": "4CBFF885-A4D3-4F21-B6FD-4D770034C048" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json index ebd7351e65a..a19e309f2d3 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:24.450", "lastModified": "2024-11-21T08:40:46.920", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,162 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: dev: can_put_echo_skb(): no bloquee el kernel si se accede a can_priv::echo_skb fuera de los l\u00edmites. Si se accede a \"struct can_priv::echoo_skb\" fuera de los l\u00edmites, esto provocar\u00eda un fallo del kernel. En su lugar, emita un mensaje de advertencia significativo y regrese con un error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.33", + "versionEndExcluding": "5.15.139", + "matchCriteriaId": "8C26CCF8-B74F-4C7D-8A00-7CF6AC887BE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.63", + "matchCriteriaId": "80E1EA7E-2788-466C-9FFB-34AFA1B052F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.12", + "matchCriteriaId": "825F64D9-E99F-49AA-8A7B-EF7C2965C5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.2", + "matchCriteriaId": "4CBFF885-A4D3-4F21-B6FD-4D770034C048" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52943.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52943.json index d7d6f073daf..7205d2c8feb 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52943.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52943.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-12-04T07:15:04.033", "lastModified": "2024-12-04T07:15:04.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,76 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.0-9289", + "matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.0-11289", + "matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52944.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52944.json index 79c30f57c43..d1fb90a63db 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52944.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-12-04T07:15:05.790", "lastModified": "2024-12-04T07:15:05.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,76 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.0-9289", + "matchCriteriaId": "187A263E-E3AE-4800-90E7-D3090E736C9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.0-11289", + "matchCriteriaId": "F59B6F9A-253C-43C6-B88D-BB18242A1EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "10C4B055-D99B-4D58-811C-DD323A68A890" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:synology:diskstation_manager:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5C262042-304B-49DC-BB4B-655C5C36D88C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_04", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5456.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5456.json index 931c2eff071..9ba1f8ea4fb 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5456.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5456.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5456", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T11:15:07.657", - "lastModified": "2024-11-21T08:41:48.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5456", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5456", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json index 838f76795ba..88c5880697f 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5457", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.793", - "lastModified": "2024-11-21T08:41:48.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-2", + "matchCriteriaId": "0AC8BA0D-1588-4072-8BEA-464B1E76AF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5457", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5457", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json index 44dffbfc04c..2c4d96e18da 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5663.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json index 48b755c6d0e..422d73f2389 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5993", "sourceIdentifier": "psirt@thalesgroup.com", "published": "2024-02-27T11:15:07.343", - "lastModified": "2024-11-21T08:42:56.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,92 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.8", + "matchCriteriaId": "C1A4278F-3A51-4996-BA41-63EAFDC94679" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:-:*:*:*:*:*:*", + "matchCriteriaId": "D1CFFB1B-9F22-48FE-86C1-72C09C57A95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r1:*:*:*:*:*:*", + "matchCriteriaId": "4FB4DA9F-D19B-41E9-BB88-7C24E48ADEE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r5:*:*:*:*:*:*", + "matchCriteriaId": "8D9E5B18-464C-4BD8-9A13-00AA985350DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r6:*:*:*:*:*:*", + "matchCriteriaId": "70665411-4646-48D3-A25B-423233D85D54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r8:*:*:*:*:*:*", + "matchCriteriaId": "1B5FD010-0AE2-4FDC-84C6-24EBE5C79932" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r9:*:*:*:*:*:*", + "matchCriteriaId": "79DCB763-95ED-4D17-956E-DC4ED5D7212D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.thalesgroup.com", - "source": "psirt@thalesgroup.com" + "source": "psirt@thalesgroup.com", + "tags": [ + "Product" + ] }, { "url": "https://supportportal.thalesgroup.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json index 3d309768c75..84aa7cbb5be 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6267.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6327.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6327.json index c28014d85c3..2b9ad4a2f3e 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6327.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T14:33:18.653", "lastModified": "2024-11-21T08:43:38.007", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json index 27dcd91dafd..cf85b28b415 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-29T12:15:07.077", "lastModified": "2025-02-03T14:15:37.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json index a97bb9b9c9a..6de9812c901 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6897.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6897.json index cfafd6addf9..1f7fe9a6ad5 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6897.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6897.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json index 479df91fedd..334f55ad5c1 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json index 6c9b9cc0958..407b946ef6b 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7015", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.900", - "lastModified": "2024-11-21T08:45:02.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filemanagerpro.io:file_manager_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "66C08DFF-036D-42A8-8173-B3FE2343ED15" + } + ] + } + ] + } + ], "references": [ { "url": "https://filemanagerpro.io/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94750424-bb52-4236-962e-aa8cbdeb1459?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://filemanagerpro.io/changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94750424-bb52-4236-962e-aa8cbdeb1459?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json index 8bce85165bb..5882098647e 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7016.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@thalesgroup.com", "published": "2024-02-27T11:15:07.933", "lastModified": "2024-11-21T08:45:02.697", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,92 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.8", + "matchCriteriaId": "C1A4278F-3A51-4996-BA41-63EAFDC94679" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:-:*:*:*:*:*:*", + "matchCriteriaId": "D1CFFB1B-9F22-48FE-86C1-72C09C57A95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r1:*:*:*:*:*:*", + "matchCriteriaId": "4FB4DA9F-D19B-41E9-BB88-7C24E48ADEE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r5:*:*:*:*:*:*", + "matchCriteriaId": "8D9E5B18-464C-4BD8-9A13-00AA985350DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r6:*:*:*:*:*:*", + "matchCriteriaId": "70665411-4646-48D3-A25B-423233D85D54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r8:*:*:*:*:*:*", + "matchCriteriaId": "1B5FD010-0AE2-4FDC-84C6-24EBE5C79932" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:safenet_authentication_client:10.8:r9:*:*:*:*:*:*", + "matchCriteriaId": "79DCB763-95ED-4D17-956E-DC4ED5D7212D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.thalesgroup.com", - "source": "psirt@thalesgroup.com" + "source": "psirt@thalesgroup.com", + "tags": [ + "Product" + ] }, { "url": "https://supportportal.thalesgroup.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7067.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7067.json index c039c22ec96..16414a880e0 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7067.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:09.010", "lastModified": "2024-11-21T08:45:10.670", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json index 1156f31ed87..eb0336128f5 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "iletisim@usom.gov.tr", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json index bb330a93ae7..e5bcd4632c3 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7103", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-03-05T13:15:06.940", - "lastModified": "2024-11-21T08:45:16.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zksoftware:uface_5:*:*:*:*:*:*:*:*", + "versionEndIncluding": "12022024", + "matchCriteriaId": "32C55889-BEB0-4E0C-A289-C05F4DFBD45D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0173", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0173", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json index 4427987dbde..2b79fd40d4f 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0114.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Management Controller (HMC) that may allow a malicious actor with administrative access on the BMC to access the HMC as an administrator. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + }, + { + "lang": "es", + "value": "NVIDIA Hopper HGX para 8 GPU contiene una vulnerabilidad en el controlador de administraci\u00f3n HGX (HMC) que puede permitir que un agente malintencionado con acceso administrativo al BMC acceda al HMC como administrador. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo, la denegaci\u00f3n de servicio, la escalada de privilegios, la divulgaci\u00f3n de informaci\u00f3n y la manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json index 5373d6b197a..7232640944f 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0141.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU vBIOS that may allow a malicious actor with tenant level GPU access to write to an unsupported registry causing a bad state. A successful exploit of this vulnerability may lead to denial of service." + }, + { + "lang": "es", + "value": "NVIDIA Hopper HGX para 8 GPU contiene una vulnerabilidad en el vBIOS de la GPU que puede permitir que un agente malintencionado con acceso a la GPU a nivel de inquilino escriba en un registro no compatible, lo que provoca un estado incorrecto. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0148.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0148.json index 1ff727fe654..04f8d53d309 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0148.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:14.700", "lastModified": "2025-02-25T21:15:14.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json index 6f299dd5ac6..1d5fe0a1f41 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0197", "sourceIdentifier": "psirt@thalesgroup.com", "published": "2024-02-27T13:15:45.300", - "lastModified": "2024-11-21T08:46:02.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,62 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thalesgroup:sentinel_hasp_ldk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.16", + "matchCriteriaId": "138AB0A6-DFFC-41B8-AE17-1D6D0D31DD26" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.thalesgroup.com", - "source": "psirt@thalesgroup.com" + "source": "psirt@thalesgroup.com", + "tags": [ + "Product" + ] }, { "url": "https://supportportal.thalesgroup.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json index 1b1b97f4e55..b83ebf87675 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0368.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:10.623", "lastModified": "2024-11-21T08:46:25.077", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json index d963dc4ed3e..e58017c643c 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0369.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:10.837", "lastModified": "2024-11-21T08:46:25.280", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json index 55bd2f5e7a6..6b074cce3f0 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0392.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0392.json index 87586be6c96..2d85a00b258 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0392.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "published": "2025-02-27T07:15:32.243", "lastModified": "2025-02-27T07:15:32.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json index 7af8c6dcf4a..35dfc66581c 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0447.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:11.483", "lastModified": "2024-11-21T08:46:36.667", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0449.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0449.json index 6eff85ac0e1..34dd41c35b4 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0449.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0449.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:11.707", "lastModified": "2024-11-21T08:46:36.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json index d710122495f..725c19ad635 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0551", "sourceIdentifier": "security@huntr.dev", "published": "2024-02-27T14:15:27.130", - "lastModified": "2024-11-21T08:46:51.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,24 +71,64 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/7aaa4b38e7112a6cd879c1238310c56b1844c6d8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/mintplex-labs/anything-llm/commit/7aaa4b38e7112a6cd879c1238310c56b1844c6d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json index 1f52f1f423c..74a190699f6 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0590", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:22.463", - "lastModified": "2024-11-21T08:46:57.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:clarity:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.9.4", + "matchCriteriaId": "346875CE-CC53-4338-BA42-A49193A8561B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3036293%40microsoft-clarity&new=3036293%40microsoft-clarity&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f4461b-1373-4d09-8430-14d1961e1644?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3036293%40microsoft-clarity&new=3036293%40microsoft-clarity&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f4461b-1373-4d09-8430-14d1961e1644?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json index f5f2c7831d8..089cf0c100f 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json index e11445c5790..13c697145c7 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.147", "lastModified": "2024-11-21T08:46:57.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json index c84af6d0468..c7c14db55de 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json index 062468eecb6..82fee305ae7 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0621", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:23.650", - "lastModified": "2024-11-21T08:47:01.137", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simplesharebuttons:simple_share_buttons_adder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.4.12", + "matchCriteriaId": "947DA086-C712-4673-B25B-6774B63F44A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3032350/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3032350%40simple-share-buttons-adder&new=3032350%40simple-share-buttons-adder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/93ab9f1a-26ce-466a-a5d3-d2046ec8f94d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032350/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3032350%40simple-share-buttons-adder&new=3032350%40simple-share-buttons-adder&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/93ab9f1a-26ce-466a-a5d3-d2046ec8f94d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json index 0eb87b52a8f..b7ab41afbf6 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0658", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:24.793", - "lastModified": "2024-11-21T08:47:05.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f1logic:insert_php_code_snippet:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "9A2CD3E0-66A1-437F-B44F-977EB2B551D6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033503%40insert-php-code-snippet&new=3033503%40insert-php-code-snippet&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a6b786-d0ef-41f6-b2bf-83307ec02b91?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033503%40insert-php-code-snippet&new=3033503%40insert-php-code-snippet&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a6b786-d0ef-41f6-b2bf-83307ec02b91?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0680.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0680.json index a7daccad6a9..f649de3277b 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0680.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0680.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json index fda2f5f2962..0b46bae7566 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.767", "lastModified": "2024-11-21T08:47:08.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0682.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0682.json index 382c6f974cd..7d12e3c478a 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0682.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0682.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json index e08e0931f00..e1bf7e3cf88 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.203", "lastModified": "2024-11-21T08:47:08.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json index 66026ba4079..b83a07a3a8e 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0700.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.403", "lastModified": "2024-11-21T08:47:10.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json index 323fa66fd81..760f9d50fab 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0702", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:25.440", - "lastModified": "2024-11-21T08:47:10.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oliverpos:oliver_pos:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.2.1", + "matchCriteriaId": "E0CC1858-EE94-4DC9-B48B-F348996E96A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/oliver-pos/trunk/includes/class-pos-bridge-install.php#L11", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c6f351-477b-4384-9863-fe3b45ddf21d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/oliver-pos/trunk/includes/class-pos-bridge-install.php#L11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c6f351-477b-4384-9863-fe3b45ddf21d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json index 83ed3278a97..1c995f8d6ea 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0759", "sourceIdentifier": "security@huntr.dev", "published": "2024-02-27T06:15:45.493", - "lastModified": "2024-11-21T08:47:18.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/0db6c3b2aa1787a7054ffdaba975474f122c20eb", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/9a978edd-ac94-41fc-8e3e-c35441bdd12b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/mintplex-labs/anything-llm/commit/0db6c3b2aa1787a7054ffdaba975474f122c20eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/9a978edd-ac94-41fc-8e3e-c35441bdd12b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json index 615f3cec257..00519897015 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0763", "sourceIdentifier": "security@huntr.dev", "published": "2024-02-27T22:15:14.597", - "lastModified": "2024-11-21T08:47:19.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,24 +71,64 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "0D667E32-5A5C-479C-BB81-47F3BCA38C13" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/8a7324d0e77a15186e1ad5e5119fca4fb224c39c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/mintplex-labs/anything-llm/commit/8a7324d0e77a15186e1ad5e5119fca4fb224c39c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json index c6f0984cea6..e2238466b44 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0821", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:29.370", - "lastModified": "2024-11-21T08:47:26.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpfactory:cost_of_goods_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.9", + "matchCriteriaId": "2C5F0ED1-4217-4EAB-A9AF-B8DFFAA5E8EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3037232%40cost-of-goods-for-woocommerce&new=3037232%40cost-of-goods-for-woocommerce&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d13d072e-9c9c-4a32-b9f4-7d15dc704b50?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3037232%40cost-of-goods-for-woocommerce&new=3037232%40cost-of-goods-for-woocommerce&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d13d072e-9c9c-4a32-b9f4-7d15dc704b50?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json index 4e5e5151f00..63ef81bd2cc 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0827.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.610", "lastModified": "2024-11-21T08:47:27.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json index bcbcc585b11..dd3ff56faf1 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0828.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:13.833", "lastModified": "2024-11-21T08:47:27.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json index d336e79ffb9..cfb35260957 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0829.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.067", "lastModified": "2024-11-21T08:47:27.827", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json index 799351eedb1..9101d18b917 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0830.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.307", "lastModified": "2024-11-21T08:47:27.947", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json index fccc9911b83..01d17461340 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0839.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:14.537", "lastModified": "2024-11-21T08:47:29.143", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json index d9a00fd4a45..24296c5b69a 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:15.593", "lastModified": "2024-11-21T08:47:38.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json index b799f0e8c61..45721f22e5f 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0957.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0975.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0975.json index 3faeef6e4d0..45c99bc37b2 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0975.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0975.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json index f820fa342e3..dc1a6484373 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0978", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:33.917", - "lastModified": "2024-11-21T08:47:56.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zatzlabs:my_private_site:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "2FA4DA37-7811-4055-BD63-6E5280464F67" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3036015/jonradio-private-site", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/970bc71c-7d0a-4761-874a-379cda71418e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3036015/jonradio-private-site", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/970bc71c-7d0a-4761-874a-379cda71418e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10094.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10094.json index 4bbbe0aa2e0..cbefaec9eef 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10094.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@pega.com", "published": "2024-11-20T15:15:08.083", "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10152.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10152.json index 9b3b4e93810..8abe03956c7 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10152.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:34.840", "lastModified": "2025-02-26T17:15:21.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10174.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10174.json index b733643d84e..315386f177a 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10174.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10174.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json index 320553666f8..c051b8243c9 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-17T13:15:17.520", "lastModified": "2024-12-17T13:15:17.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.4.9", + "matchCriteriaId": "ECF06340-CBFE-4DCF-8918-132EF5B8EF88" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3204333/element-ready-lite", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a48c91-7e2c-4708-b5af-dfbcfea08f83?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10483.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10483.json index 96262ccaa9d..4afa2ead39f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10483.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:35.213", "lastModified": "2025-02-26T17:15:21.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10520.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10520.json index de89c2858f9..67d0ceb5039 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10520.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10520.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10563.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10563.json index 667f38a1731..2f7fa67b0fa 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10563.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:35.443", "lastModified": "2025-02-26T15:15:20.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json index 75d9092fdcb..b1f174f6552 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10654.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T12:15:03.077", "lastModified": "2024-11-05T07:15:13.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10716.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10716.json index af4ad18b010..d0bf9af8f94 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10716.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10716.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@pega.com", "published": "2024-12-05T16:15:23.767", "lastModified": "2024-12-05T16:15:23.767", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10798.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10798.json index 0e0298cc6a3..f0954af2073 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10798.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10798", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-28T10:15:05.673", - "lastModified": "2024-11-28T10:15:05.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.1003", + "matchCriteriaId": "C71C5F8B-185C-441D-9381-F220DD8720A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3195352/royal-elementor-addons/tags/1.7.1004/admin/includes/wpr-templates-shortcode.php?old=3193132&old_path=royal-elementor-addons%2Ftags%2F1.7.1003%2Fadmin%2Fincludes%2Fwpr-templates-shortcode.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a7ef5a0-f6c8-41e1-bb3b-119a682be69f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10804.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10804.json index 398eedd62fc..e4f6b387adf 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10804.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10804.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Ultimate Video Player WordPress & WooCommerce Plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 10.0 via the content/downloader.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Ultimate Video Player WordPress & WooCommerce Plugin para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 10.0 incluida a trav\u00e9s del archivo content/downloader.php. Esto permite que atacantes no autenticados lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10918.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10918.json index 63237c6ea30..280e24cbb0b 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10918.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10918.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-27T12:15:33.807", "lastModified": "2025-02-27T12:15:33.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json index db4e825ec6e..7e7a736392d 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10925.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-03-03T11:15:10.253", "lastModified": "2025-03-03T12:15:34.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in GitLab-EE affecting all versions from 16.2 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows a Guest user to read Security policy YAML" + }, + { + "lang": "es", + "value": "Una vulnerabilidad en GitLab-EE que afecta a todas las versiones desde la 16.2 anterior a la 17.7.6, la 17.8 anterior a la 17.8.4 y la 17.9 anterior a la 17.9.1 permite que un usuario invitado lea la pol\u00edtica de seguridad YAML" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json index db5112027de..1937815c6ac 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Uncontrolled Search Path Element vulnerability exists which could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en el elemento de ruta de b\u00fasqueda no controlada que podr\u00eda permitir que un actor malintencionado realice un secuestro de DLL y ejecute c\u00f3digo arbitrario con privilegios aumentados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json index 8bb3518453c..0a516bd88d6 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10962.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1043.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1043.json index 2ee2aefc611..5e3e3b70204 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1043.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1043.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1044.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1044.json index 39634bb3736..55e6073e47f 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1044.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1044.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1053.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1053.json index f1fb954a753..c6dbf7212ed 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1053.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1053.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1057.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1057.json index 96adb5ba564..9da22bf4ae6 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1057.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1057.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-20T02:15:06.473", "lastModified": "2024-11-21T08:49:41.890", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json index f6186f9ab45..e999f55f78e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json index ec011239388..9b3da9c0d50 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1071", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:16.293", - "lastModified": "2024-11-21T08:49:43.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T19:33:40.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,54 +39,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.1.3", + "versionEndExcluding": "2.8.3", + "matchCriteriaId": "FA5C9BD7-2F46-4BFD-957C-835ACFC68732" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076#L666", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076#L858", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3038036/ultimate-member/trunk/includes/core/class-member-directory-meta.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ultimate-member/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/005fa621-3c49-4c23-add5-d6b7a9110055?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076#L666", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.8.2/includes/core/class-member-directory-meta.php?rev=3022076#L858", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3038036/ultimate-member/trunk/includes/core/class-member-directory-meta.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ultimate-member/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/005fa621-3c49-4c23-add5-d6b7a9110055?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json index 321d0474dcc..7af98731911 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:16.940", "lastModified": "2024-11-21T08:49:45.600", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11035.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11035.json index 37a37d1f560..3a43d45496d 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11035.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which s a type of issue whereby sensitive information may b exposed due to a vulnerability in software." + }, + { + "lang": "es", + "value": "Carbon Black Cloud Windows Sensor anterior a la versi\u00f3n 4.0.3 puede ser susceptible a una vulnerabilidad de fuga de informaci\u00f3n, que es un tipo de problema por el cual informaci\u00f3n confidencial puede quedar expuesta debido a una vulnerabilidad en el software." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json index 58800897a4a..f1bc7673d10 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-03T20:15:32.047", "lastModified": "2025-03-04T14:53:43.637", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,13 +42,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:*/AC:*/PR:*/UI:R/S:*/C:*/I:*/A:*", - "baseScore": 0.0, - "baseSeverity": "NONE", - "userInteraction": "REQUIRED" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" }, - "exploitabilityScore": 0.0, - "impactScore": 0.0 + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -74,8 +81,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "3.9.9", - "matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85" + "versionEndIncluding": "3.9.9.4", + "matchCriteriaId": "0016CBBA-D066-4EC5-BA67-13ABB55E3A7A" } ] } diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11135.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11135.json index 9c606a648cd..1eb790d6e0f 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11135.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11135.json @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jyothisjoy:eventer:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.9.9", - "matchCriteriaId": "4F64016C-DEA9-4B26-90CD-506797B38B15" + "matchCriteriaId": "509DDBF2-5CAE-4061-8021-54E71F8EC4C2" } ] } diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11153.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11153.json index 0ea0ec723e5..daa2b1fc6a6 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11153.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11153.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Content Control \u2013 The Ultimate Content Restriction Plugin! Restrict Content, Create Conditional Blocks & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.0 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as logged-in users." + }, + { + "lang": "es", + "value": "El complemento Content Control \u2013 The Ultimate Content Restriction Plugin! Restrict Content, Create Conditional Blocks & More para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.5.0 incluida, a trav\u00e9s de la funci\u00f3n de b\u00fasqueda principal de WordPress. Esto permite que atacantes no autenticados extraigan datos confidenciales de publicaciones que se han restringido a roles de nivel superior, como usuarios registrados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11316.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11316.json index fd8e9a53851..0ba527981d6 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11316.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11316.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11317.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11317.json index 94a338c2a8d..41efbca642a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11317.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11317.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json index 56bd9ea5713..04f06dfb239 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-19T21:15:07.427", "lastModified": "2025-01-21T21:26:21.980", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11650.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11650.json index faa34a196c0..a2fcbc7feb6 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11650.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11650.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T03:15:06.707", "lastModified": "2024-11-25T03:15:06.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,28 +142,86 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i9_firmware:1.0.0.8\\(3828\\):*:*:*:*:*:*:*", + "matchCriteriaId": "31B4CF9E-A4C8-4271-9E73-DD30D6CE9535" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EBEFC2B-4507-4DD1-A2A6-68997B71ACCB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiaobor123/tenda-vul-i9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.285971", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.285971", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.446592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11731.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11731.json index 89ee923d62a..c4ca1645f0d 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11731.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11731.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Master Slider \u2013 Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ms_slider shortcode in all versions up to, and including, 3.10.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Slider \u2013 Responsive Touch Slider para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto ms_slider del complemento en todas las versiones hasta la 3.10.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11951.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11951.json index 9103300741a..6a8c24f9818 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11951.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11951.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Homey Login Register plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.0. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role." + }, + { + "lang": "es", + "value": "El complemento Homey Login Register para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 2.4.0 incluida. Esto se debe a que el complemento permite a los usuarios que registran nuevas cuentas configurar su propio rol. Esto hace posible que atacantes no autenticados obtengan privilegios elevados al crear una cuenta con el rol de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json index e10647028ef..e0a96f7b65a 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11957.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n incorrecta de la firma digital en ksojscore.dll en Kingsoft WPS Office en versiones iguales o inferiores a la 12.1.0.18276 en Windows permite a un atacante cargar una librer\u00eda arbitraria de Windows. El parche lanzado en la versi\u00f3n 12.2.0.16909 para mitigar CVE-2024-7262 no fue lo suficientemente restrictivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1136.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1136.json index 37a1b40ebe6..8d55ccec6f3 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1136.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1136.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json index 5363692f164..3fd20863a33 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:17.740", "lastModified": "2024-11-21T08:49:55.723", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1176.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1176.json index 25302e40500..55bdde09629 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1176.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:17.933", "lastModified": "2024-11-21T08:49:58.123", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12035.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12035.json index 1cb68ca6a62..b880e763639 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12035.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The CS Framework plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the cs_widget_file_delete() function in all versions up to, and including, 6.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento CS Framework para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n cs_widget_file_delete() en todas las versiones hasta la 6.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12036.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12036.json index 8d959b2f570..b3756110fad 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12036.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The CS Framework plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.9 via the get_widget_settings_json() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento CS Framework para WordPress es vulnerable a la lectura arbitraria de archivos en todas las versiones hasta la 6.9 incluida a trav\u00e9s de la funci\u00f3n get_widget_settings_json(). Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12038.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12038.json index c2c164ba39a..d6786bd74ea 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12038.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12038", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T05:15:12.020", - "lastModified": "2025-02-22T05:15:12.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.16", + "matchCriteriaId": "8807801C-D21D-41CD-8E02-1A07E349B032" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3244167/buddyforms/trunk/includes/shortcodes.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff0568e2-3a1e-4ed6-835a-37e3d07d7b63?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12097.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12097.json index 8f267e1ec45..edf7c3b9cf8 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12097.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel allows SQL Injection.This issue affects E-Travel: before 15.12.2024." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Boceksoft Informatics E-Travel permite la inyecci\u00f3n SQL. Este problema afecta a E-Travel: antes del 15.12.2024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json index 80d662ea913..4e2b4ae67eb 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12144.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (Old System) allows SQL Injection.This issue affects Finder ERP/CRM (Old System): before 18.12.2024." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Finder Fire Safety Finder ERP/CRM (sistema antiguo) permite la inyecci\u00f3n SQL. Este problema afecta a Finder ERP/CRM (sistema antiguo): antes del 18.12.2024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12281.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12281.json index 6401b66d94e..41621ee0e8f 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12281.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12281.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Homey theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.2. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the Editor or Shop Manager role." + }, + { + "lang": "es", + "value": "El tema Homey para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 2.4.2 incluida. Esto se debe a que el complemento permite a los usuarios que registran cuentas nuevas configurar su propio rol. Esto hace posible que atacantes no autenticados obtengan privilegios elevados al crear una cuenta con el rol de Editor o Administrador de la tienda." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json index c863747bf12..48a80f01ddc 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json index 761245f5699..88fcbc7e954 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12331.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12331.json index c80448f9fe1..924b8601e06 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12331.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12331", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-19T12:15:05.330", - "lastModified": "2024-12-19T12:15:05.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:filester:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.7", + "matchCriteriaId": "9619FAEC-1B65-4953-B3E4-5611FC4ECEEF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3208858/filester", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b09bfff-4d6e-4de0-b6ab-6ac27c4f2be6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json index bcfb00d5772..26187950249 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12427", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:07.243", - "lastModified": "2025-01-16T10:15:07.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:42:59.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7.24", + "matchCriteriaId": "8D1CAF64-CA9C-48F0-B8FD-36222B963018" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L100", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L30", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3219723%40multi-step-form&new=3219723%40multi-step-form&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a31fee-ccc2-4c3b-b198-6cb750188113?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12434.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12434.json index 7a9659fe058..c0d033b24f4 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12434.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-26T13:15:36.353", "lastModified": "2025-02-26T13:15:36.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12467.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12467.json index 8264e72955a..5d36dca943c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12467.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12467", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T05:15:12.223", - "lastModified": "2025-02-22T05:15:12.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,24 +69,64 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafreak:payment_by_redsys:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.13", + "matchCriteriaId": "8D815FD7-241F-474B-9658-07835FB90D5E" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pago-redsys-tpv-grafreak/tags/1.0.13/includes/class-redsysapi.php#L263", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pago-redsys-tpv-grafreak/tags/1.0.13/public/partials/pago-redsys-grafreak-public-display.php#L82", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215878%40pago-redsys-tpv-grafreak&new=3215878%40pago-redsys-tpv-grafreak&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed05cd81-ca21-41de-9b02-bd84498cd74e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12544.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12544.json index a62604bfbbe..b0945527cc9 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12544.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12544.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:33.367", "lastModified": "2025-03-01T08:15:33.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity plugin for WordPress is vulnerable to arbitrary file deletion due to a missing capability check on the callback function of the SurveyJS_DeleteFile class in all versions up to, and including, 1.12.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This function is still vulnerable to Cross-Site Request Forgery as of 1.12.20." + }, + { + "lang": "es", + "value": "El complemento SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n de devoluci\u00f3n de llamada de la clase SurveyJS_DeleteFile en todas las versiones hasta la 1.12.17 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php). Esta funci\u00f3n sigue siendo vulnerable a Cross Site Request Forgery a partir de la versi\u00f3n 1.12.20." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12607.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12607.json index c63b71be582..46883d64aa4 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12607.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The School Management System for Wordpress plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'mj_smgt_show_event_task' AJAX action in all versions up to, and including, 92.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento School Management System for Wordpress para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' de la acci\u00f3n AJAX 'mj_smgt_show_event_task' en todas las versiones hasta la 92.0.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel personalizado y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12609.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12609.json index 5564878b439..202caf942c5 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12609.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12609.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The School Management System for Wordpress plugin for WordPress is vulnerable to SQL Injection via the 'view-attendance' page in all versions up to, and including, 92.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query in the mj_smgt_view_student_attendance() function. This makes it possible for authenticated attackers, with Student-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento School Management System for Wordpress para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de la p\u00e1gina \"view-attendance\" en todas las versiones hasta la 92.0.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente en la funci\u00f3n mj_smgt_view_student_attendance(). Esto hace posible que los atacantes autenticados, con acceso de nivel de estudiante y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12610.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12610.json index 7f7dcb8fff7..7a4df825636 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12610.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12610.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The School Management System for Wordpress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new' AJAX actions in all versions up to, and including, 93.0.0. This makes it possible for unauthenticated attackers to delete arbitrary posts." + }, + { + "lang": "es", + "value": "El complemento School Management System for Wordpress para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en las acciones AJAX 'mj_smgt_remove_feetype' y 'mj_smgt_remove_category_new' en todas las versiones hasta la 93.0.0 incluida. Esto permite que atacantes no autenticados eliminen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12611.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12611.json index ddac830f3b6..f8f9bfde9d4 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12611.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12611.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento School Management System for Wordpress para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'title' en todas las versiones hasta la 93.0.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12634.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12634.json index af2533ee3c3..268f801442e 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12634.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12634.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Related Posts, Inline Related Posts, Contextual Related Posts, Related Content By PickPlugins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including 2.0.59. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Related Posts, Inline Related Posts, Contextual Related Posts, Related Content de PickPlugins para WordPress es vulnerable a cross-site request forgery en todas las versiones hasta la 2.0.59 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12650.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12650.json index 68ff9d1502f..02e008a9bb4 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12650.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications." + }, + { + "lang": "es", + "value": "Un atacante con pocos privilegios puede manipular el tama\u00f1o de memoria solicitado, lo que hace que la aplicaci\u00f3n utilice un \u00e1rea de memoria no v\u00e1lida. Esto podr\u00eda provocar un bloqueo de la aplicaci\u00f3n, pero no afecta a otras aplicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12737.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12737.json index 447350ab1fc..d2effd22fcf 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12737.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12737.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:36.513", "lastModified": "2025-02-26T15:15:22.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json index e7949857e14..c7f5e2a47f1 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A deserialization of untrusted data vulnerability exists in NI G Web Development Software that may result in arbitrary code execution.\u202f Successful exploitation requires an attacker to get a user to open a specially crafted project file.\u202f This vulnerability affects G Web Development Software 2022 Q3 and prior versions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables en NI G Web Development Software que puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, un atacante debe conseguir que un usuario abra un archivo de proyecto especialmente manipulado. Esta vulnerabilidad afecta a G Web Development Software 2022 Q3 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json index 575bd32ab21..f99be288ee6 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12799.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficiently Protected Credentials\nvulnerability in OpenText Identity Manager Advanced Edition on Windows, Linux,\n64 bit allows Privilege Abuse. This vulnerability could allow an\nauthenticated user to obtain higher privileged user\u2019s sensitive information via\ncrafted payload.\n\nThis issue affects Identity Manager Advanced\nEdition: from 4.8.0.0 through 4.8.7.0102, 4.9.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de credenciales insuficientemente protegidas en OpenText Identity Manager Advanced Edition en Windows, Linux, 64 bits permite el abuso de privilegios. Esta vulnerabilidad podr\u00eda permitir que un usuario autenticado obtenga informaci\u00f3n confidencial de un usuario con mayores privilegios a trav\u00e9s de un payload manipulado. Este problema afecta a Identity Manager Advanced Edition: desde la versi\u00f3n 4.8.0.0 hasta la 4.8.7.0102, 4.9.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12811.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12811.json index 39f83ede1f8..d2e8f68a044 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12811.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12811.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T00:15:35.790", "lastModified": "2025-02-28T00:15:35.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Traveler theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.8 via the 'hotel_alone_slider' shortcode 'style' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included." + }, + { + "lang": "es", + "value": "El tema Traveler para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 3.1.8 incluida, a trav\u00e9s del atributo 'style' del shortcode 'hotel_alone_slider'. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se pueda cargar e incluir un tipo de archivo php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12815.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12815.json index cb2af7318bc..4f7ebf41481 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12815.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Point Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'point_maker' shortcode in all versions up to, and including, 0.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Point Maker para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'point_maker' del complemento en todas las versiones hasta la 0.1.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json index 89a68398657..c0f0128ea01 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json @@ -3,19 +3,23 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T06:15:24.903", "lastModified": "2025-02-28T06:15:24.903", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MK Google Directions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'MKGD' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento MK Google Directions para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'MKGD' del complemento en todas las versiones hasta la 3.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtamarin:mk_google_directions:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "B62EEF5C-764F-4F94-8E06-0CD9C20772E0" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3246361/google-distance-calculator/tags/3.1.1/mk-google-directions.php?old=3046209&old_path=google-distance-calculator%2Ftags%2F3.1%2Fmk-google-directions.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23b3570c-cd8e-4dec-bbad-6374c44530bd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12824.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12824.json index fe46fe0d967..deb1f258f83 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12824.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12824.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T07:15:09.063", "lastModified": "2025-03-01T07:15:09.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Nokri \u2013 Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.2. This is due to the plugin not properly checking for an empty token value prior updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El tema Nokri \u2013 Job Board WordPress Theme para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 1.6.2 incluida. Esto se debe a que el complemento no comprueba correctamente si hay un valor de token vac\u00edo antes de actualizar sus detalles, como la contrase\u00f1a. Esto hace posible que atacantes no autenticados cambien la contrase\u00f1a de cualquier usuario, incluidos los administradores, y aprovechen esa posibilidad para obtener acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12876.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12876.json index bf6e4da2ed1..4539db7f136 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12876.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12876.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.10. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El tema Golo - City Travel Guide WordPress Theme para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 1.6.10 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar su contrase\u00f1a. Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen eso para obtener acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12878.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12878.json index b37321fea20..467e07059be 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12878.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:36.610", "lastModified": "2025-02-26T16:15:14.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json index 3d5f95850f3..5adc13ab1e7 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12959", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T16:15:27.643", - "lastModified": "2024-12-26T16:15:27.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-28T23:09:22.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README7.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289324", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289324", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468800", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1203.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1203.json index b7f3f2a6245..fdb1d82e90e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1203.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:18.150", "lastModified": "2024-11-21T08:50:01.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1206.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1206.json index 82473db5b7b..4a4f4767d07 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1206.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1206.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json index 35d14e93540..f93e48cb23d 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1294.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json index 9035d537305..ffc192bd196 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13004", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T07:15:05.643", - "lastModified": "2024-12-29T07:15:05.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-22T01:27:49.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", + "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/alc9700jmo/CVE/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289665", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289665", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469685", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json index af6ac346287..58a2b6e830b 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13006", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T08:15:06.840", - "lastModified": "2024-12-29T08:15:06.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T18:25:29.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:human_resource_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA972E24-B354-46BE-8581-DF9F76663F94" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Sakurapan/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.289667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.470260", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13113.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13113.json index 00e12aab59a..a11c7550e81 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13113.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:36.710", "lastModified": "2025-02-26T16:15:15.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13147.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13147.json index a9274846fea..1ed35dbf9e5 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13147.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13147.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Merkur Software B2B Login Panel allows SQL Injection.This issue affects B2B Login Panel: before 15.01.2025." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Merkur Software B2B Login Panel permite la inyecci\u00f3n SQL. Este problema afecta al Panel de inicio de sesi\u00f3n B2B: antes del 15.01.2025. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13148.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13148.json index 0866697c1b1..cb7dccc538d 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13148.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-02-27T15:15:38.583", "lastModified": "2025-02-27T15:15:38.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "iletisim@usom.gov.tr", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json index adde7e1529c..2fe32aca6a8 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T13:15:08.290", "lastModified": "2025-02-13T13:15:08.290", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json index 247d37dcff4..c2e41364ffa 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T12:15:34.857", "lastModified": "2025-02-27T12:15:34.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json index 91962929acb..c3b08a804f8 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T09:15:08.930", "lastModified": "2025-02-19T09:15:08.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13232.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13232.json index 2c7589efd44..cd82463a2e5 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13232.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13232.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WordPress Awesome Import & Export Plugin - Import & Export WordPress Data plugin for WordPress is vulnerable arbitrary SQL Execution and privilege escalation due to a missing capability check on the renderImport() function in all versions up to, and including, 4.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary SQL statements that can leveraged to create a new administrative user account." + }, + { + "lang": "es", + "value": "El complemento WordPress Awesome Import & Export Plugin - Import & Export WordPress Data para WordPress es vulnerable a la ejecuci\u00f3n de SQL arbitrario y a la escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n renderImport() en todas las versiones hasta la 4.1.1 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, ejecuten sentencias SQL arbitrarias que pueden aprovecharse para crear una nueva cuenta de usuario administrativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json index fe75ecb0d29..51f8df650f0 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13336", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T09:15:09.083", - "lastModified": "2025-02-19T09:15:09.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exeebit:disable_auto_updates:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4", + "matchCriteriaId": "016FF2ED-4C56-48F4-8DE9-9704F9FA8212" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/disable-auto-updates/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60413b3b-f9b0-40ca-af0a-f7cf87ab793a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13350.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13350.json index 086c937ffee..f174ea65407 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13350.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13350.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SearchIQ \u2013 The Search Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'siq_searchbox' shortcode in all versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SearchIQ \u2013 The Search Solution para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'siq_searchbox' del complemento en todas las versiones hasta la 4.7 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13358.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13358.json index c211f29d246..2127239864a 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13358.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13358.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T04:15:09.550", "lastModified": "2025-03-01T04:15:09.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wc4bp_delete_page() function in all versions up to, and including, 3.4.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins page setting." + }, + { + "lang": "es", + "value": "El complemento BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages para WordPress, es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n wc4bp_delete_page() en todas las versiones hasta la 3.4.24 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n de la p\u00e1gina del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json index 1fcb940daf6..4ebc3960fbe 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13373.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13373.json index b063be03a5d..28bff95f0de 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13373.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13373.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T07:15:10.770", "lastModified": "2025-03-01T07:15:10.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Exertio Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.1. This is due to the plugin not properly validating a user's identity prior to updating their password through the fl_forgot_pass_new() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El complemento Exertio Framework para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 1.3.1 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar su contrase\u00f1a a trav\u00e9s de la funci\u00f3n fl_forgot_pass_new(). Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen esa posibilidad para obtener acceso a sus cuentas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13402.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13402.json index f52aabef575..4dacd4cc443 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13402.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13402.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T13:15:09.947", "lastModified": "2025-02-27T13:15:09.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json index 6f3de30867d..f5f9f8b5635 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13422", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-23T12:15:28.163", - "lastModified": "2025-01-23T12:15:28.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T19:50:59.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:suhas93:seo_blogger_to_wordpress_301_redirector:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.4.8", + "matchCriteriaId": "EA5297A3-D913-4456-A1FC-D5D384869F2C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/seo-blogger-to-wordpress-301-redirector/trunk/seo-blogger-to-wordpress.php#L356", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e095b5-9c0b-45ac-a78d-e50feda348cb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13423.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13423.json index 3f155df1d47..f6f1d8a5a82 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13423.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13423.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Sparkling theme for WordPress is vulnerable to unauthorized plugin activation/deactivation due to a missing capability check on the 'sparkling_activate_plugin' and 'sparkling_deactivate_plugin' functions in versions up to, and including, 2.4.9. This makes it possible for unauthenticated attackers to activate/deactivate arbitrary plugins." + }, + { + "lang": "es", + "value": "El tema Sparkling para WordPress es vulnerable a la activaci\u00f3n o desactivaci\u00f3n no autorizada de complementos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'sparkling_activate_plugin' y 'sparkling_deactivate_plugin' en versiones hasta la 2.4.9 incluida. Esto hace posible que atacantes no autenticados activen o desactiven complementos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13431.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13431.json index 4e0d5518063..a0e94bbcbc6 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13431.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13431.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the accent_color and background parameter in all versions up to, and including, 1.6.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro accent_color y background en todas las versiones hasta la 1.6.8.3 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13471.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13471.json index b9e058e5d8e..bfc8cc24889 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13471.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13471.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The DesignThemes Core Features plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the dt_process_imported_file function in all versions up to, and including, 4.7. This makes it possible for unauthenticated attackers to read arbitrary files on the underlying operating system." + }, + { + "lang": "es", + "value": "El complemento DesignThemes Core Features para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n dt_process_imported_file en todas las versiones hasta la 4.7 incluida. Esto hace posible que atacantes no autenticados lean archivos arbitrarios en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13518.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13518.json index cbdc7401d96..a4ff10b6388 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13518.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:13.720", "lastModified": "2025-03-01T05:15:13.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple:Press Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.10.11. This is due to missing or incorrect nonce validation on the 'sp_save_edited_post' function. This makes it possible for unauthenticated attackers to modify a forum post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Simple:Press Forum para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 6.10.11 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n 'sp_save_edited_post'. Esto hace posible que atacantes no autenticados modifiquen una publicaci\u00f3n del foro a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13546.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13546.json index 9adb4600c83..859de01b966 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13546.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13546.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T10:15:10.207", "lastModified": "2025-03-01T10:15:10.207", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GenerateBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.9.1 via the 'get_image_description' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the content of private, draft, and scheduled posts and pages." + }, + { + "lang": "es", + "value": "El complemento GenerateBlocks para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.9.1 incluida a trav\u00e9s de la funci\u00f3n 'get_image_description'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, extraigan datos confidenciales, incluido el contenido de publicaciones y p\u00e1ginas privadas, borradores y programadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13552.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13552.json index 32e4dc775cf..bba3011a06d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13552.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13552.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SupportCandy \u2013 Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.0 via file upload due to missing validation on a user controlled key. This makes it possible for authenticated attackers to download attachments for support tickets that don't belong to them. If an admin enables tickets for guests, this can be exploited by unauthenticated attackers." + }, + { + "lang": "es", + "value": "El complemento SupportCandy \u2013 Helpdesk & Customer Support Ticket System para WordPress es vulnerable a una referencia directa a objetos insegura en todas las versiones hasta la 3.3.0 incluida a trav\u00e9s de la carga de archivos debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes autenticados descarguen archivos adjuntos para tickets de soporte que no les pertenecen. Si un administrador habilita tickets para invitados, esto puede ser explotado por atacantes no autenticados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13559.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13559.json index 4c7dfba0b1b..acced1ff198 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13559.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13559.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:14.700", "lastModified": "2025-03-01T05:15:14.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TemplatesNext ToolKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tx_woo_wishlist_table' shortcode in all versions up to, and including, 3.2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento TemplatesNext ToolKit para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'tx_woo_wishlist_table' del complemento en todas las versiones hasta la 3.2.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13560.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13560.json index 192c9e7dff0..1c12d1a79c2 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13560.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13560.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-26T13:15:36.800", "lastModified": "2025-02-26T13:15:36.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13564.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13564.json index 9f15c705ca3..248337d374c 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13564.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13564", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T09:15:23.687", - "lastModified": "2025-02-22T09:15:23.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T21:28:15.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,20 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apollo13:rife_elementor_extensions_\\\\&_templates:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.6", + "matchCriteriaId": "716949B7-958D-4728-A65C-D7FDA86CA0EE" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3244081", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/rife-elementor-extensions/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/520555b4-35e8-4ec1-85b8-3a43b5209661?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13568.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13568.json index 5e126aa3ceb..e16a2f46813 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13568.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13568.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:14.883", "lastModified": "2025-03-01T05:15:14.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Fluent Support \u2013 Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.5 via the 'fluent-support' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/fluent-support directory which can contain file attachments included in support tickets." + }, + { + "lang": "es", + "value": "El complemento Fluent Support \u2013 Helpdesk & Customer Support Ticket System para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.8.5 incluida a trav\u00e9s del directorio 'fluent-support'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/fluent-support, que puede contener archivos adjuntos incluidos en los tickets de soporte." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13571.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13571.json index faf6cfcfe3f..46dbf98719f 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13571.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13571.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:36.957", "lastModified": "2025-02-26T16:15:15.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13611.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13611.json index fab1900489f..f846a3d6615 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13611.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13611.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T09:15:09.220", "lastModified": "2025-03-01T09:15:09.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Better Messages \u2013 Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.9 via the 'bp-better-messages' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/bp-better-messages directory which can contain file attachments included in chat messages." + }, + { + "lang": "es", + "value": "El complemento Better Messages \u2013 Live Chat para WordPress, BuddyPress, PeepSo, Ultimate Member y BuddyBoss para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.6.9 incluida a trav\u00e9s del directorio 'bp-better-messages'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/bp-better-messages, que pueden contener archivos adjuntos incluidos en los mensajes de chat." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13624.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13624.json index d7884a3de54..b97a3f05338 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13624.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.053", "lastModified": "2025-02-26T16:15:15.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13628.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13628.json index 5c9b5fa9414..f77a618c88b 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13628.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.147", "lastModified": "2025-02-26T15:15:22.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13629.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13629.json index f5dd44930fc..e282bf98c81 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13629.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13629.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.247", "lastModified": "2025-02-26T15:15:22.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13630.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13630.json index e06a82472d5..ae105d8c96f 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13630.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.343", "lastModified": "2025-02-26T15:15:22.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13631.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13631.json index 82e5e15468e..fce1fd0ee0d 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13631.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.447", "lastModified": "2025-02-26T16:15:15.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13632.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13632.json index 16c8b4bcbed..84bd6986cc0 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13632.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13632.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.540", "lastModified": "2025-02-26T16:15:15.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13633.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13633.json index b036e1f6f30..b4cf4f95810 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13633.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.640", "lastModified": "2025-02-26T15:15:22.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13634.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13634.json index 0d2aac1d7c6..74d9ed88b27 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13634.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.730", "lastModified": "2025-02-26T15:15:23.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13635.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13635.json index 96ee542d73f..cb8ef99eb49 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13635.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13635.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The VK Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.94.2.2 via the page content block. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the content of private posts and pages." + }, + { + "lang": "es", + "value": "El complemento VK Blocks para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.94.2.2 incluida a trav\u00e9s del bloqueo de contenido de la p\u00e1gina. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, extraigan datos confidenciales, incluido el contenido de publicaciones y p\u00e1ginas privadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13647.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13647.json index 94f5f4aee5e..03a5d411fe8 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13647.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13647.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T05:15:13.430", "lastModified": "2025-02-27T05:15:13.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13668.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13668.json index 1ea62dcbd3a..dd4e49012eb 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13668.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13668.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WordPress Activity O Meter WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admins." + }, + { + "lang": "es", + "value": "El complemento WordPress Activity O Meter de WordPress hasta la versi\u00f3n 1.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como los administradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13669.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13669.json index 32833437706..879d2ba3c73 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13669.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13669.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.833", "lastModified": "2025-02-26T15:15:23.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13678.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13678.json index 11c113f7eb3..0604c6aac89 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13678.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13678.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-26T13:15:37.927", "lastModified": "2025-02-26T15:15:23.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json index 8c6ed9df378..e29665616d6 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13679", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:19.623", - "lastModified": "2025-02-19T08:15:19.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getbuybox:buybox_widget:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.5", + "matchCriteriaId": "83FC38C7-D0DF-441A-879A-42EB0F9E3B05" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/buybox-widget/trunk/functions/Widget/Embed.php#L43", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fba6abba-fe29-4a94-bf20-3db78737c275?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13682.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13682.json index 7cd67395ffd..b76a732a2d0 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13682.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13682.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.2. This is due to missing or incorrect nonce validation in class-wallet-user-table.php. This makes it possible for unauthenticated attackers to modify wallet balances via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6.2 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en class-wallet-user-table.php. Esto hace posible que atacantes no autenticados modifiquen los saldos de la billetera a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json index 9dabc868fc3..4ecbfdd688f 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13685.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10." + }, + { + "lang": "es", + "value": "El complemento Admin and Site Enhancements (ASE) de WordPress anterior a la versi\u00f3n 7.6.10 recupera direcciones IP de clientes de encabezados potencialmente no confiables, lo que permite a un atacante manipular su valor para eludir la funci\u00f3n de l\u00edmite de inicio de sesi\u00f3n en el complemento Admin and Site Enhancements (ASE) de WordPress anterior a la versi\u00f3n 7.6.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13686.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13686.json index 73097c86ea9..d9428ad16c3 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13686.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13686.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13686", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-04T04:15:11.070", - "lastModified": "2025-03-04T04:15:11.070", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VW Storefront theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vw_storefront_reset_all_settings() function in all versions up to, and including, 0.9.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the themes settings." + }, + { + "lang": "es", + "value": "El tema VW Storefront para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n vw_storefront_reset_all_settings() en todas las versiones hasta la 0.9.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, restablezcan la configuraci\u00f3n de los temas." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vwthemes:vw_storefront:*:*:*:*:*:*wordpress:*:*", + "versionEndExcluding": "1.0.0", + "matchCriteriaId": "1033BA38-C79A-4FCF-9CE9-C9AFE3351FA6" + } + ] + } + ] } ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261535%40vw-storefront&new=261535%40vw-storefront&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/299ed515-ba64-413a-a03a-2db801520ae0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13697.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13697.json index 7416f7d8956..0fee94ea748 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13697.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13697.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T09:15:09.370", "lastModified": "2025-03-01T09:15:09.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Better Messages \u2013 Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.4 via the 'nice_links'. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Successful exploitation requires the \"Enable link previews\" to be enabled (default)." + }, + { + "lang": "es", + "value": "El complemento Better Messages \u2013 Live Chat para WordPress, BuddyPress, PeepSo, Ultimate Member y BuddyBoss para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.7.4 incluida a trav\u00e9s de 'nice_links'. Esto permite que atacantes no autenticados realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos. Para explotar esta vulnerabilidad con \u00e9xito, es necesario que la opci\u00f3n \"Habilitar vistas previas de enlaces\" est\u00e9 habilitada (predeterminada)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json index ae93b68509a..bac936b26b8 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13711", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:20.007", - "lastModified": "2025-02-19T08:15:20.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bin-co:pollin:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.01.1", + "matchCriteriaId": "DE9F3F25-6CEE-4BC4-9AA6-224E3C751CC6" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/pollin/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4beb01c1-2144-4b1f-9d32-cf2725a8d4ae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json index afec99051c5..3f5c26c18df 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13712", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:20.380", - "lastModified": "2025-02-19T08:15:20.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bin-co:pollin:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.01.1", + "matchCriteriaId": "DE9F3F25-6CEE-4BC4-9AA6-224E3C751CC6" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/pollin/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d4a463b-e447-4fd0-a8df-284ecd6cd975?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json index 8c8b71faa9b..5d86d9fd633 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13719", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:20.737", - "lastModified": "2025-02-19T08:15:20.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pepro:peprodev_ultimate_invoice:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.8", + "matchCriteriaId": "D0AF0E40-CD05-46B9-B87F-249FF371806E" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/pepro-ultimate-invoice/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46186f8d-e50c-476a-9480-b6121412474a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13724.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13724.json index e49956adfef..6677b8e510d 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13724.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13724.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction plugin for WordPress is vulnerable to unauthorized access to functionality in all versions up to, and including, 2.6.2. This makes it possible for unauthenticated attackers to increase their own wallet balance, transfer balances between arbitrary users and initiate transfer requests from other users' wallets." + }, + { + "lang": "es", + "value": "El complemento Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction para WordPress es vulnerable al acceso no autorizado a la funcionalidad en todas las versiones hasta la 2.6.2 incluida. Esto permite que atacantes no autenticados aumenten el saldo de su propia billetera, transfieran saldos entre usuarios arbitrarios e inicien solicitudes de transferencia desde las billeteras de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13734.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13734.json index d76a3633be5..dba68a22d64 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13734.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13734.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T10:15:09.980", "lastModified": "2025-02-27T10:15:09.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json index e781d608f8f..84ca64348e0 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13736", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:21.077", - "lastModified": "2025-02-19T08:15:21.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,24 +69,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purechat:pure_chat:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.41", + "matchCriteriaId": "8594B34E-6502-4B1A-9F2B-D48E1A78BFE0" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pure-chat/trunk/purechat.php#L149", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pure-chat/trunk/purechat.php#L99", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/pure-chat/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e11993c1-48fa-4e37-850d-d02e3e20d56f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13746.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13746.json index e6e3b0c7360..83ccd202247 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13746.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:15.103", "lastModified": "2025-03-01T05:15:15.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Booking Calendar and Notification plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on the wpcb_all_bookings(), wpcb_update_booking_post(), and wpcb_delete_posts() functions in all versions up to, and including, 4.0.3. This makes it possible for unauthenticated attackers to extract data, create or update bookings, or delete arbitrary posts." + }, + { + "lang": "es", + "value": "El complemento Booking Calendar and Notification para WordPress es vulnerable al acceso no autorizado, la modificaci\u00f3n y la p\u00e9rdida de datos debido a la falta de comprobaciones de capacidad en las funciones wpcb_all_bookings(), wpcb_update_booking_post() y wpcb_delete_posts() en todas las versiones hasta la 4.0.3 incluida. Esto permite que atacantes no autenticados extraigan datos, creen o actualicen reservas o eliminen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13747.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13747.json index 469cf4662ae..53cb900cb10 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13747.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13747.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query." + }, + { + "lang": "es", + "value": "El complemento WooMail - WooCommerce Email Customizer para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'template_delete_saved' en todas las versiones hasta la 3.0.34 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten SQL en una consulta de eliminaci\u00f3n de publicaciones existente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13750.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13750.json index e02238aff42..7f12b1f462b 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13750.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13750.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:15.277", "lastModified": "2025-03-01T05:15:15.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Multilevel Referral Affiliate Plugin for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.27 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Multilevel Referral Affiliate Plugin para WooCommerce para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'orderby' en todas las versiones hasta la 2.27 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13757.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13757.json index b9134b209eb..096d5272e37 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13757.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13757.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Master Slider \u2013 Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ms_layer shortcode in all versions up to, and including, 3.10.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Slider \u2013 Responsive Touch Slider para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto ms_layer del complemento en todas las versiones hasta la 3.10.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13777.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13777.json index 86caf4a10f9..66690bb7684 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13777.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.91 via deserialization of untrusted input from the 'margs' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento ZoomSounds - WordPress Wave Audio Player with Playlist para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 6.91 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del par\u00e1metro 'margs'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13778.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13778.json index 5e009d439dd..f581cde2094 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13778.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13778.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hero Mega Menu - Responsive WordPress Menu Plugin plugin for WordPress is vulnerable to SQL Injection via several functions in all versions up to, and including, 1.16.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Hero Mega Menu - Responsive WordPress Menu Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de varias funciones en todas las versiones hasta la 1.16.5 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13779.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13779.json index 7931e6066fd..510f5537e16 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13779.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hero Mega Menu - Responsive WordPress Menu Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'index' parameter in all versions up to, and including, 1.16.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Hero Mega Menu - Responsive WordPress Menu Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'index' en todas las versiones hasta la 1.16.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13780.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13780.json index 65437244bfa..128d71ef756 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13780.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hero Mega Menu - Responsive WordPress Menu Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the hmenu_delete_menu() function in all versions up to, and including, 1.16.5. This makes it possible for unauthenticated attackers to delete arbitrary directories on the server." + }, + { + "lang": "es", + "value": "El complemento Hero Mega Menu - Responsive WordPress Menu Plugin para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n hmenu_delete_menu() en todas las versiones hasta la 1.16.5 incluida. Esto permite que atacantes no autenticados eliminen directorios arbitrarios en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13781.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13781.json index ba7542bb100..1bdd69f1717 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13781.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hero Maps Premium plugin for WordPress is vulnerable to SQL Injection via several AJAX actions in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Hero Maps Premium para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de varias acciones AJAX en todas las versiones hasta la 2.3.9 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13787.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13787.json index 4195a6ca65a..40603ae44db 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13787.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13787.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The VEDA - MultiPurpose WordPress Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.2 via deserialization of untrusted input in the 'veda_backup_and_restore_action' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El tema VEDA - MultiPurpose WordPress Theme para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 4.2 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en la funci\u00f3n 'veda_backup_and_restore_action'. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json index 1b15239ae0e..c56c90da8aa 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13798.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13798.json index 52a332a7d72..fcfa45d8521 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13798.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13798", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T05:15:12.590", - "lastModified": "2025-02-22T05:15:12.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:comboblocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.6", + "matchCriteriaId": "016B9A14-433D-43A4-BB1D-D02E5A4F9F05" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3242737%40post-grid&new=3242737%40post-grid&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/705823ff-e9c3-4b8b-b71c-3b60d0d15b01?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13803.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13803.json index 376a25a3a64..d4722872559 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13803.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-26T13:15:38.027", "lastModified": "2025-02-26T13:15:38.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13805.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13805.json index 140ed45019f..32376758e4e 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13805.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13805.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Advanced File Manager \u2014 Ultimate WordPress File Manager and Document Library Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 5.2.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager \u2014 Ultimate WordPress File Manager and Document Library Plugin para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 5.2.14 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, y con permisos otorgados por un administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13806.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13806.json index dcb99b618dc..e02dc962061 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13806.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13806.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:33.653", "lastModified": "2025-03-01T08:15:33.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Authors List plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento The Authors List para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 2.0.6 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13809.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13809.json index 4662a316e0b..3a2faa46da6 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13809.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13809.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hero Slider - WordPress Slider Plugin plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 1.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Hero Slider - WordPress Slider Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de varios par\u00e1metros en todas las versiones hasta la 1.3.5 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13810.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13810.json index dbf9c4878d2..a9224083934 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13810.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13810.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Zass - WooCommerce Theme for Handmade Artists and Artisans theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'zass_import_zass' AJAX actions in all versions up to, and including, 3.9.9.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import demo content and overwrite the site." + }, + { + "lang": "es", + "value": "El tema Zass - WooCommerce Theme for Handmade Artists and Artisans para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en las acciones AJAX 'zass_import_zass' en todas las versiones hasta la 3.9.9.10 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, importen contenido de demostraci\u00f3n y sobrescriban el sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13811.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13811.json index 5e942ec3e79..33dd0ea01db 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13811.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13811.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Lafka - Multi Store Burger - Pizza & Food Delivery WooCommerce Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'lafka_import_lafka' AJAX actions in all versions up to, and including, 4.5.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import demo data that overrides the site." + }, + { + "lang": "es", + "value": "El tema Lafka - Multi Store Burger - Pizza & Food Delivery WooCommerce Theme para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en las acciones AJAX 'lafka_import_lafka' en todas las versiones hasta la 4.5.7 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, importen datos de demostraci\u00f3n que anulan el sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13815.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13815.json index d9c1012a31f..bc95fc68f82 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13815.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The The Listingo theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.2.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El tema Listingo para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 3.2.7 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json index cad8d4bfd4c..ea7be1d1e87 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13827.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13827.json index be8d00040dd..d5a027bde36 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13827.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13827.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Razorpay Subscription Button Elementor Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg() and remove_query_arg() functions without appropriate escaping on the URL in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Razorpay Subscription Button Elementor Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de las funciones add_query_arg() y remove_query_arg() sin el escape adecuado en la URL en todas las versiones hasta la 1.0.3 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13833.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13833.json index 64ccefe4c41..40883e48c64 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13833.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13833.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T12:15:33.230", "lastModified": "2025-03-01T12:15:33.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Album Gallery \u2013 WordPress Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.3 via deserialization of untrusted input from gallery meta. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento Album Gallery \u2013 WordPress Gallery para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.6.3 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable de la meta de la galer\u00eda. Esto hace posible que los atacantes autenticados, con acceso de nivel de editor y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13839.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13839.json index e97656cef7d..e9668885f8a 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13839.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13839.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Staff Directory Plugin: Company Directory plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Staff Directory Plugin: Company Directory para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 4.3 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json index 2006fcba235..46da6440007 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13854", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:21.440", - "lastModified": "2025-02-19T08:15:21.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicheaddons:education_addon:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.1", + "matchCriteriaId": "8B8C7B7C-7D33-4749-822D-550E1E8906E6" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/education-addon/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50e8811c-07b1-4325-92a4-dc1c91afbe9e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13857.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13857.json index 76a37e4f144..4cc871a25a6 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13857.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13857.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WPGet API \u2013 Connect to any external REST API plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento WPGet API \u2013 Connect to any external REST API para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.2.10 incluida. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y que se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13866.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13866.json index 7e4b48b8370..cff7a2f0358 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13866.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13866.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Simple Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Simple Notification para WordPress es vulnerable a Cross-Site Scripting Almacenado en todas las versiones hasta la 1.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json index 90e4d8e740d..c4ebe26653f 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13873.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:09.567", "lastModified": "2025-02-22T04:15:09.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json index 147a8f0cc5a..2e52e54e583 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13892.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well." + }, + { + "lang": "es", + "value": "Smartwares cameras CIP-37210AT y C724IP, as\u00ed como otras que comparten el mismo firmware en versiones hasta la 3.3.0, son vulnerables a la inyecci\u00f3n de comandos. Durante el proceso de inicializaci\u00f3n, un usuario tiene que usar una aplicaci\u00f3n m\u00f3vil para proporcionar a los dispositivos las credenciales del punto de acceso. Esta entrada no est\u00e1 debidamente depurada, lo que permite la inyecci\u00f3n de comandos. El proveedor no ha respondido a los informes, por lo que el estado de la aplicaci\u00f3n de parches sigue siendo desconocido. Las versiones de firmware m\u00e1s nuevas tambi\u00e9n podr\u00edan ser vulnerables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json index 6c98169b7ec..2e273c75221 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well." + }, + { + "lang": "es", + "value": "Smartwares cameras CIP-37210AT y C724IP, as\u00ed como otras que comparten el mismo firmware en versiones hasta la 3.3.0, podr\u00edan compartir las mismas credenciales para el servicio Telnet. El hash de la contrase\u00f1a se puede recuperar mediante el acceso f\u00edsico a la memoria conectada a SPI. Para que se habilite el servicio Telnet, la tarjeta SD insertada debe tener una carpeta con un nombre espec\u00edfico creado. Se probaron dos productos, pero como el proveedor no ha respondido a los informes, el estado de la aplicaci\u00f3n de parches sigue siendo desconocido, as\u00ed como los grupos de dispositivos y rangos de firmware en los que se comparte la misma contrase\u00f1a. Las versiones de firmware m\u00e1s nuevas tambi\u00e9n podr\u00edan ser vulnerables. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json index ec7d4367a68..b5233e8bcdd 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13894.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to path traversal. \nWhen an affected device is connected to a mobile app, it opens a port 10000 enabling a user to download pictures shot at specific moments by providing paths to the files. However, the directories to which a user has access are not limited, allowing for path traversal attacks and downloading sensitive information.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well." + }, + { + "lang": "es", + "value": "Smartwares cameras CIP-37210AT y C724IP, as\u00ed como otras que comparten el mismo firmware en versiones hasta la 3.3.0, son vulnerables a ataques de path traversal. Cuando un dispositivo afectado se conecta a una aplicaci\u00f3n m\u00f3vil, abre un puerto 10000 que permite al usuario descargar im\u00e1genes tomadas en momentos espec\u00edficos proporcionando rutas a los archivos. Sin embargo, los directorios a los que tiene acceso un usuario no est\u00e1n limitados, lo que permite ataques de path traversal y la descarga de informaci\u00f3n confidencial. El proveedor no ha respondido a los informes, por lo que el estado de la aplicaci\u00f3n de parches sigue siendo desconocido. Las versiones de firmware m\u00e1s nuevas tambi\u00e9n podr\u00edan ser vulnerables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json index a3e54c9f828..9f114c0ac88 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13897.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Moving Media Library plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the generate_json_page function in all versions up to, and including, 1.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Moving Media Library para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n generate_json_page en todas las versiones hasta la 1.22 incluida. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json index 94bf180b4c1..04a11834d46 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13899.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:09.720", "lastModified": "2025-02-22T04:15:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13901.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13901.json index 4636b51eb4b..413420f95f7 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13901.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13901.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T06:15:33.827", "lastModified": "2025-03-01T06:15:33.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Counter Box: Add Engaging Countdowns, Timers & Counters to Your WordPress Site plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the \u2018content\u2019 parameter in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Counter Box: Add Engaging Countdowns, Timers & Counters to Your WordPress Site para WordPress es vulnerable a DOM-Based Stored Cross-Site Scripting a trav\u00e9s del par\u00e1metro 'content' en todas las versiones hasta la 2.0.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json index 2e1b78787b1..921c5a85a6c 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in huang-yk student-manage 1.0. This affects an unknown part of the component Edit a Student Information Page. The manipulation of the argument Class leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en huang-yk student-manage 1.0. Afecta a una parte desconocida del componente Edit a Student Information Page. La manipulaci\u00f3n del argumento Class provoca Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13904.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13904.json index 0b6de9c586a..479748d717c 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13904.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13904.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Platform.ly for WooCommerce plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.1.6 via the 'hooks' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Platform.ly para WooCommerce para WordPress es vulnerable a Blind Server-Side Request Forgery en todas las versiones hasta la 1.1.6 incluida a trav\u00e9s de la funci\u00f3n \"hooks\". Esto permite que atacantes no autenticados realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13905.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13905.json index fd88ca17213..a9d2d7c1361 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13905.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T05:15:13.610", "lastModified": "2025-02-27T05:15:13.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13907.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13907.json index d26dd37274a..e2507c2cda9 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13907.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T07:15:33.543", "lastModified": "2025-02-27T07:15:33.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13910.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13910.json index 7104e69cc4c..0bf7034b5da 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13910.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13910.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T09:15:09.517", "lastModified": "2025-03-01T09:15:09.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'database_backup_ajax_delete' function in all versions up to, and including, 2.35. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 2.36." + }, + { + "lang": "es", + "value": "El complemento Database Backup and check Tables Automated With Scheduler 2024 para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n 'database_backup_ajax_delete' en todas las versiones hasta la 2.35 incluida. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php). La vulnerabilidad fue parcialmente corregida en la versi\u00f3n 2.36." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13911.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13911.json index d39ac62358f..05b6f5f3814 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13911.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13911.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:33.803", "lastModified": "2025-03-01T08:15:33.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35 via the /dashboard/backup.php file. This makes it possible for authenticated attackers, with Administrator-level access and above, to extract sensitive data including full database credentials." + }, + { + "lang": "es", + "value": "El complemento Database Backup and check Tables Automated With Scheduler 2024 para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.35 incluida a trav\u00e9s del archivo /dashboard/backup.php. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, extraigan datos confidenciales, incluidas las credenciales completas de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1303.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1303.json index 281fbe3f883..de87343feb3 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1303.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1303.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json index e99612f4833..fda0a52065d 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1322.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json index 422655b55ff..74087f35444 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1337.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json index b0aca68042c..3e90cfdaba5 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1340.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1363.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1363.json index bd6fdbec2e3..7f91df2fd7f 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1363.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1363.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:20.130", "lastModified": "2024-11-21T08:50:25.093", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1364.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1364.json index b225689b2ac..9047612e55b 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1364.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:48.497", "lastModified": "2024-11-21T08:50:25.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1365.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1365.json index 825b85d0c6f..e7e60950e44 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1365.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:20.417", "lastModified": "2024-11-21T08:50:25.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1368.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1368.json index 727d410f031..213fa0d0ba5 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1368.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1368.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1370.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1370.json index fda7a643776..5c0083e3770 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1370.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1370", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:20.687", - "lastModified": "2024-11-21T08:50:26.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T14:54:19.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themegrill:maintenance_page:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.9", + "matchCriteriaId": "BC3F6DD7-A53B-4802-900D-9DF643349CA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037664%40maintenance-page%2Ftrunk&old=1218033%40maintenance-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fce54b1-e1e6-4742-9eb3-bbfb613ccd70?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037664%40maintenance-page%2Ftrunk&old=1218033%40maintenance-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fce54b1-e1e6-4742-9eb3-bbfb613ccd70?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json index d2db7c72ee3..0b275ba67f1 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1383.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json index 4bb47985607..8681d528cfd 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1436.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1436.json index 8b0cce8b691..568eab8050a 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1436.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1436.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1452.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1452.json index 8a415fc4129..ef188848bf9 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1452.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1452.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:22.643", "lastModified": "2024-11-21T08:50:36.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1462.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1462.json index 160f5d39130..dbacee3b4af 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1462.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1462", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:22.830", - "lastModified": "2024-11-21T08:50:38.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T14:59:15.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themegrill:maintenance_page:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.9", + "matchCriteriaId": "BC3F6DD7-A53B-4802-900D-9DF643349CA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037664%40maintenance-page%2Ftrunk&old=1218033%40maintenance-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/653bf021-370d-4787-9ded-c5c915aed1d6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037664%40maintenance-page%2Ftrunk&old=1218033%40maintenance-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/653bf021-370d-4787-9ded-c5c915aed1d6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json index e252883acf6..cd435b73075 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json index f4f6b5ee684..6a065546e8c 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1472.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json index 9bd66e8e4e7..67a7e08bfa9 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1475.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json index 17e3e7d67db..f8910930891 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1476", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:42.850", - "lastModified": "2024-11-21T08:50:39.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acurax:under_construction_/_maintenance_mode:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.6", + "matchCriteriaId": "C810126E-C8E5-4F57-BDD4-24E1C9DEAAC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/coming-soon-maintenance-mode-from-acurax/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f28c47e6-a37d-4328-afb2-6a9e6b3fe20a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/coming-soon-maintenance-mode-from-acurax/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f28c47e6-a37d-4328-afb2-6a9e6b3fe20a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1484.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1484.json index 7bb2999023e..5faa446fea1 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1484.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1484.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.203", "lastModified": "2024-11-21T08:50:40.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json index b51aa4f4146..b2711666351 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1492.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:51.933", "lastModified": "2024-11-21T08:50:41.923", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpify:woo_czech:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.9", + "matchCriteriaId": "63AC5024-D38B-4412-AF06-F4E30624B21A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037482%40wpify-woo%2Ftrunk&old=3028980%40wpify-woo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44f691f2-b3f4-49b7-8710-015b5b11db18?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037482%40wpify-woo%2Ftrunk&old=3028980%40wpify-woo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44f691f2-b3f4-49b7-8710-015b5b11db18?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json index 3402b01dcb1..9316ba99b36 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1509.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1509.json index 665d25687e3..98148991167 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1509.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1509.json @@ -3,12 +3,16 @@ "sourceIdentifier": "sirt@brocade.com", "published": "2025-02-28T22:15:38.573", "lastModified": "2025-02-28T22:15:38.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Brocade ASCG before 3.2.0 Web Interface is not \nenforcing HSTS, as defined by RFC 6797. HSTS is an optional response \nheader that can be configured on the server to instruct the browser to \nonly communicate via HTTPS. The lack of HSTS allows downgrade attacks, \nSSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking \nprotections." + }, + { + "lang": "es", + "value": "La interfaz web de Brocade ASCG anterior a la versi\u00f3n 3.2.0 no aplica HSTS, tal como se define en RFC 6797. HSTS es un encabezado de respuesta opcional que se puede configurar en el servidor para indicar al navegador que solo se comunique a trav\u00e9s de HTTPS. La falta de HSTS permite ataques de degradaci\u00f3n, ataques de intermediarios que eliminan SSL y debilita las protecciones contra el secuestro de cookies." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1516.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1516.json index af3981201db..6d9d10ea696 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1516.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1516.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1521.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1521.json index 61b63406978..0cad4b6d9f3 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1521.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:48.793", "lastModified": "2024-11-21T08:50:44.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json index d16123c3e13..ebb6d86b763 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1566.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1585.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1585.json index 5705053ac84..2f4155e4eb8 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1585.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1585", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:24.780", - "lastModified": "2024-11-21T08:50:53.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:24:35.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.8.4", + "matchCriteriaId": "4E004A42-8E07-4621-90B0-22B14BF2541D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/metform/trunk/utils/util.php#L555", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/metform/tags/3.8.3&old=3047398&new_path=/metform/tags/3.8.4&new=3047398&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342d6941-6987-4756-b554-1699128b9108?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/metform/trunk/utils/util.php#L555", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/metform/tags/3.8.3&old=3047398&new_path=/metform/tags/3.8.4&new=3047398&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342d6941-6987-4756-b554-1699128b9108?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1595.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1595.json index 417b64c895c..36304b2f825 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1595.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1595", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-29T20:15:41.227", - "lastModified": "2024-11-21T08:50:54.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-b:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0.0.4", + "matchCriteriaId": "1FDB1A38-9200-4286-B14C-7C06CF2A3DFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.0.94", + "matchCriteriaId": "7B95D4E6-DE93-40AD-B9F1-E4230FBA3AEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-053-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-053-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json index 33b97194b6d..0bdd0f7f60b 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1604", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-18T10:15:19.900", - "lastModified": "2024-11-21T08:50:55.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 } ] }, @@ -49,32 +69,86 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.20", + "versionEndExcluding": "9.0.20.238", + "matchCriteriaId": "87B57AF2-7AB2-48C3-A85B-A918033C70AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.21", + "versionEndExcluding": "9.0.21.201", + "matchCriteriaId": "8F86D69B-93E8-42A3-8D24-CDB59F33A388" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json index 6440550d804..e320e42e220 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1605", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-18T10:15:20.583", - "lastModified": "2024-11-21T08:50:55.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,32 +69,86 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.20", + "versionEndExcluding": "9.0.20.238", + "matchCriteriaId": "87B57AF2-7AB2-48C3-A85B-A918033C70AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.21", + "versionEndExcluding": "9.0.21.201", + "matchCriteriaId": "8F86D69B-93E8-42A3-8D24-CDB59F33A388" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json index c59bdc04549..42cc3ad46b1 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1606", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-18T10:15:20.863", - "lastModified": "2024-11-21T08:50:55.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,32 +69,86 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.20", + "versionEndExcluding": "9.0.20.238", + "matchCriteriaId": "87B57AF2-7AB2-48C3-A85B-A918033C70AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmc:control-m:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.21", + "versionEndExcluding": "9.0.21.201", + "matchCriteriaId": "8F86D69B-93E8-42A3-8D24-CDB59F33A388" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/03/CVE-2024-1604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.bmc.com/it-solutions/control-m.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json index dac3c40d30b..f6de3ec472e 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json index e95ac72d5c6..ad08c3223b5 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "help@fluidattacks.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1690.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1690.json index b918d145a2b..b7cae3056d6 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1690.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1690.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json index c5e1c5693c0..148b2f29220 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1710.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json index 1c7557d331d..a455253b163 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1719", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T10:15:09.143", - "lastModified": "2024-11-21T08:51:09.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,93 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040958%40contact-form-7-paypal-add-on&new=3040958%40contact-form-7-paypal-add-on&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040962%40wp-ecommerce-paypal&new=3040962%40wp-ecommerce-paypal&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5276227-9bd4-4ad8-a6b7-ac7d05e8b056?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040958%40contact-form-7-paypal-add-on&new=3040958%40contact-form-7-paypal-add-on&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040962%40wp-ecommerce-paypal&new=3040962%40wp-ecommerce-paypal&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5276227-9bd4-4ad8-a6b7-ac7d05e8b056?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json index 00a60894377..e5e256c0d3c 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json index d7583ae5c57..fbb9e43f099 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1791", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:43.530", - "lastModified": "2024-11-21T08:51:19.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vickyagravat:codemirror_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "9AD01497-1DE5-48CB-ADE6-FEF8D9244E1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/wp-codemirror-block/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52569aac-1e9e-40fb-9ff4-5eeb7940375d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/wp-codemirror-block/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52569aac-1e9e-40fb-9ff4-5eeb7940375d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1799.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1799.json index 3a4754cb6ca..1379e73d6de 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1799.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1799.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json index f3ad8d131a0..816866eca42 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1847.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3DS.Information-Security@3ds.com", "published": "2024-02-28T18:15:45.687", "lastModified": "2024-11-21T08:51:26.793", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -73,16 +93,73 @@ "value": "CWE-908" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-787" + }, + { + "lang": "en", + "value": "CWE-843" + }, + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3ds:solidworks:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023", + "versionEndExcluding": "2024", + "matchCriteriaId": "6E2C377D-5C3B-4CCF-A630-F3AD269244AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3ds:solidworks:2024:-:*:*:*:*:*:*", + "matchCriteriaId": "0CA272B2-F40A-4542-B3F8-478FFC5F710F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3ds:solidworks:2024:sp1.0:*:*:*:*:*:*", + "matchCriteriaId": "6BCF2809-67CA-449B-87BA-1B1B3E58D10C" + } + ] + } + ] } ], "references": [ { "url": "https://www.3ds.com/vulnerability/advisories", - "source": "3DS.Information-Security@3ds.com" + "source": "3DS.Information-Security@3ds.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.3ds.com/vulnerability/advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json index 9410fbf70c5..93ffba8c6c6 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product.security@lge.com", "published": "2024-02-26T16:27:54.720", "lastModified": "2024-11-21T08:51:31.503", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lg:webos_signage:6.0.0-56:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2033A-EBC6-406C-9C41-2D3A8F6D928E" + } + ] + } + ] } ], "references": [ { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "product.security@lge.com" + "source": "product.security@lge.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json index 9a3541c57f2..1ba7aeba05d 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1886.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product.security@lge.com", "published": "2024-02-26T16:27:54.937", "lastModified": "2024-11-21T08:51:31.620", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-35" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lg:webos_signage:6.0.0-56:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2033A-EBC6-406C-9C41-2D3A8F6D928E" + } + ] + } + ] } ], "references": [ { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "product.security@lge.com" + "source": "product.security@lge.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json index 13dad332ea1..44b77f1b522 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1889.json @@ -49,7 +49,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json index 9f2a03929ad..5e3b08b1703 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1941.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1941.json index b84257c404f..29ccaa512c8 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1941.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1941", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T01:15:07.110", - "lastModified": "2024-11-21T08:51:39.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:cncsoft-b:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0.0.4", + "matchCriteriaId": "1FDB1A38-9200-4286-B14C-7C06CF2A3DFF" + } + ] + } + ] } ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-060-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-060-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json index 52e24c06a82..62e3eda207c 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1954", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:43.693", - "lastModified": "2024-11-21T08:51:40.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oliverpos:oliver_pos:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.1.9", + "matchCriteriaId": "6BE329D3-889F-400A-95B9-4FA7F2A22F72" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035108%40oliver-pos&new=3035108%40oliver-pos&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88d16ce2-a1cf-4402-b140-3cab17f8c638?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035108%40oliver-pos&new=3035108%40oliver-pos&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88d16ce2-a1cf-4402-b140-3cab17f8c638?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json index 88394f2dcf1..69db4c0bb94 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:21.177", "lastModified": "2024-11-21T08:51:41.337", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1965.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1965.json index 66d2aac324e..ee0b7fe3f9f 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1965.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1965", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-28T13:15:07.987", - "lastModified": "2024-11-21T08:51:41.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haivision:maanager:*:*:*:*:*:*:*:*", + "matchCriteriaId": "919B2376-4F8F-4027-9E69-A9733D3B2930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haivision:streamhub:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9F7C8DC0-28A9-459B-9603-FD129EBBD050" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-vulnerability-haivision-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-vulnerability-haivision-products", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1986.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1986.json index 7678ee0e63a..46ece8e77cb 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1986.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T21:15:08.013", "lastModified": "2024-11-21T08:51:44.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json index a6e2f4183ac..c2339255cc2 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json index 8aea31d3279..eea4b49c9b4 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20765.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20915.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20915.json index 97ec38cc111..801576a298b 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20915.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20915.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:46.443", "lastModified": "2024-11-21T08:53:25.420", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json index e513958ca20..c2a1194a8aa 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:49.520", "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json index 7e17b41c2d2..e63c0de81d2 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2005", "sourceIdentifier": "7bd90cf1-1651-495e-9ae8-9415fb3c9feb", "published": "2024-03-06T12:15:45.827", - "lastModified": "2024-11-21T09:08:47.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blueplanet:inventyory:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.12", + "matchCriteriaId": "4DDDA5A9-9F75-4CD8-8094-3876232E53C8" + } + ] + } + ] } ], "references": [ { "url": "https://www.ciena.com/product-security", - "source": "7bd90cf1-1651-495e-9ae8-9415fb3c9feb" + "source": "7bd90cf1-1651-495e-9ae8-9415fb3c9feb", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.ciena.com/product-security", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2006.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2006.json index 0b0463a7bcf..de875581997 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2006.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2006.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:30.897", "lastModified": "2024-11-21T09:08:47.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2045.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2045.json index c725fd6cdb8..590e8b4702c 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2045.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2045", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-03-01T00:15:52.493", - "lastModified": "2024-11-21T09:08:55.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,22 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opft:session:1.17.5:*:*:*:*:android:*:*", + "matchCriteriaId": "E955A49B-FF35-4AC4-AD90-E7F17EE69811" + } + ] + } + ] + } + ], "references": [ { "url": "https://fluidattacks.com/advisories/newman/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/oxen-io/session-android/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/newman/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/oxen-io/session-android/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2057.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2057.json index d8a0f5af0b0..5e186ca396e 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2057.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2057", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T12:15:48.670", - "lastModified": "2024-11-21T09:08:56.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,46 +96,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langchain:langchain:0.0.26:*:*:*:community:*:*:*", + "matchCriteriaId": "7FE97EB1-8093-4478-B653-B69EBBA0B607" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-16", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/langchain-ai/langchain/pull/18695", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.255372", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255372", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/bayuncao/vul-cve-16", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/langchain-ai/langchain/pull/18695", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.255372", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255372", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2075.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2075.json index bd076a7ce59..818f0a80e67 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2075.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T18:15:29.337", "lastModified": "2024-11-21T09:08:59.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:daily_habit_tracker:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "90CBBC5D-B0F2-4BC3-8306-984E7B239BE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.255391", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255391", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.255391", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255391", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2076.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2076.json index 1503b89b190..b0c79fb0c62 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2076.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2076", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T19:15:07.247", - "lastModified": "2024-11-21T09:08:59.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -76,30 +76,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:human_resource_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DB20CFC6-02D1-4450-93F7-8C2BF9847907" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qq.com/doc/DYlREVXpuRUFwRFpQ", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255392", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255392", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.qq.com/doc/DYlREVXpuRUFwRFpQ", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255392", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255392", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2078.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2078.json index b5f696bd65c..704fdaf66d0 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2078.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2078", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-01T12:15:49.100", - "lastModified": "2024-11-21T09:08:59.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:helpdeskz:helpdeskz:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.2", + "matchCriteriaId": "C518692B-C31B-4863-87D9-14F545723892" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-helpdeskz", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-helpdeskz", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21034.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21034.json index 7b42394ea6e..c809881c1ba 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21034.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21034.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21101.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21101.json index 8c45aced810..bce941a2495 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21101.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21101.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21118.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21118.json index 5f4ad081773..1efd9042e0f 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21118.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21118.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21150.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21150.json index 6d455b71823..0a96b4998c1 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21150.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21150.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json index 81bf0afebc6..552bbec691c 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L", diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21598.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21598.json index 521f029cf6c..4b6ed36edb3 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21598.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21598.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21605.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21605.json index aad82a3d790..741c47157ad 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21605.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21605.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json index c2ad8d36de4..e9e737e43ad 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21609", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:23.770", - "lastModified": "2024-11-21T08:54:42.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,22 +95,684 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D4A86D-BDB4-4A01-96FE-7E023C58074B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE06B18-BFB5-4029-A05D-386CFBFBF683" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48A1DCCD-208C-46D9-8E14-89592B49AB9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "826F893F-7B06-43B5-8653-A8D9794C052E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "462CFD52-D3E2-4F7A-98AC-C589D2420556" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B10DFCE-5331-4D79-8D9F-EF84743493D3" + } + ] + } + ] + } + ], "references": [ { "url": "http://supportportal.juniper.net/JSA75750", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Not Applicable" + ] }, { "url": "http://supportportal.juniper.net/JSA75750", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json index 9a5e98f7edd..5e9ff7c912a 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21610", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:23.950", - "lastModified": "2024-11-21T08:54:42.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -93,24 +113,636 @@ "value": "CWE-755" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72952BFC-45B9-4379-8D9A-A10132CC34EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52699E2B-450A-431C-81E3-DC4483C8B4F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C39DA74D-F5C7-4C11-857D-50631A110644" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F72C850A-0530-4DB7-A553-7E19F82122B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FE2089C-F341-4DC1-B76D-633BC699306D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B557965-0040-4048-B56C-F564FF28635B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB875EBD-A3CD-4466-B2A3-39D47FF94592" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA75751", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Not Applicable" + ] }, { "url": "http://supportportal.juniper.net/JSA75751", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json index 868bc1e85df..aec55d07e28 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json index c7090609970..f076884a68f 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json index 2e92ac19bc2..d9a69bc9742 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21677", "sourceIdentifier": "security@atlassian.com", "published": "2024-03-19T17:15:09.837", - "lastModified": "2024-11-21T08:54:50.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-12T01:28:42.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,22 +61,95 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13.0", + "versionEndExcluding": "7.19.20", + "matchCriteriaId": "D3610D21-039C-44BC-A7B7-C811A8B63C66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.20.0", + "versionEndExcluding": "8.5.7", + "matchCriteriaId": "9C6BCADE-F919-4383-9590-657B55FC2038" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndExcluding": "8.8.1", + "matchCriteriaId": "940C0A51-20D3-4A2B-B7CB-D3510BC39BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13.0", + "versionEndExcluding": "7.19.20", + "matchCriteriaId": "504EF14C-2CBF-44F7-8E32-C8DB686767CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.20.0", + "versionEndExcluding": "8.5.7", + "matchCriteriaId": "95D064BC-D0CA-45E4-96EA-D0A5CE3631CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1369444862", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/CONFSERVER-94604", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1369444862", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/CONFSERVER-94604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json index 0863bf229c2..47f520bb641 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@joomla.org", "published": "2024-02-15T21:15:09.220", "lastModified": "2024-12-03T16:15:21.030", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json index 44bda996558..e69e1a910b3 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json index 4b3a8c132bd..e1e990b9a1f 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-28T13:15:08.197", "lastModified": "2024-11-21T08:55:11.417", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json index ac8943fb693..469ec9fb871 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-28T13:15:08.440", "lastModified": "2024-11-21T08:55:11.603", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2121.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2121.json index 607ef76157f..60a5c558d79 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2121.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2121.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:53.760", "lastModified": "2024-11-21T09:09:04.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2123.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2123.json index 8ec012817e4..01f0c9eb28b 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2123.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2123", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T10:15:08.373", - "lastModified": "2024-11-21T09:09:04.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T19:31:33.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,65 +36,157 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.4", + "matchCriteriaId": "CD6EDDFC-2795-417D-9C8A-0B290568C641" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L44", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L53", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L65", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L53", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046611/ultimate-member#file746", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bc1653-8fee-468a-bb6d-f24959846ee5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L44", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L53", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-grid.php#L65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members-list.php#L53", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046611/ultimate-member#file746", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bc1653-8fee-468a-bb6d-f24959846ee5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2188.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2188.json index 2523ac39de9..b878ea35686 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2188.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2188.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2188", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-05T13:15:07.203", - "lastModified": "2024-11-21T09:09:13.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:archer_ax50_firmware:1.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "DCC1E3E0-5102-445B-8893-E51CD2B2351F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:archer_ax50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68C39CEB-FAC7-4EF7-A7DF-59EFB27F0B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-tp-link-archer-ax50", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-tp-link-archer-ax50", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22100.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22100.json index d5f95d37e67..0ddb701bd7a 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22100.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22100", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T01:15:07.330", - "lastModified": "2024-11-21T08:55:35.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microdicom:dicom_viewer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1", + "matchCriteriaId": "FCB759EB-FAF5-4952-ABEB-0DAC418A5846" + } + ] + } + ] } ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-060-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] }, { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-060-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json index 8fa651d79f5..bff33f3004e 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json index bbf876440ad..5e1c861899e 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22267.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22267.json index 6f5436c95dc..85a74e95574 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22267.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22267", "sourceIdentifier": "security@vmware.com", "published": "2024-05-14T16:16:06.610", - "lastModified": "2024-11-21T08:55:55.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,103 @@ }, "exploitabilityScore": 2.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.5.2", + "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.5.2", + "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22268.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22268.json index 6a19fbf203f..0885c2679b7 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22268.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22268", "sourceIdentifier": "security@vmware.com", "published": "2024-05-14T16:16:07.643", - "lastModified": "2024-11-21T08:55:55.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,115 @@ }, "exploitabilityScore": 2.5, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.5.2", + "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.5.2", + "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json index a3ead9ba2c3..175281c2423 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22316", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-27T16:15:30.637", - "lastModified": "2025-01-27T16:15:30.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T14:08:19.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,51 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "BE64CEDD-66BE-4EE2-9B71-6524F63070A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.1", + "matchCriteriaId": "1DC0BFA3-EC19-445A-B049-51217DAF0A18" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176083", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json index 5d2fe9cd088..2c040b8d650 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22329", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-17T02:15:10.947", - "lastModified": "2024-11-21T08:56:03.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "8.5.0.0", + "versionEndExcluding": "8.5.5.26", + "matchCriteriaId": "60817E19-772E-41E5-A26C-CA22271E6B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "9.0.0.0", + "versionEndExcluding": "9.0.5.20", + "matchCriteriaId": "8E4EFF90-4986-4731-B7FF-5B84FC1D237E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*", + "versionStartIncluding": "17.0.0.3", + "versionEndExcluding": "24.0.0.4", + "matchCriteriaId": "D9BF761A-F1C6-40F9-BAC4-9CFB9C80FF70" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279951", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7148380", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7148380", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22354.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22354.json index adb0b63fed6..703e74fc76b 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22354.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22354", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-17T01:15:06.747", - "lastModified": "2024-11-21T08:56:06.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.7 } ] }, @@ -51,22 +71,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "8.5.0.0", + "versionEndExcluding": "8.5.5.26", + "matchCriteriaId": "60817E19-772E-41E5-A26C-CA22271E6B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "9.0.0.0", + "versionEndExcluding": "9.0.5.20", + "matchCriteriaId": "8E4EFF90-4986-4731-B7FF-5B84FC1D237E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*", + "versionStartIncluding": "17.0.0.3", + "versionEndExcluding": "24.0.0.6", + "matchCriteriaId": "64CB0E7B-4685-497B-B167-F7C7BC42B4D6" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280401", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7148426", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280401", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7148426", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2245.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2245.json index eb142a1aacc..ea74b914156 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2245.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2245", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-07T13:15:07.590", - "lastModified": "2024-11-21T09:09:20.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:24:40.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "90FBE733-9D6E-42A6-989D-80264913A262" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-mozilocms", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-mozilocms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2297.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2297.json index 3a2dbb1b2c1..65c994a7cc4 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2297.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T06:15:21.477", "lastModified": "2025-02-27T06:15:21.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23186.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23186.json index 0a89b533d66..ee6b686b955 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23186.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23186.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23186", "sourceIdentifier": "security@open-xchange.com", "published": "2024-05-06T07:15:06.450", - "lastModified": "2024-11-21T08:57:09.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,32 +69,82 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.22", + "matchCriteriaId": "7554B880-74F3-4579-877E-E0E0DB12765B" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23187.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23187.json index b994ec31a34..6c3781239fd 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23187.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23187.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23187", "sourceIdentifier": "security@open-xchange.com", "published": "2024-05-06T07:15:06.850", - "lastModified": "2024-11-21T08:57:09.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,32 +69,82 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.22", + "matchCriteriaId": "7554B880-74F3-4579-877E-E0E0DB12765B" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23193.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23193.json index 4c948a289be..22f8f6e8c28 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23193.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23193", "sourceIdentifier": "security@open-xchange.com", "published": "2024-05-06T07:15:07.533", - "lastModified": "2024-11-21T08:57:09.963", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,82 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.22", + "matchCriteriaId": "7554B880-74F3-4579-877E-E0E0DB12765B" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "security@open-xchange.com" + "source": "security@open-xchange.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/releases/8.22/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json index 9dba484d0a4..76058aaab84 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json index 91fbf93dc5a..29a86062f2b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23604.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23604.json index 33cf555d517..7941813a0ff 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23604.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T08:15:06.233", "lastModified": "2024-11-21T08:57:59.313", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,117 @@ "value": "Existe una vulnerabilidad de cross-site scripting en todas las versiones de FitNesse, lo que puede permitir que un atacante remoto no autenticado ejecute un script arbitrario en el navegador web del usuario que utiliza el producto y accede a un enlace con m\u00faltiples par\u00e1metros especialmente manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cleancoder:fitnesse:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71A59A29-FEB6-49B6-9B52-7E9CD485C8CC" + } + ] + } + ] + } + ], "references": [ { "url": "http://fitnesse.org/FitNesseDownload", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Release Notes", + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://jvn.jp/en/jp/JVN94521208/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://fitnesse.org/FitNesseDownload", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://jvn.jp/en/jp/JVN94521208/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json index 1f5542802a7..2ff5fe3f1a2 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json index 306df254866..dbef263a098 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json index 8f492a7e474..1bd2d61bfa7 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json index dfbd7c465f8..55f88caab12 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json index 7d47579609a..0cf60de1420 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json index 1e8c4577163..86221fa5a79 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2308.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2308.json index 026bb6b43f1..2ff9c099a95 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2308.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2308.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-16T02:15:09.380", "lastModified": "2024-11-21T09:09:28.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.3", + "matchCriteriaId": "4E3B6D9A-FE1D-4E48-BDC7-1ED999DB96CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3050556%40elementinvader-addons-for-elementor&new=3050556%40elementinvader-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40a272dc-cb2a-472f-be42-733efcb2fa61?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3050556%40elementinvader-addons-for-elementor&new=3050556%40elementinvader-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40a272dc-cb2a-472f-be42-733efcb2fa61?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2321.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2321.json index a4088e85669..45f365b20a5 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2321.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "published": "2025-02-27T05:15:13.797", "lastModified": "2025-02-27T05:15:13.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json index 114970628ac..4ba1eec3833 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json index 510d32d70fd..af417cfa2c8 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json index ea6fe07075f..63be8d54cfd 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T21:15:58.870", "lastModified": "2024-11-21T08:58:55.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json index 032023cec35..b2823490250 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24389", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T02:15:51.970", - "lastModified": "2024-11-21T08:59:13.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T12:24:40.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en XunRuiCMS hasta v4.6.2 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Agregar nombre de columna." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.6.2", + "matchCriteriaId": "841354CA-9629-4EB7-946B-7A32F135336B" + } + ] + } + ] + } + ], "references": [ { "url": "https://j11zuc9f0h2.feishu.cn/docx/TXRmdIcH3ocn1WxuEQBcNPpjnLe", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://j11zuc9f0h2.feishu.cn/docx/TXRmdIcH3ocn1WxuEQBcNPpjnLe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24583.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24583.json index d0981bcfe89..fdb0220ae0f 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24583.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24583.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24584.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24584.json index 3bc06900c9e..ba17c8f090d 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24584.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24584.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24684.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24684.json index 687ed5dfab2..9e2cb167093 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24684.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24684.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24685.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24685.json index 23db8133263..ccf8f653468 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24685.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24685.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24686.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24686.json index 6587da261fd..8bbf62789af 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24686.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24686.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24778.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24778.json index 402b80d77ba..affc29b5e32 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24778.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@apache.org", "published": "2025-03-03T11:15:11.113", "lastModified": "2025-03-03T18:15:28.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper privilege management in a REST interface allowed registered users to access unauthorized resources if the resource ID was know. \n\n\n\n\n\nThis issue affects Apache StreamPipes: through 0.95.1.\n\nUsers are recommended to upgrade to version 0.97.0 which fixes the issue." + }, + { + "lang": "es", + "value": "La administraci\u00f3n incorrecta de privilegios en una interfaz REST permit\u00eda a los usuarios registrados acceder a recursos no autorizados si se conoc\u00eda el ID del recurso. Este problema afecta a Apache StreamPipes: hasta la versi\u00f3n 0.95.1. Se recomienda a los usuarios que actualicen a la versi\u00f3n 0.97.0, que soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24799.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24799.json index 2429b9dc02a..574463d5c56 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24799.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T12:15:50.100", "lastModified": "2024-11-21T08:59:44.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json index 002bea18dcf..0ba6642bb83 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json index 74f332a7c3f..b55d0da11ca 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@openanolis.org", "published": "2024-02-05T08:15:44.533", "lastModified": "2025-02-13T18:17:10.400", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,6 +86,21 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, { "nodes": [ { @@ -102,8 +117,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0", - "versionEndIncluding": "6.7.2", - "matchCriteriaId": "531D8406-3925-4647-9961-38BC93A02F16" + "versionEndIncluding": "6.6.25", + "matchCriteriaId": "CBFBE47C-5AB9-45C5-BA55-7585C9AD335E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" }, { "vulnerable": true, @@ -125,11 +147,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "security@openanolis.org" + "source": "security@openanolis.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "security@openanolis.org" + "source": "security@openanolis.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8155", @@ -140,11 +168,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json index b2583a304a1..28698e97be9 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@openanolis.org", "published": "2024-02-05T08:15:44.713", "lastModified": "2025-02-13T18:17:10.597", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -82,6 +82,21 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, { "nodes": [ { @@ -98,8 +113,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0", - "versionEndIncluding": "6.7.2", - "matchCriteriaId": "531D8406-3925-4647-9961-38BC93A02F16" + "versionEndIncluding": "6.6.25", + "matchCriteriaId": "CBFBE47C-5AB9-45C5-BA55-7585C9AD335E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndIncluding": "6.7.12", + "matchCriteriaId": "0C4924A5-09DE-40CB-A629-804F14AEDEC1" }, { "vulnerable": true, @@ -121,11 +143,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "security@openanolis.org" + "source": "security@openanolis.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "security@openanolis.org" + "source": "security@openanolis.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8154", @@ -136,11 +164,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24868.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24868.json index 37368383693..8c31e682a85 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24868.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24868", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T13:15:08.673", - "lastModified": "2024-11-21T08:59:52.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.70", + "matchCriteriaId": "1D50DEED-3345-4207-BADA-340C7F40CE24" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-contributor-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-contributor-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json index 8858710dd77..33d5589c6c2 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json index ea1b9235bfb..397289d4f9d 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json index 52388642962..d2c2c758e89 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json index a8ed3c74b99..1a31b464876 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json index c56b3a20f07..86ea6b6f662 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json index 2abc67d5483..9d2af3becb0 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json index 32bf6179803..7fc01beb3a5 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json index e3f9f1600da..988b2b9cf51 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json index 1aee2bd62a7..f5e52be44a9 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json index 84282ff7dbe..b105db8e287 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json index a79c496aaf1..b7836cc2537 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json index 12ade1ee1ff..bcd039faca1 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json index d9223b4c8c9..8c4b396e174 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json index 459bd631efa..7d2d6993e2a 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25034", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-24T16:15:34.747", - "lastModified": "2025-01-24T16:15:34.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "965D63C3-4927-4C7A-9509-017A73A0E7A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "69029120-4E5D-4C3A-8CE0-391D43156DAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7168387", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json index fb7452c4fe1..4ee6727bffa 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T16:15:46.517", "lastModified": "2024-11-21T09:00:44.967", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25552.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25552.json index b99e7d0c778..20f4478d247 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25552.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25552", "sourceIdentifier": "info@cert.vde.com", "published": "2024-03-01T08:15:37.660", - "lastModified": "2024-11-21T09:00:58.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wut:com_port_redirector_legacy:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.93", + "matchCriteriaId": "C890C2C9-28E6-4F6D-8D2A-184498864398" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wut:com_port_redirector_plug_\\&_play:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.42", + "matchCriteriaId": "63B43D55-40DE-4854-BA22-0E63CE31D54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wut:opc_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.88", + "matchCriteriaId": "E77CAEB4-8973-4B38-9F9A-6765498F7761" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-018", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.vde.com/en/advisories/VDE-2024-018", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25578.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25578.json index afbfeb73883..5b001cab2c5 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25578.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25578", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-01T01:15:07.550", - "lastModified": "2024-11-21T09:01:01.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microdicom:dicom_viewer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1", + "matchCriteriaId": "FCB759EB-FAF5-4952-ABEB-0DAC418A5846" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-060-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] }, { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-060-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json index c42e5c3d65a..7124868358d 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cna@sap.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json index 6d262aa8357..0df6d06f0f7 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25711", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T02:15:06.763", - "lastModified": "2024-11-21T09:01:15.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,117 @@ "value": "diffoscope anterior a 256 permite el directory traversal a trav\u00e9s de un nombre de archivo incrustado en un archivo GPG. El contenido de cualquier archivo, como ../.ssh/id_rsa, puede revelarse a un atacante. Esto ocurre porque el valor de la opci\u00f3n gpg --use-embedded-filenames es confiable." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reproducible_builds:diffoscope:*:*:*:*:*:*:*:*", + "versionEndExcluding": "256", + "matchCriteriaId": "FF7A94C1-CE88-4A06-90BD-80D33FCEDCA1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25902.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25902.json index b5e7438c2f3..2d0f649ffcb 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25902.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25902", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T13:15:08.890", - "lastModified": "2024-11-21T09:01:32.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:malware_scanner:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.3", + "matchCriteriaId": "890C6A96-7C3F-440C-8CB5-81FF84E9C469" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/miniorange-malware-protection/wordpress-malware-scanner-plugin-4-7-2-admin-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/miniorange-malware-protection/wordpress-malware-scanner-plugin-4-7-2-admin-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json index c1c2c90251e..e2b3f50eb4c 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25905.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25910.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25910.json index a74ba4d75ce..944a01f351b 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25910.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25910", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T13:15:09.093", - "lastModified": "2024-11-21T09:01:33.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:skymoonlabs:moveto:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.2", + "matchCriteriaId": "A090DE01-DD65-4048-A64C-44C991FCED26" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/moveto/wordpress-moveto-plugin-6-2-unauthenticated-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/moveto/wordpress-moveto-plugin-6-2-unauthenticated-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25927.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25927.json index 52b6f8f37f9..48eb6552f2e 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25927.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25927", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T13:15:09.310", - "lastModified": "2024-11-21T09:01:35.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:24:19.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jmash:postmash:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.0", + "matchCriteriaId": "B78E6213-BC1E-4AA9-8E3B-62B6907E42BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2514.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2514.json index 86628c012e3..9c25d667428 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2514.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2514.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T23:15:08.423", "lastModified": "2024-11-21T09:09:55.013", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20Auth%20bypass%20-%20login.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20Auth%20bypass%20-%20login.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2534.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2534.json index 3cf10bdec32..d62b88e7e99 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2534.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T00:15:06.977", "lastModified": "2025-03-03T16:40:55.250", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json index 0d39fc98e55..29bbb5853af 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json index 2cac42f01c9..3223d62bc3f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2554", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T05:15:06.040", - "lastModified": "2024-11-21T09:09:59.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257053", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257053", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json index 62ba174df5d..168f2026f2e 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26802", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.110", - "lastModified": "2024-11-21T09:03:06.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,182 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: stmmac: Borrar variable al destruir la cola de trabajo Actualmente, al suspender el controlador y detener la cola de trabajo, se verifica si la cola de trabajo no es NULL y, de ser as\u00ed, se destruye. La funci\u00f3n destroy_workqueue() drena la cola y borra la variable, pero no establece la variable de la cola de trabajo en NULL. Esto puede causar p\u00e1nico en el n\u00facleo/m\u00f3dulo si el c\u00f3digo intenta borrar la cola de trabajo que no se inicializ\u00f3. Este escenario es posible al reanudar el controlador suspendido en stmmac_resume(), porque no hay control para stmmac_hw_setup() fallido, que puede fallar y regresar si el motor DMA no se pudo inicializar y la cola de trabajo se inicializa despu\u00e9s del motor DMA. Si el motor DMA no se inicializa, la reanudaci\u00f3n se realizar\u00e1 normalmente, pero la interfaz no funcionar\u00e1 y la cola de TX eventualmente expirar\u00e1, lo que provocar\u00e1 el error \"Restablecer adaptador\". Esto luego destruye la cola de trabajo durante el proceso de reinicio. Y dado que la cola de trabajo se inicializa despu\u00e9s del motor DMA y se puede omitir, provocar\u00e1 p\u00e1nico en el n\u00facleo/m\u00f3dulo. Para protegerse contra este posible bloqueo, establezca la variable workqueue en NULL al destruir workqueue. El registro/rastreo del fallo es el siguiente: [88.031977]------------[ cortar aqu\u00ed ]------------ [88.031985]NETDEV WATCHDOG: eth0 (sxgmac) : Se agot\u00f3 el tiempo de espera de la cola de transmisi\u00f3n 1 [88.032017] ADVERTENCIA: CPU: 0 PID: 0 en net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398 [88.032251]---[fin de rastreo e70de432e4d5c2c0] --- [88.032282]sxgmac 16d88000.ethernet eth0: Restablecer el adaptador. [88.036359]------------[ cortar aqu\u00ed ]------------ [88.036519]Rastreo de llamadas: [88.036523] Flush_workqueue+0x3e4/0x430 [88.036528] Drain_workqueue+ 0xc4/0x160 [88.036533] destroy_workqueue+0x40/0x270 [88.036537] stmmac_fpe_stop_wq+0x4c/0x70 [88.036541] stmmac_release+0x278/0x280 [88.036546] __dev_close_many+0xcc/0 x158 [88.036551] dev_close_many+0xbc/0x190 [88.036555] dev_close.part. 0+0x70/0xc0 [88.036560] dev_close+0x24/0x30 [88.036564] stmmac_service_task+0x110/0x140 [88.036569] Process_one_work+0x1d8/0x4a0 [88.036573] trabajador_thread+0x54/0x408 [8 8.036578] kthread+0x164/0x170 [88.036583] ret_from_fork+ 0x10/0x20 [88.036588]---[fin de seguimiento e70de432e4d5c2c1]--- [88.036597]No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000004" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.151", + "matchCriteriaId": "853CEBB6-8069-462F-83BC-C65A106236DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.81", + "matchCriteriaId": "EC825B0E-DFCA-4034-9B92-F111A4E2A732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "B19074A2-9FE5-4E7D-9E2D-020F95013ADA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json index 4afe6db6f79..2fec6975bd0 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26842", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.997", - "lastModified": "2024-11-21T09:03:11.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de cambio en ufshcd_clear_cmd() Cuando task_tag >= 32 (en modo MCQ) y sizeof(unsigned int) == 4, 1U << task_tag ser\u00e1 fuera de los l\u00edmites para una m\u00e1scara u32. Solucione esto para evitar SHIFT_ISSUE (desplazamientos bit a bit que est\u00e1n fuera de los l\u00edmites de su tipo de datos). [nombre:debug_monitors&]Excepci\u00f3n inesperada de BRK del kernel en EL1 [nombre:traps&]Error interno: controlador BRK: 00000000f2005514 [#1] PREEMPT SMP [nombre:mediatek_cpufreq_hw&]cpufreq detiene el registro DVFS hecho [nombre:mrdump&]Kernel Offset: 0x1ba5800000 de 0xffffffc0 08000000 [nombre:mrdump&]PHYS_OFFSET: 0x80000000 [nombre:mrdump&]pstate: 22400005 (nzCv daif +PAN -UAO) [nombre:mrdump&]pc: [0xffffffdbaf52bb2c] ufshcd_clear_cmd+0x280/0x288 [nombre:mrdump&]lr: [0xffffffdbaf52 a774] ufshcd_wait_for_dev_cmd +0x3e4/0x82c [nombre:mrdump&]sp: ffffffc0081471b0 Cola de trabajo: ufs_eh_wq_0 ufshcd_err_handler Rastreo de llamadas: dump_backtrace+0xf8/0x144 show_stack+0x18/0x24 dump_stack_lvl+0x78/0x9c dump_stack+0x1 8/0x44 mrdump_common_die+0x254/0x480 [mrdump] ipanic_die+0x20/0x30 [mrdump] notify_die+0x15c/0x204 die+0x10c/0x5f8 arm64_notify_die+0x74/0x13c do_debug_exception+0x164/0x26c el1_dbg+0x64/0x80 el1h_64_sync_handler+0x3c/0x90 el 1h_64_sync+0x68/0x6c ufshcd_clear_cmd+0x280/0x288 ufshcd_wait_for_dev_cmd+ 0x3e4/0x82c ufshcd_exec_dev_cmd+0x5bc/0x9ac ufshcd_verify_dev_init+0x84/0x1c8 ufshcd_probe_hba+0x724/0x1ce0 ufshcd_host_reset_and_restore+0x260/0x574 ufshcd_reset_and_restore+0x13 8/0xbd0 ufshcd_err_handler+0x1218/0x2f28 proceso_one_work+0x5fc/0x1140 trabajador_thread+0x7d8/0xe20 kthread+0x25c/0x468 ret_from_fork+ 0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "2C48661B-D5EB-4653-8E9E-92897A23FB1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7ac9e18f5d66087cd22751c5c5bf0090eb0038fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a992425d18e5f7c48931121993c6c69426f2a8fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b513d30d59bb383a6a5d6b533afcab2cee99a8f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7ac9e18f5d66087cd22751c5c5bf0090eb0038fe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a992425d18e5f7c48931121993c6c69426f2a8fb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b513d30d59bb383a6a5d6b533afcab2cee99a8f8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json index 6be99510ee3..25f9f2d1ce1 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26850.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26850", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.427", - "lastModified": "2024-11-21T09:03:12.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,146 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/debug_vm_pgtable: corrige BUG_ON con la prueba avanzada de pud. Las arquitecturas como powerpc agregan comprobaciones de depuraci\u00f3n para garantizar que solo encontremos entradas devmap PUD pte. Estas comprobaciones de depuraci\u00f3n s\u00f3lo se realizan con CONFIG_DEBUG_VM. Este parche marca los ptes utilizados para las entradas de pte devmap de prueba avanzada de PUD para que no realicemos comprobaciones de depuraci\u00f3n en arquitectura como ppc64 como se muestra a continuaci\u00f3n. ADVERTENCIA: CPU: 2 PID: 1 en arch/powerpc/mm/book3s64/radix_pgtable.c:1382 radix__pud_hugepage_update+0x38/0x138 .... NIP [c0000000000a7004] radix__pud_hugepage_update+0x38/0x138 LR [c0000000000a7 7a8] radix__pudp_huge_get_and_clear+0x28/0x60 Llamada Trace: [C00000000004A2F950] [C000000004A2F9A0] 0xC00000000004A2F9A0 (poco confiable) [C00000000004A2F980] [000D34C10000000000] 0XD34C100000000 [C0000004A2F9A0] 118/0x334 [C000000004A2FA40] [C000000002206DB34] DEBUG_VM_PGTABLE+0XCBC/0X1C48 [C000000004A2FC10] [C00000000000FD28] Do_Onitcall+0x60 /0x388 \u00a1Tambi\u00e9n ERROR del kernel en arch/powerpc/mm/book3s64/pgtable.c:202! .... NIP [c000000000096510] pudp_huge_get_and_clear_full+0x98/0x174 LR [c00000000206bb34] pud_advanced_tests+0x1b4/0x334 Seguimiento de llamadas: [c000000004a2f950] 000] 0xd34c100000000 (no confiable) [c000000004a2f9a0] [c00000000206bb34] pud_advanced_tests+0x1b4/0x334 [c000000004a2fa40] [ c00000000206db34] debug_vm_pgtable+0xcbc/0x1c48 [c000000004a2fc10] [c00000000000fd28] do_one_initcall+0x60/0x388" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "084897EF-9F0A-4459-ADD9-E47D969EF093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json index d3db9538134..ea34c195511 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26856", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.740", - "lastModified": "2024-11-21T09:03:13.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,192 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sparx5: corrige el use after free dentro de sparx5_del_mact_entry Seg\u00fan el an\u00e1lisis est\u00e1tico del c\u00f3digo, parece que cuando se elimin\u00f3 una entrada de la tabla MAC, la entrada todav\u00eda se us\u00f3 despu\u00e9s de ser liberado. M\u00e1s precisamente, el video de mac_entry se us\u00f3 despu\u00e9s de llamar a devm_kfree en mac_entry. La soluci\u00f3n consiste en utilizar primero el vid de mac_entry para eliminar la entrada del HW y luego liberarla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.152", + "matchCriteriaId": "31916640-A446-4FEF-843D-B96BF45DF7B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.82", + "matchCriteriaId": "933AC628-7DAD-4B2D-82E3-3B7B331B1C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.22", + "matchCriteriaId": "AC6FD6F8-5B16-4F53-8116-D42F4BF4FBAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.10", + "matchCriteriaId": "FB4549F9-0160-455F-8CDC-98D38AEF6D66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0de693d68b0a18d5e256556c7c62d92cca35ad52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/71809805b95052ff551922f11660008fb3666025", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/89d72d4125e94aa3c2140fedd97ce07ba9e37674", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e46274df1100fb0c06704195bfff5bfbd418bf64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e83bebb718fd1f42549358730e1206164e0861d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0de693d68b0a18d5e256556c7c62d92cca35ad52", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/71809805b95052ff551922f11660008fb3666025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/89d72d4125e94aa3c2140fedd97ce07ba9e37674", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e46274df1100fb0c06704195bfff5bfbd418bf64", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e83bebb718fd1f42549358730e1206164e0861d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json index 53e85962463..3d86a67d314 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26858", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.840", - "lastModified": "2024-11-21T09:03:13.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: use una barrera de memoria para aplicar PTP WQ. El seguimiento de env\u00edo xmit ocurre despu\u00e9s de completar metadata_map. Simplemente reordenar las funciones mlx5e_ptp_metadata_map_put y mlx5e_ptpsq_track_metadata en el contexto mlx5e_txwqe_complete no es lo suficientemente bueno ya que ambas el compilador y la CPU son libres de reordenar estas dos funciones. Si se produce un reordenamiento, se ver\u00e1 el problema que supuestamente fue solucionado por 7e3f3ba97e6c (\"net/mlx5e: Seguimiento del env\u00edo de xmit a PTP WQ despu\u00e9s de completar el mapa de metadatos\"). Esto dar\u00e1 lugar a desreferencias de puntero NULL en mlx5e_ptpsq_mark_ts_cqes_undelivered en el contexto de sondeo NAPI debido a que la lista de seguimiento se completa antes del mapa de metadatos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.13", + "versionEndExcluding": "6.6", + "matchCriteriaId": "3B6AC16B-2F1C-4FDF-8F49-09FC11C3F5B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.3", + "versionEndExcluding": "6.6.22", + "matchCriteriaId": "5937ECF0-2736-4025-A287-630264EB40E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.10", + "matchCriteriaId": "FB4549F9-0160-455F-8CDC-98D38AEF6D66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C9B8A5CE-6D20-4C36-AC01-ACA4B70003A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/936ef086161ab89a7f38f7a0761d6a3063c3277e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b7cf07586c40f926063d4d09f7de28ff82f62b2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d1f71615dbb305f14f3b756cce015d70d8667549", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/936ef086161ab89a7f38f7a0761d6a3063c3277e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b7cf07586c40f926063d4d09f7de28ff82f62b2a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d1f71615dbb305f14f3b756cce015d70d8667549", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json index d089d4286da..305e762194a 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26859", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.893", - "lastModified": "2024-11-21T09:03:14.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,283 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/bnx2x: impide el acceso a una p\u00e1gina liberada en page_pool. Repara la condici\u00f3n de carrera que provoca un bloqueo del sistema durante el manejo de errores EEH. Durante la recuperaci\u00f3n de errores EEH, la l\u00f3gica de tiempo de espera de transmisi\u00f3n del controlador bnx2x podr\u00eda provocar una carrera. condici\u00f3n al manejar tareas de reinicio. El bnx2x_tx_timeout() programa tareas de reinicio a trav\u00e9s de bnx2x_sp_rtnl_task(), lo que finalmente conduce a bnx2x_nic_unload(). En bnx2x_nic_unload(), los SGE se liberan utilizando bnx2x_free_rx_sge_range(). Sin embargo, esto podr\u00eda superponerse con el intento del controlador EEH de restablecer el dispositivo usando bnx2x_io_slot_reset(), que tambi\u00e9n intenta liberar los SGE. This race condition can result in system crashes due to accessing freed memory locations in bnx2x_free_rx_sge() 799 static inline void bnx2x_free_rx_sge(struct bnx2x *bp, 800 struct bnx2x_fastpath *fp, u16 index) 801 { 802 struct sw_rx_page *sw_buf = &fp->rx_page_ring [\u00edndice]; 803 p\u00e1gina de estructura *p\u00e1gina = sw_buf->p\u00e1gina; .... donde sw_buf se configur\u00f3 en NULL despu\u00e9s de la llamada a dma_unmap_page() por el hilo anterior. EEH: Comienzo: 'slot_reset' PCI 0011:01:00.0#10000: EEH: Invocando bnx2x->slot_reset() bnx2x: [bnx2x_io_slot_reset:14228(eth1)]Reinicio de ranura IO inicializando... bnx2x 0011:01:00.0: habilitando dispositivo (0140 -> 0142) bnx2x: [bnx2x_io_slot_reset:14244(eth1)]Restablecimiento de ranura IO --> descarga del controlador El kernel intent\u00f3 leer la p\u00e1gina del usuario (0): \u00bfintento de explotaci\u00f3n? (uid: 0) ERROR: Desreferencia del puntero NULL del kernel al leer en 0x00000000 Direcci\u00f3n de instrucci\u00f3n err\u00f3nea: 0xc0080000025065fc Ups: Acceso al kernel del \u00e1rea defectuosa, firma: 11 [#1] ..... Seguimiento de llamadas: [c000000003c67a20] [c00800000250658c] 2x_io_slot_reset +0x204/0x610 [bnx2x] (no confiable) [c000000003c67af0] [c0000000000518a8] eeh_report_reset+0xb8/0xf0 [c000000003c67b60] [c000000000052130] 180/0x550 [c000000003c67c70] [c00000000005318c] eeh_handle_normal_event+0x84c/0xa60 [c000000003c67d50] [c000000000053a84] eeh_event_handler +0xf4/0x170 [c000000003c67da0] [c000000000194c58] kthread+0x1c8/0x1d0 [c000000003c67e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64 Para resolver este problema, necesitamos verifique las asignaciones del grupo de p\u00e1ginas antes de liberarlas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.19.311", + "matchCriteriaId": "AD980215-9885-4AEF-8844-E63A850472EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/44f9f1abb0ecc43023225ab9539167facbabf0ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4f37d3a7e004bbf560c21441ca9c022168017ec4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7bcc090c81116c66936a7415f2c6b1483a4bcfd9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8eebff95ce9558be66a36aa7cfb43223f3ab4699", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c51f8b6930db3f259b8820b589f2459d2df3fc68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cf7d8cba639ae792a42c2a137b495eac262ac36c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d27e2da94a42655861ca4baea30c8cd65546f25d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/44f9f1abb0ecc43023225ab9539167facbabf0ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4f37d3a7e004bbf560c21441ca9c022168017ec4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7bcc090c81116c66936a7415f2c6b1483a4bcfd9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8eebff95ce9558be66a36aa7cfb43223f3ab4699", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c51f8b6930db3f259b8820b589f2459d2df3fc68", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cf7d8cba639ae792a42c2a137b495eac262ac36c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d27e2da94a42655861ca4baea30c8cd65546f25d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json index be60c3b0088..a3ecfbdc025 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26862", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.050", - "lastModified": "2024-11-21T09:03:14.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,75 +15,253 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: paquete: anotar carreras de datos alrededor de ignore_outgoing ignore_outgoing se lee sin bloqueo desde dev_queue_xmit_nit() y paquete_getsockopt() Agregue las anotaciones READ_ONCE()/WRITE_ONCE() apropiadas. syzbot inform\u00f3: ERROR: KCSAN: carrera de datos en dev_queue_xmit_nit/packet_setsockopt escribir en 0xffff888107804542 de 1 bytes por tarea 22618 en la CPU 0: paquete_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003 do_sock_setsockopt net/socket.c :2311 [ en l\u00ednea] __sys_setsockopt+0x1d8/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [en l\u00ednea] __se_sys_setsockopt net/socket.c:2340 [en l\u00ednea] __x64_sys_setsockopt+0x66/0x80 :2340 do_syscall_64+ 0xd3/0x1d0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 le\u00eddo en 0xffff888107804542 de 1 byte por tarea 27 en la CPU 1: dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248 xmit_one net/core/dev.c:3527 l\u00ednea] dev_hard_start_xmit+ 0xcc/0x3f0 net/core/dev.c:3547 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335 dev_queue_xmit include/linux/netdevice.h:3091 [en l\u00ednea] batadv_send_skb_packet+0x264/0x300 net/batman-adv/ send.c:108 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [en l\u00ednea] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [en l\u00ednea ] batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700 Process_one_work kernel/workqueue.c:3254 [en l\u00ednea] Process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 trabajador_thread+0x526/0x730 n\u00facleo/cola de trabajo.c :3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 valor cambiado: 0x00 -> 0x01 Reportado por Kernel Concurrency Sanitizer en: CPU: 1 PID: 27 Comm: kworker/u8:1 Contaminado: GW 6.8.0-syzkaller-08073-g480e035fc4c7 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 29/02/2024 Cola de trabajo: bat_events batadv_iv_send_outstanding_bat_ogm_packet" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2c02c5059c78a52d170bdee4a369b470de6deb37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/68e84120319d4fc298fcdb14cf0bea6a0f64ffbd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6ebfad33161afacb3e1e59ed1c2feefef70f9f97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/84c510411e321caff3c07e6cd0f917f06633cfc0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8b1e273c6afcf00d3c40a54ada7d6aac1b503b97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d35b62c224e70797f8a1c37fe9bc4b3e294b7560", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ee413f30ec4fe94a0bdf32c8f042cb06fa913234", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ef7eed7e11d23337310ecc2c014ecaeea52719c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2c02c5059c78a52d170bdee4a369b470de6deb37", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/68e84120319d4fc298fcdb14cf0bea6a0f64ffbd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6ebfad33161afacb3e1e59ed1c2feefef70f9f97", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/84c510411e321caff3c07e6cd0f917f06633cfc0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8b1e273c6afcf00d3c40a54ada7d6aac1b503b97", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d35b62c224e70797f8a1c37fe9bc4b3e294b7560", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ee413f30ec4fe94a0bdf32c8f042cb06fa913234", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ef7eed7e11d23337310ecc2c014ecaeea52719c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json index 2679b928fb5..7ab958aec86 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26867", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.303", - "lastModified": "2024-11-21T09:03:15.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,128 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: comedi: comedi_8255: Corregir error en la inicializaci\u00f3n del subdispositivo La refactorizaci\u00f3n realizada en el commit 5c57b1ccecc7 (\"comedi: comedi_8255: Rework subdevice inicializationfunctions\") a la inicializaci\u00f3n del campo io de la estructura subdev_8255_private se rompi\u00f3 todas las tarjetas que utilizan el m\u00f3dulo drivers/comedi/drivers/comedi_8255.c. Antes de 5c57b1ccecc7, __subdev_8255_init() inicializaba el campo io en la estructura subdev_8255_private reci\u00e9n asignada a la devoluci\u00f3n de llamada no NULL proporcionada a la funci\u00f3n; de lo contrario, usaba un par\u00e1metro de marca para seleccionar entre subdev_8255_mmio y subdev_8255_io. La refactorizaci\u00f3n elimin\u00f3 esa l\u00f3gica y la bandera, ya que subdev_8255_mm_init() y subdev_8255_io_init() ahora pasan expl\u00edcitamente subdev_8255_mmio y subdev_8255_io respectivamente a __subdev_8255_init(), solo __subdev_8255_init() nunca establece spriv->io en la devoluci\u00f3n de llamada proporcionada. Que spriv->io sea NULL conduce a un ERROR posterior: ERROR: desreferencia del puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000000 PGD 0 P4D 0 Ups: 0010 [#1] SMP PTI CPU: 1 PID: 1210 Comm: systemd-udevd No contaminado 6.7 .3-x86_64 #1 Nombre de hardware: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX RIP: 0010:0x0 C\u00f3digo: No se puede acceder a los bytes del c\u00f3digo de operaci\u00f3n en 0xffffffffffffffd6. RSP: 0018: FFFFA3F1C02D7B78 EFLAGS: 00010202 RAX: 000000000000000000 RBX: FFFF91F847AEFD00 RCX: 00000000000000009B RDX: 00000000000003 RSI: 00000000000001 RDI: FFF91F840F6FC00 R08: 000000000000000000 R09: 000000000000000001 R10: 000000000000000000 R11: 000000000000005F R12: 0000000000000000000000000000: 0000000000000000 RUBI R15: ffff91f847ce6ba8 FS: 00007f72f4e8f500(0000) GS:ffff91f8d5c80000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050 033 CR2: ffffffffffffffd6 CR3: 000000010540e000 CR4: 00000000000406f0 Seguimiento de llamadas: ? __die_body+0x15/0x57 ? page_fault_oops+0x2ef/0x33c? insert_vmap_area.constprop.0+0xb6/0xd5? alloc_vmap_area+0x529/0x5ee? exc_page_fault+0x15a/0x489? asm_exc_page_fault+0x22/0x30 __subdev_8255_init+0x79/0x8d [comedi_8255] pci_8255_auto_attach+0x11a/0x139 [8255_pci] comedi_auto_config+0xac/0x117 [comedi] ? __pfx___driver_attach+0x10/0x10 pci_device_probe+0x88/0xf9 very_probe+0x101/0x248 __driver_probe_device+0xbb/0xed driver_probe_device+0x1a/0x72 __driver_attach+0xd4/0xed bus_for_each_dev+0x76/0xb 8 bus_add_driver+0xbe/0x1be driver_register+0x9a/0xd8 comedi_pci_driver_register+0x28/0x48 [comedia_pci] ? __pfx_pci_8255_driver_init+0x10/0x10 [8255_pci] do_one_initcall+0x72/0x183 do_init_module+0x5b/0x1e8 init_module_from_file+0x86/0xac __do_sys_finit_module+0x151/0x218 do_syscall_ 64+0x72/0xdb Entry_SYSCALL_64_after_hwframe+0x6e/0x76 RIP: 0033:0x7f72f50a0cb9 C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 47 71 0c 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd47e512d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 RAX: ffffffffffffffda RBX: X: 00007f72f50a0cb9 RDX: 0000000000000000 RSI: 00007f72f52d32df RDI: 000000000000000e RBP: 00000000000000000 R08: 00007f72f5168b20 0000000000000000 R10 : 0000000000000050 R11: 0000000000000246 R12: 00007f72f52d32df R13: 0000000000020000 R14: 0000562dd06785c0 R15: 0000562dcfd0e9a8 K> M\u00f3dulos vinculados en: 8255_pci(+) comedi_8255 comedi_pci comedi intel_gtt e100(+) acpi_cpufreq rtc_cmos usbhid CR2: 00000000000000000 ---[ end trace 0000000000000000 ]--- RIP: 0010:0x0 C\u00f3digo: No se puede acceder a los bytes del c\u00f3digo de operaci\u00f3n en 0xffffffffffffffd6. RSP: 0018: FFFFA3F1C02D7B78 EFLAGS: 00010202 RAX: 000000000000000000 RBX: FFFF91F847AEFD00 RCX: 00000000000000009B RDX: 00000000000003 RSI: 00000000000001 RDI: FFF91F840F6FC00 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C9B8A5CE-6D20-4C36-AC01-ACA4B70003A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4a825457a45d8debc46ab8cba57d47462411710d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cfa9ba1ae0bef0681833a22d326174fe633caab5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4a825457a45d8debc46ab8cba57d47462411710d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cfa9ba1ae0bef0681833a22d326174fe633caab5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json index acb6144c4a6..3156a4cf038 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26872", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.560", - "lastModified": "2024-11-21T09:03:15.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,230 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/srpt: no registrar el controlador de eventos hasta que el dispositivo srpt est\u00e9 completamente configurado. En raras ocasiones, KASAN informa una escritura de use-after-free en srpt_refresh_port(). Esto parece deberse a que se registra un controlador de eventos antes de que el dispositivo srpt est\u00e9 completamente configurado y una condici\u00f3n de carrera en caso de error puede dejar en su lugar un controlador de eventos parcialmente configurado. En su lugar, registre el controlador de eventos solo despu\u00e9s de que se complete la inicializaci\u00f3n del dispositivo srpt." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "68F4CE9F-5005-4E0B-88F4-E81DEF7FE849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json index 727009823db..a2009081289 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26874", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.670", - "lastModified": "2024-11-21T09:03:16.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,283 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/mediatek: corrige un fallo del puntero nulo en mtk_drm_crtc_finish_page_flip Es posible que mtk_crtc->event sea NULL en mtk_drm_crtc_finish_page_flip(). El valor pendiente_needs_vblank lo establece mtk_crtc->event, pero en mtk_drm_crtc_atomic_flush(), no est\u00e1 protegido por el mismo bloqueo en mtk_drm_finish_page_flip(), por lo que ocurre una condici\u00f3n de carrera. Considere el siguiente caso: CPU1 CPU2 paso 1: mtk_drm_crtc_atomic_begin() mtk_crtc->event is not null, paso 1: mtk_drm_crtc_atomic_flush: mtk_drm_crtc_update_config( !!mtk_crtc->event) paso 2: mtk_crtc_ddp_irq -> mtk_drm_finish _page_flip: bloquear mtk_crtc->evento establecido en nulo, pendiente_needs_vblank configurado en falso desbloqueo pendiente_needs_vblank configurado en verdadero, paso 2: mtk_crtc_ddp_irq -> mtk_drm_finish_page_flip llamado nuevamente, pendiente_needs_vblank sigue siendo verdadero //puntero nulo En lugar de proteger todo el mtk_drm_crtc_atomic_flush(), es m\u00e1s eficiente simplemente verificar si mtk_crtc->even t es nulo antes de su uso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.19.311", + "matchCriteriaId": "509332FF-4BEC-4FD0-962A-A4351C2362C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3fc88b246a2fc16014e374040fc15af1d3752535", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4688be96d20ffa49d2186523ee84f475f316fd49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9acee29a38b4d4b70f1f583e5ef9a245db4db710", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9beec711a17245b853d64488fd5b739031612340", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a3dd12b64ae8373a41a216a0b621df224210860a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/accdac6b71d5a2b84040c3d2234f53a60edc398e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d2bd30c710475b2e29288827d2c91f9e6e2b91d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dfde84cc6c589f2a9f820f12426d97365670b731", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3fc88b246a2fc16014e374040fc15af1d3752535", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4688be96d20ffa49d2186523ee84f475f316fd49", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9acee29a38b4d4b70f1f583e5ef9a245db4db710", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9beec711a17245b853d64488fd5b739031612340", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a3dd12b64ae8373a41a216a0b621df224210860a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/accdac6b71d5a2b84040c3d2234f53a60edc398e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d2bd30c710475b2e29288827d2c91f9e6e2b91d7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dfde84cc6c589f2a9f820f12426d97365670b731", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json index bb9a3095990..880a6bb3008 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26876", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.777", - "lastModified": "2024-11-21T09:03:16.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/bridge: adv7511: corrige el fallo en irq durante la sonda Se movi\u00f3 el registro de IRQ al final de adv7511_probe(). Si ya hay una IRQ pendiente durante adv7511_probe (antes de adv7511_cec_init), entonces cec_received_msg_ts podr\u00eda fallar usando datos no inicializados: No se puede manejar la lectura del kernel desde memoria ilegible en la direcci\u00f3n virtual 00000000000003d5 Error interno: Ups: 96000004 [#1] PREEMPT_RT SMP Seguimiento de llamadas: _ts+0x48 /0x990 [cec] adv7511_cec_irq_process+0x1cc/0x308 [adv7511] adv7511_irq_process+0xd8/0x120 [adv7511] adv7511_irq_handler+0x1c/0x30 [adv7511] irq_thread_fn+0x30/0xa0 leer+0x14c/0x238 khilo+0x190/0x1a8" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "F8005A63-798A-4814-A0BA-0BA32143A23C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/28a94271bd50e4cf498df0381f776f8ea40a289e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/50f4b57e9a9db4ede9294f39b9e75b5f26bae9b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/955c1252930677762e0db2b6b9e36938c887445c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/aeedaee5ef5468caf59e2bb1265c2116e0c9a924", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/28a94271bd50e4cf498df0381f776f8ea40a289e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/955c1252930677762e0db2b6b9e36938c887445c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/aeedaee5ef5468caf59e2bb1265c2116e0c9a924", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json index a0df8cd677e..17f1b14c806 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.113", "lastModified": "2024-11-21T09:03:17.527", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -52,6 +52,21 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, { "nodes": [ { @@ -61,22 +76,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.258", + "versionEndExcluding": "4.10", + "matchCriteriaId": "50052936-5C7B-4DBA-8984-C9108A4373F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.222", + "versionEndExcluding": "4.15", + "matchCriteriaId": "50B2E68E-B183-4ACE-8EAD-C951C420435F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.177", "versionEndExcluding": "4.19.311", - "matchCriteriaId": "A6E19FC1-2A3F-4FF8-805C-2864C71553EC" + "matchCriteriaId": "1F8BF7B7-6563-42D8-81D3-A3F339616CAD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.20", + "versionStartIncluding": "5.4.99", "versionEndExcluding": "5.4.273", - "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + "matchCriteriaId": "278D86CC-016B-402D-977C-57B1B01D0A44" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.5", + "versionStartIncluding": "5.10.17", "versionEndExcluding": "5.10.214", - "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + "matchCriteriaId": "2CB53B56-9C99-4AB4-B7C0-340A89F87541" }, { "vulnerable": true, @@ -247,11 +277,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26913.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26913.json index 957c8991193..9a58c961d1e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26913.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T16:15:08.040", "lastModified": "2024-11-21T09:03:22.087", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,8 +61,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", "versionEndExcluding": "6.7.6", - "matchCriteriaId": "73A68EB5-7019-4CD5-81D0-D69C4FD854FA" + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" } ] } diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26930.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26930.json index 4719add30b5..313e97dbec6 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26930.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26930.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.540", "lastModified": "2024-11-21T09:03:24.700", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,22 +61,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", "versionEndExcluding": "6.6.24", - "matchCriteriaId": "B6EDF98F-EEBC-45A5-B968-B78881A5BE83" + "matchCriteriaId": "8CF9EBD7-10AE-400D-BB67-06C2F3EBA390" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartExcluding": "6.7", + "versionStartIncluding": "6.7", "versionEndExcluding": "6.7.12", - "matchCriteriaId": "3CFA8A81-15BA-4322-A5C1-9450955D5E4B" + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartExcluding": "6.8", + "versionStartIncluding": "6.8", "versionEndExcluding": "6.8.3", - "matchCriteriaId": "1649B701-9DF9-4E5D-AA4B-6A7071BF05D6" + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json index 6e9e37aeefd..6cb33c0f3b8 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26931", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.673", - "lastModified": "2024-11-21T09:03:24.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,287 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: qla2xxx: corrige el vaciado del comando al tirar del cable. Fallo del sistema debido a que el comando no pudo volver a vaciarse a la capa SCSI. ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 0000000000000000 PGD 0 P4D 0 Ups: 0000 [#1] SMP NOPTI CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: cargado Contaminado: G OE ------ --- - - 4.18.0-372.9.1.el8.x86_64 #1 Nombre de hardware: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 03/09/2021 Cola de trabajo: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc] RIP: 0010: __wake_up_common+0x4c/0x190 C\u00f3digo: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 c3 0f 84 f0 00 00 00 < 49> 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 00000000000000000 RDX: 0000000000000001 RSI: 00000000000000003 RDI: ffff8b08d3b26320 RBP : 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20 R13: 0000003 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000 CS: 0 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0 DR0: 00000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: __wake_up_common_lock+0x7c/0xc0 qla_nvme_ls_req+ 0x355/0x4c0 [qla2xxx] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 desde el puerto 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 cerrar sesi\u00f3n 1 mantener 0 els_logo 0 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc] qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 el estado pas\u00f3 de EN L\u00cdNEA a PERDIDO - portid=010200. ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc] qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. informe ffff8ae598122000 roles 1 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 desde el puerto 21: 32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 cerrar sesi\u00f3n 1 mantener 0 els_logo 0? __cambiar_a+0x10c/0x450 ? Process_one_work+0x1a7/0x360 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 el estado pas\u00f3 de EN L\u00cdNEA a PERDIDO - portid=010201. ? hilo_trabajador+0x1ce/0x390? create_worker+0x1a0/0x1a0 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. informe ffff8ae3b2312800 roles 70 ? kthread+0x10a/0x120 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: cancelar el registro del puerto remoto en ffff8ae14801e000 21320102adf7eeb8? set_kthread_struct+0x40/0x40 qla2xxx [0000:12:00.1]-2110:3: Remoteport_delete de ffff8ae14801e000 21320102adf7eeb8 completado. ? ret_from_fork+0x1f/0x40 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: esperando sess ffff8ae14801e000 cerrar sesi\u00f3n El sistema estaba bajo estr\u00e9s de memoria y el controlador no pudo asignar un SRB para llevar a cabo la recuperaci\u00f3n de errores de extracci\u00f3n del cable. La falla al vaciar hace que la capa superior comience a modificar scsi_cmnd. Cuando el sistema libera algo de memoria, el siguiente tir\u00f3n del cable activa otro comando de descarga. En este punto, el controlador accede a un puntero nulo cuando intenta desasignar DMA el SGL. Agregue una verificaci\u00f3n para asegurarse de que los comandos se vuelvan a borrar al cerrar la sesi\u00f3n para evitar el acceso al puntero nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.312", + "matchCriteriaId": "23F858DD-6739-4BD9-9DA9-A9F5F66187C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09c0ac18cac206ed1218b1fe6c1a0918e5ea9211", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/67b2d35853c2da25a8ca1c4190a5e96d3083c2ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8de1584ec4fe0ebea33c273036e7e0a05e65c81d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8f0d32004e3a572bb77e6c11c2797c87f8c9703d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a27d4d0e7de305def8a5098a614053be208d1aa1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a859f6a8f4234b8ef62862bf7a92f1af5f8cd47a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b73377124f56d2fec154737c2f8d2e839c237d5a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d7a68eee87b05d4e29419e6f151aef99314970a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ec7587eef003cab15a13446d67c3adb88146a150", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/09c0ac18cac206ed1218b1fe6c1a0918e5ea9211", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/67b2d35853c2da25a8ca1c4190a5e96d3083c2ac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8de1584ec4fe0ebea33c273036e7e0a05e65c81d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8f0d32004e3a572bb77e6c11c2797c87f8c9703d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a27d4d0e7de305def8a5098a614053be208d1aa1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a859f6a8f4234b8ef62862bf7a92f1af5f8cd47a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b73377124f56d2fec154737c2f8d2e839c237d5a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d7a68eee87b05d4e29419e6f151aef99314970a9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ec7587eef003cab15a13446d67c3adb88146a150", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26933.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26933.json index efeaf6e977f..83835f78177 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26933.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26933.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.930", "lastModified": "2024-11-21T09:03:25.203", - "vulnStatus": "Modified", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,34 +61,35 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", "versionEndExcluding": "6.1.84", - "matchCriteriaId": "247198E8-0497-4DB2-A365-EEEC6A2C8D19" + "matchCriteriaId": "2CF9CBC6-E902-43D6-AB1E-CACD72D802E1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.2.0", + "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.24", - "matchCriteriaId": "D15F9C27-5FEC-4D9D-9C75-6CB330C0B299" + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.7.0", + "versionStartIncluding": "6.7", "versionEndExcluding": "6.7.12", - "matchCriteriaId": "0E4663C3-7D71-4DA9-9A13-EC2E448147C0" + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.8.0", + "versionStartIncluding": "6.8", "versionEndExcluding": "6.8.3", - "matchCriteriaId": "57497073-82D5-4695-AA8B-363CA1C033BD" + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:r1:*:*:*:*:*:*", - "matchCriteriaId": "E1E2BC41-356E-412A-9B5D-9B5EFCB4E942" + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" } ] } diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json index 9b3d4d59ff0..84de5c3ed67 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26943", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.877", - "lastModified": "2024-11-21T09:03:26.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,167 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nouveau/dmem: maneja el error de asignaci\u00f3n de kcalloc() El kcalloc() en nouveau_dmem_evict_chunk() devolver\u00e1 nulo si la memoria f\u00edsica se ha agotado. Como resultado, si eliminamos la referencia a src_pfns, dst_pfns o dma_addrs, se producir\u00e1n errores de desreferenciaci\u00f3n del puntero nulo. Adem\u00e1s, la GPU est\u00e1 desapareciendo. Si kcalloc() falla, no podremos desalojar todas las p\u00e1ginas que asignan un fragmento. Entonces este parche agrega un indicador __GFP_NOFAIL en kcalloc(). Finalmente, como no es necesario tener memoria f\u00edsicamente contigua, este parche cambia kcalloc() a kvcalloc() para evitar asignaciones fallidas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "FE037D6C-EFFB-4511-9C5E-907B08F58386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16e87fe23d4af6df920406494ced5c0f4354567b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2a84744a037b8a511d6a9055f3defddc28ff4a4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5e81773757a95fc298e96cfd6d4700f07b6192a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9acfd8b083a0ffbd387566800d89f55058a68af2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/16e87fe23d4af6df920406494ced5c0f4354567b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2a84744a037b8a511d6a9055f3defddc28ff4a4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5e81773757a95fc298e96cfd6d4700f07b6192a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9acfd8b083a0ffbd387566800d89f55058a68af2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json index 384ce06c871..09e31e3cee2 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26954", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.583", - "lastModified": "2024-12-02T08:15:05.363", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: corrige slab-out-of-bounds en smb_strndup_from_utf16() Si ->NameOffset de smb2_create_req es menor que el desplazamiento del b\u00fafer de smb2_create_req, puede ocurrir una lectura de slab-out-of-bounds de smb2_open. Este parche establece el valor m\u00ednimo del desplazamiento del nombre en el desplazamiento del b\u00fafer para validar la longitud del nombre de smb2_create_req()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "6.1.119", + "matchCriteriaId": "69A527B2-C28B-4593-81B7-201482E0B302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "F8CE2F9B-E7C2-414E-949B-C109CFC27FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json index 03f5b72a7dc..a00315f6c21 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26971", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.450", - "lastModified": "2024-11-21T09:03:31.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,139 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: gcc-ipq5018: correcci\u00f3n de terminaci\u00f3n de matrices de tablas de frecuencia Se supone que las matrices de tablas de frecuencia terminan con un elemento vac\u00edo. Agregue dicha entrada al final de las matrices donde falta para evitar un posible acceso fuera de los l\u00edmites cuando la tabla es atravesada por funciones como qcom_find_freq() o qcom_find_freq_floor()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "0A32A237-A8EE-4654-9BB7-94C95ED898F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/50c3acd460551cdf9d8ac6fe0c04f2de0e8e0872", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/90ad946fff70f312b8d23226afc38c13ddd88c4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b0cf3d200e8a72b6d28e6e088c062b4a98cb5eaf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c8f4bef0667947b826848db1c45a645f751357c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/50c3acd460551cdf9d8ac6fe0c04f2de0e8e0872", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/90ad946fff70f312b8d23226afc38c13ddd88c4b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b0cf3d200e8a72b6d28e6e088c062b4a98cb5eaf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c8f4bef0667947b826848db1c45a645f751357c1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json index fc54c886c8a..6fdf18b3e5e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.920", - "lastModified": "2024-11-21T09:03:31.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,283 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fat: corrige el campo no inicializado en los identificadores de archivos notale Cuando fat_encode_fh_nostale() codifica el identificador de archivo sin un padre, almacena solo los primeros 10 bytes del identificador de archivo. Sin embargo, la longitud del identificador del archivo debe ser m\u00faltiplo de 4, por lo que el identificador del archivo tiene en realidad 12 bytes de longitud y los dos \u00faltimos bytes permanecen sin inicializar. Esto no es bueno porque potencialmente filtramos informaci\u00f3n no inicializada con el identificador al espacio de usuario. Inicialice correctamente toda la longitud del mango." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10", + "versionEndExcluding": "4.19.312", + "matchCriteriaId": "4C7F71FA-7833-4686-B8C9-2BAD5CBCA1C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json index ff7fa19d127..f98ca770888 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26999", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:17.870", - "lastModified": "2024-11-21T09:03:35.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:47:59.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,75 +15,252 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: serial/pmac_zilog: eliminar la mitigaci\u00f3n defectuosa para rx irq Flood La mitigaci\u00f3n ten\u00eda como objetivo detener irq por completo. Esto puede ser mejor que un bloqueo duro, pero resulta que de todos modos se bloquea si est\u00e1s usando pmac_zilog como consola serie: ttyPZ0: pmz: rx irq Flood ! ERROR: recursi\u00f3n de spinlock en CPU#0, swapper/0 Esto se debe a que la llamada pr_err() en pmz_receive_chars() da como resultado que pmz_console_write() intente bloquear un spinlock ya bloqueado en pmz_interrupt(). Con CONFIG_DEBUG_SPINLOCK=y, esto produce un error fatal. El spinlock en cuesti\u00f3n es el de la estructura uart_port. Incluso cuando no es fatal, la funci\u00f3n de recepci\u00f3n del puerto serie deja de funcionar. Adem\u00e1s, el l\u00edmite de iteraci\u00f3n no funciona bien con QEMU, como se puede ver en el informe de error vinculado a continuaci\u00f3n. Una b\u00fasqueda en la web de otros informes del mensaje de error \"pmz: rx irq Flood\" no produjo nada. As\u00ed que no creo que este c\u00f3digo ya sea necesario. Ret\u00edrelo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "5.15.157", + "matchCriteriaId": "D5B0E036-8218-4C5C-8B49-5ED0DA441CA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.88", + "matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1be3226445362bfbf461c92a5bcdb1723f2e4907", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/52aaf1ff14622a04148dbb9ccce6d9de5d534ea7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/69a02273e288011b521ee7c1f3ab2c23fda633ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7a3bbe41efa55323b6ea3c35fa15941d4dbecdef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ab86cf6f8d24e63e9aca23da5108af1aa5483928", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bbaafbb4651fede8d3c3881601ecaa4f834f9d3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ca09dfc3cfdf89e6af3ac24e1c6c0be5c575a729", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d679c816929d62af51c8e6d7fc0e165c9412d2f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1be3226445362bfbf461c92a5bcdb1723f2e4907", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/52aaf1ff14622a04148dbb9ccce6d9de5d534ea7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/69a02273e288011b521ee7c1f3ab2c23fda633ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7a3bbe41efa55323b6ea3c35fa15941d4dbecdef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ab86cf6f8d24e63e9aca23da5108af1aa5483928", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bbaafbb4651fede8d3c3881601ecaa4f834f9d3f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ca09dfc3cfdf89e6af3ac24e1c6c0be5c575a729", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d679c816929d62af51c8e6d7fc0e165c9412d2f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2621.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2621.json index 0d3831745b2..49f616ad3a7 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2621.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2621.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-19T01:15:45.180", "lastModified": "2025-02-27T03:34:34.637", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json index 13fb15e96f3..882ced4fb75 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json index 1072a66750f..2f7e133dbd6 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:19.240", "lastModified": "2024-11-21T09:03:36.560", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,259 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm: nv04: corregir el acceso fuera de los l\u00edmites Cuando se asigna el valor del recurso de salida (dcb->or) en fabricate_dcb_output(), puede haber acceso fuera de los l\u00edmites a la matriz dac_users en caso de que dcb->or es cero porque ffs(dcb->or) se usa como \u00edndice all\u00ed. El argumento 'o' de fabricate_dcb_output() debe interpretarse como un n\u00famero de bits a configurar, no como un valor. Utilice macros de 'enum nouveau_or' en las llamadas en lugar de codificarlas. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.38", + "versionEndExcluding": "5.15.157", + "matchCriteriaId": "47DBCABD-161C-4FF7-B5A5-FA633CF75B8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.88", + "matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27239.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27239.json index 9f984afa52f..c0e755065f3 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27239.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27239.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T21:15:14.863", "lastModified": "2025-02-25T21:15:14.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27245.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27245.json index 9e9810c1508..e23dfb42096 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27245.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27245.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T21:15:15.013", "lastModified": "2025-02-25T21:15:15.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27246.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27246.json index 0ab3e6742d8..07ee3dfb7ea 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27246.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T21:15:15.163", "lastModified": "2025-02-25T21:15:15.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27263.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27263.json index ff4ac156956..3fc6d3e64ef 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27263.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27263", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-28T01:15:08.950", - "lastModified": "2025-01-28T01:15:08.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T21:58:37.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,51 @@ "value": "CWE-300" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndIncluding": "6.1.2.5", + "matchCriteriaId": "E2DD03C2-67D3-4BA5-8109-10C84538AC3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0.0", + "versionEndIncluding": "6.2.0.1", + "matchCriteriaId": "ECA7E00E-2AD1-4AA7-BAA8-3E8A14F48D21" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176072", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27294.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27294.json index 08fdab20117..6818e185ccf 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27294.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27294", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-29T23:15:08.250", - "lastModified": "2024-11-21T09:04:15.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,30 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:danielparks:dp-golang:*:*:*:*:*:go:*:*", + "versionEndExcluding": "1.2.7", + "matchCriteriaId": "995B84AC-2333-4F45-90E0-DD357CBD715C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/danielparks/puppet-golang/commit/1d0865b24071cb1c00d2fd8cb755d444e6e8f888", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/danielparks/puppet-golang/commit/870724a7fef50208515da7bbfa9dfd5d6950e7f5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/danielparks/puppet-golang/security/advisories/GHSA-8h8m-h98f-vv84", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/danielparks/puppet-golang/commit/1d0865b24071cb1c00d2fd8cb755d444e6e8f888", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/danielparks/puppet-golang/commit/870724a7fef50208515da7bbfa9dfd5d6950e7f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/danielparks/puppet-golang/security/advisories/GHSA-8h8m-h98f-vv84", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json index 152058c09d4..c4190203742 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27348", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.420", - "lastModified": "2025-02-13T18:17:30.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json index d3822ba59cc..6cb0beaa714 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:28.977", "lastModified": "2024-11-21T09:04:32.110", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json index 8b8b44d66e1..882f714bf56 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27570", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.247", - "lastModified": "2024-11-21T09:04:45.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-04T12:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,112 @@ "value": "Se descubri\u00f3 que LBT T300-T390 v2.2.1.8 conten\u00eda un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n generate_conf_router. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:libtor:lbt-t300_firmware:2.2.1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "7452B42B-25F1-4282-BD76-162C8CB43DD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:libtor:lbt-t300:*:*:*:*:*:*:*:*", + "matchCriteriaId": "25300159-D99C-412B-A2D7-AD8CAD76F4AA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:libtor:lbt-t390_firmware:2.2.1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "335F6CC9-16B1-4F43-AC7E-491FEA67D5F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:libtor:lbt-t390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "09D462BE-FE16-4B3A-A19A-14E57EA4995E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json index bcf62063bf4..491f64abcfd 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T13:15:08.510", "lastModified": "2024-11-21T09:05:02.433", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27987.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27987.json index bcd785f4e5d..4343c64b69c 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27987.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27987", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T11:15:09.013", - "lastModified": "2024-11-21T09:05:34.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-25T14:21:17.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.0", + "matchCriteriaId": "BA3D770C-A338-498F-95D5-A65AEE78F969" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/give/wordpress-give-plugin-3-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/give/wordpress-give-plugin-3-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json index f09be30368a..79cdc774590 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2732", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-26T02:15:14.087", - "lastModified": "2024-11-21T09:10:23.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T20:50:02.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themify:themify_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.9", + "matchCriteriaId": "277D734F-CB8C-4980-AC3B-CC3104570CEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3056453/themify-shortcodes/trunk/includes/themify-shortcodes.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0aeb63e7-a24d-4d76-a8c7-f082dad87a55?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3056453/themify-shortcodes/trunk/includes/themify-shortcodes.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0aeb63e7-a24d-4d76-a8c7-f082dad87a55?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json index 97b4c1b06d9..c34335de202 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json index 911433e9b15..a039df90b35 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2781.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2781.json index 006cc1e9ef2..a177433dfa8 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2781.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:54.073", "lastModified": "2024-11-21T09:10:30.277", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json index 0a0b9a6b8eb..bde8e9ec1ff 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28000.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28000.json index 59568a91613..4de38e07495 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28000.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28000", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-21T14:15:08.547", - "lastModified": "2024-08-21T16:06:23.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "1.9", + "versionEndExcluding": "6.4", + "matchCriteriaId": "71A102D3-3584-4111-86FB-42F7A9675B31" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/articles/critical-privilege-escalation-in-litespeed-cache-plugin-affecting-5-million-sites?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Exploit" + ] }, { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-3-0-1-unauthenticated-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json index 527f48e75e0..d8bd85fc438 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T08:15:06.400", "lastModified": "2024-11-21T09:05:52.533", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,118 @@ "value": "Existe una vulnerabilidad de cross-site scripting en las versiones de FitNesse anteriores a 20220319, lo que puede permitir que un atacante remoto no autenticado ejecute un script arbitrario en el navegador web del usuario que utiliza el producto y accede a un enlace con un determinado par\u00e1metro especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cleancoder:fitnesse:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20220319", + "matchCriteriaId": "EF13B921-D37A-4163-B676-B56F7AA5587C" + } + ] + } + ] + } + ], "references": [ { "url": "http://fitnesse.org/FitNesseDownload", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Release Notes", + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://jvn.jp/en/jp/JVN94521208/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://fitnesse.org/FitNesseDownload", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/unclebob/fitnesse/blob/master/SECURITY.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://jvn.jp/en/jp/JVN94521208/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json index 11147beb467..45bdf67332f 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T17:15:08.043", "lastModified": "2024-11-21T09:06:17.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json index a420aab722a..dc652a8f277 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T16:15:08.583", "lastModified": "2024-11-21T09:06:17.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2833.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2833.json index a009dd4c3ab..5f4f2cb66f3 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2833.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2833.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2844.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2844.json index dc9837de308..dd1fdd1477a 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2844.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2844.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json index e982d0ccb54..24c7e3cde85 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2868.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-04T02:15:07.010", "lastModified": "2025-02-27T20:15:38.733", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json index b4a7e149697..945925aeba4 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T15:15:08.050", "lastModified": "2024-11-21T09:07:34.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json index 6920b40cfd6..fa117d5a172 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T15:15:07.967", "lastModified": "2024-11-21T09:08:01.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29477.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29477.json index f5e8a00ddbd..10dabdecb65 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29477.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29477", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T12:15:13.353", - "lastModified": "2024-11-21T09:08:04.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,88 @@ "value": "La falta de sanitizaci\u00f3n durante el proceso de instalaci\u00f3n en Dolibarr ERP CRM hasta la versi\u00f3n 19.0.0 permite que un atacante con acceso adyacente a la red ejecute c\u00f3digo arbitrario a trav\u00e9s de una entrada espec\u00edficamente manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0.1", + "matchCriteriaId": "CF5533A5-6CDB-4FB2-9031-A3758F995F0F" + } + ] + } + ] + } + ], "references": [ { "url": "http://dolibarr.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-29477.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://dolibarr.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-29477.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json index 3e6a161009f..1a202a50bda 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T14:15:10.993", "lastModified": "2024-11-21T09:08:16.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29763.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29763.json index b1752f1be88..055ef2a9dfa 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29763.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29763", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T14:15:11.870", - "lastModified": "2024-11-21T09:08:16.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3.1", + "matchCriteriaId": "4C46C290-64F5-404D-946D-21CEA50DA550" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29774.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29774.json index c6b22812d76..29abe59c7ef 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29774.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29774.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T13:15:48.933", "lastModified": "2024-11-21T09:08:17.887", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdirectorykit:wp_directory_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "40F6EFCC-C7AE-4F52-AD1B-D819CC4AD65F" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wp-directory-kit-plugin-1-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wp-directory-kit-plugin-1-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29906.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29906.json index 807c54e6a13..3670ae19e22 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29906.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29906", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T07:15:49.933", - "lastModified": "2024-11-21T09:08:35.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "F8668C5B-ED89-41B1-83E0-8A315CB8ABB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json index 1baaa5a82a1..ca7a8a1f5c0 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:39.390", "lastModified": "2024-11-21T09:08:37.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json index e3e846b09e2..c7c6dd515c0 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:40.270", "lastModified": "2024-11-21T09:08:37.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29932.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29932.json index a30a45c81a0..411da1e88b2 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29932.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29932.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29932", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T10:15:09.383", - "lastModified": "2024-11-21T09:08:38.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "F8668C5B-ED89-41B1-83E0-8A315CB8ABB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-wordpress-meta-data-and-taxonomies-filter-mdtf-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-wordpress-meta-data-and-taxonomies-filter-mdtf-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json index 7b350e50c01..73968f59c66 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:38.487", "lastModified": "2024-11-21T09:10:54.347", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2950.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2950.json index 11f61147523..62de89fe0fe 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2950.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2950.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2954.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2954.json index a1d3dc8786f..2dc7439a4dc 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2954.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:54.417", "lastModified": "2024-11-21T09:10:55.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2959.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2959.json index 29cc5fe3b57..4a3d9b0ba7a 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2959.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2959.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json index d17d10e7243..2941d03ac5e 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2963.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T07:15:45.220", "lastModified": "2024-11-21T09:10:56.607", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logicore:pocket_news_generator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.2.0", + "matchCriteriaId": "28791D72-7B99-4741-8BD2-B3C69EB94B2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pocket-news-generator/trunk/pocket-news-generator.php#L77", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a487c-6bd5-480a-9945-ba465b38243f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pocket-news-generator/trunk/pocket-news-generator.php#L77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a487c-6bd5-480a-9945-ba465b38243f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json index e62b2dc4251..a902326f73e 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2964.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T07:15:45.663", "lastModified": "2024-11-21T09:10:56.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logicore:pocket_news_generator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.2.0", + "matchCriteriaId": "28791D72-7B99-4741-8BD2-B3C69EB94B2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pocket-news-generator/trunk/pocket-news-generator.php#L77", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fe7f4e4-3774-408b-8a2a-0db67bc34fcf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pocket-news-generator/trunk/pocket-news-generator.php#L77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fe7f4e4-3774-408b-8a2a-0db67bc34fcf?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json index 1b8347b2326..dfa8a5879ce 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30058.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30150.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30150.json index 0a1567f5a14..355409aa34a 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30150.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-02-25T23:15:10.753", "lastModified": "2025-02-25T23:15:10.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30231.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30231.json index 7570a87f5ed..db7e10c066e 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30231.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T12:15:50.410", "lastModified": "2024-11-21T09:11:29.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json index 71dd7c1e915..c15131bbc3a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30282", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.253", - "lastModified": "2024-12-02T17:48:54.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json index c96f2542a69..93a2af46f17 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30378", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-16T20:15:09.680", - "lastModified": "2024-11-21T09:11:48.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,22 +95,524 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", + "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72952BFC-45B9-4379-8D9A-A10132CC34EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52699E2B-450A-431C-81E3-DC4483C8B4F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C39DA74D-F5C7-4C11-857D-50631A110644" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F72C850A-0530-4DB7-A553-7E19F82122B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FE2089C-F341-4DC1-B76D-633BC699306D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B557965-0040-4048-B56C-F564FF28635B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB875EBD-A3CD-4466-B2A3-39D47FF94592" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA79109", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Not Applicable" + ] }, { "url": "https://supportportal.juniper.net/JSA79109", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30380.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30380.json index 5e64964b85f..94bb84a934e 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30380.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30380.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json index 5d0f237aa86..602680eba65 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json index 799bca7087b..c0ef1d932e2 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json index ab342bd8446..2eae4ce3a57 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json index e09e9e8e131..642247e8315 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json index 40614d84fd0..4f9831df853 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json index 84ae508623d..1849d70f093 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json index 7eea7e14894..aeed356790d 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30391", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:38.773", - "lastModified": "2024-11-21T09:11:49.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,22 +95,379 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", + "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D4A86D-BDB4-4A01-96FE-7E023C58074B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE06B18-BFB5-4029-A05D-386CFBFBF683" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48A1DCCD-208C-46D9-8E14-89592B49AB9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "826F893F-7B06-43B5-8653-A8D9794C052E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "462CFD52-D3E2-4F7A-98AC-C589D2420556" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B10DFCE-5331-4D79-8D9F-EF84743493D3" + } + ] + } + ] + } + ], "references": [ { "url": "http://supportportal.juniper.net/JSA79188", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Not Applicable" + ] }, { "url": "http://supportportal.juniper.net/JSA79188", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json index 6ab0b873413..515a545709d 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json index 083c58a174e..1980427cca3 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json index 0e969b23b5c..b6a2c181108 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json index 067e4f61d21..75155659767 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json index 7b3ae497ee0..25e8e182a3f 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json index bb1402b7d9c..24ff8458744 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30405", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:25.133", - "lastModified": "2024-11-21T09:11:51.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,22 +95,419 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA79105", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Not Applicable" + ] }, { "url": "https://supportportal.juniper.net/JSA79105", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json index 3883d4e22e3..db9eee2dd6b 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json index da9dd4327cb..6a50a8e1d30 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json index c9517439d3c..a3304a3a0a5 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3002", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:11.300", - "lastModified": "2024-11-21T09:28:39.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:42:06.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:online_book_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D1DCA33E-D442-4126-BE6D-27C56A4D00DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.305056", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.305056", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3047.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3047.json index c8e87faee15..68193c4f912 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3047.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3047.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3054.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3054.json index 64b4a9f8dd8..c899b8b6275 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3054.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3054.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3067.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3067.json index 529b8c79b7a..b1276c36a6f 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3067.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-16T13:15:11.230", "lastModified": "2024-11-21T09:28:49.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31269.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31269.json index f66063a79af..b6718fc51a1 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31269.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-12T13:15:17.493", "lastModified": "2024-11-21T09:13:09.953", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31421.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31421.json index 28faf7210f9..715f744acf9 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31421.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-15T11:15:11.057", "lastModified": "2024-11-21T09:13:29.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json index 34f56c2273d..16682e71a3d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T22:15:07.747", "lastModified": "2024-11-21T09:14:18.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, @@ -49,40 +69,96 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mealie:mealie:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0", + "matchCriteriaId": "176FB8C0-1317-46C1-A470-EAC757778773" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mealie-recipes/mealie/blob/ee121a12f8db33ecb4db5f8582f7ea9788d019e4/mealie/services/recipe/recipe_data_service.py#L107", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mealie-recipes/mealie/commit/2a3463b7466bc297aede50046da9550d919ec56f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mealie-recipes/mealie/pull/3368", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-225_GHSL-2023-226_Mealie/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/mealie-recipes/mealie/blob/ee121a12f8db33ecb4db5f8582f7ea9788d019e4/mealie/services/recipe/recipe_data_service.py#L107", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mealie-recipes/mealie/commit/2a3463b7466bc297aede50046da9550d919ec56f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mealie-recipes/mealie/pull/3368", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-225_GHSL-2023-226_Mealie/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json index 6cab3611c06..5c89d094c09 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json index 64518b43feb..fbf72a092d4 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-05-08T15:15:10.227", "lastModified": "2025-02-13T18:18:02.173", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32786.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32786.json index c176ef34a41..9e1a608647a 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32786.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T10:15:10.387", "lastModified": "2024-11-21T09:15:43.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json index 566c782c6ae..00155abc62a 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-02-12T10:15:13.043", "lastModified": "2025-02-12T18:15:21.633", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:fineract:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.10.1", + "matchCriteriaId": "AEC222BA-9911-4BBE-AC20-E35A4B14A96A" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/7l88h17pn9nf8zpx5bbojk7ko5oxo1dy", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory", + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/12/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3216.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3216.json index 25e013b5c45..4e0580e131d 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3216.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3216.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json index 773d1df9fc1..1d999abef1e 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3243.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3243.json index 01c5c1e803d..db047e43dd7 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3243.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3243.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3268.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3268.json index 81d4639b85c..8e4b8aa9297 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3268.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3268.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json index c4904f5a0a7..0f6842ef896 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33247", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T13:15:51.607", - "lastModified": "2024-11-21T09:16:41.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Sourcecodester Employee Task Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de admin-manage-user.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/CveSecLook/cve/issues/11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33552.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33552.json index c459faac233..988a1b5f957 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33552.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33552", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:41.367", - "lastModified": "2024-11-21T09:17:08.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T15:37:42.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:8theme:xstore_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.3.9", + "matchCriteriaId": "DEE21332-92D7-4583-A3DE-4BF4A2921CB7" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-privilege-escalation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33556.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33556.json index 2dc229c8476..2ff95b1e582 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33556.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33556", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:16:01.450", - "lastModified": "2024-11-21T09:17:08.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T15:38:39.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:8theme:xstore_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.3.9", + "matchCriteriaId": "DEE21332-92D7-4583-A3DE-4BF4A2921CB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json index 0ac9f858378..b7001d31c1e 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33606.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json index 0abe2f8c435..6ff8ee4dddf 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33619.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:09.767", "lastModified": "2024-11-21T09:17:15.430", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,139 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efi: libstub: solo se libera priv.runtime_map cuando se asigna priv.runtime_map solo se asigna cuando efi_novamap no est\u00e1 configurado. De lo contrario, es un valor no inicializado. En la ruta del error se libera incondicionalmente. Evite pasar un valor no inicializado a free_pool. Priv.runtime_map gratuito solo cuando se asign\u00f3. Este error fue descubierto y resuelto utilizando Coverity Static Analysis Security Testing (SAST) por Synopsys, Inc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "7446FC33-DC4F-4D31-94B5-FB577CFA66F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.4", + "matchCriteriaId": "991B9791-966A-4D18-9E8D-A8AB128E5627" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6ca67a5fe1c606d1fbe24c30a9fc0bdc43a18554", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9dce01f386c9ce6990c0a83fa14b1c95330b037e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b8938d6f570f010a1dcdbfed3e5b5d3258c2a908", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6ca67a5fe1c606d1fbe24c30a9fc0bdc43a18554", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9dce01f386c9ce6990c0a83fa14b1c95330b037e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b8938d6f570f010a1dcdbfed3e5b5d3258c2a908", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json index e0f571bef88..98ef352f7b7 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T09:15:08.533", "lastModified": "2024-11-21T09:29:25.450", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34314.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34314.json index b1783a83b48..6de8c5711f0 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34314.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34314", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T19:15:08.390", - "lastModified": "2024-11-21T09:18:25.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Se descubri\u00f3 que CmsEasy v7.7.7.9 contiene una vulnerabilidad de inclusi\u00f3n de archivos locales a trav\u00e9s de la funci\u00f3n file_get_contents en el m\u00e9todo fetch_action de /admin/template_admin.php. Esta vulnerabilidad permite a los atacantes leer archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34374.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34374.json index 39786af8bdb..f77ef0e0f8c 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34374.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-06T19:15:08.527", "lastModified": "2024-11-21T09:18:32.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.8.1", + "matchCriteriaId": "DED38B63-9591-4E01-A0AB-911BC5418A97" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-5-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-5-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json index 85bcd2dfc9b..12491010b77 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34434.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34434", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:44.170", - "lastModified": "2024-11-21T09:18:39.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3.3", + "matchCriteriaId": "59C82F19-8A86-461E-A6FD-AA3F36BA78A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-2-arbitrary-shortcode-execution-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-2-arbitrary-shortcode-execution-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34436.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34436.json index ecc13bea95e..a3616b1474c 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34436.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34436.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34436", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:04.390", - "lastModified": "2024-11-21T09:18:40.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:skt_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "B1F61210-98AD-4CBB-AED4-5E28AEF92C21" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34437.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34437.json index bdec3ce6a97..0fa709494fa 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34437.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:05.053", "lastModified": "2024-11-21T09:18:40.290", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.25", + "matchCriteriaId": "F96ADA13-C5A6-4259-8368-BBC94FA12991" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-plugin-1-15-24-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-plugin-1-15-24-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34445.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34445.json index 571265c71e9..de166b3ad4c 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34445.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34445.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34445", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:07.650", - "lastModified": "2024-11-21T09:18:41.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:skt_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "B1F61210-98AD-4CBB-AED4-5E28AEF92C21" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-1-8-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-1-8-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34570.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34570.json index c258120ccf2..30241f1a960 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34570.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34570", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T11:15:25.480", - "lastModified": "2024-11-21T09:18:57.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpxpro:xpro_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.3.1", + "matchCriteriaId": "512C8610-EAE6-45DE-BCAE-5D401D99231A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/xpro-elementor-addons/wordpress-xpro-elementor-addons-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/xpro-elementor-addons/wordpress-xpro-elementor-addons-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json index ce365425a4d..dceb6abb5e0 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:09.610", "lastModified": "2024-11-21T09:19:21.657", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json index a4ed296383f..43e86501597 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34794", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.917", - "lastModified": "2024-11-21T09:19:24.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.21.4", + "matchCriteriaId": "36717553-208F-4541-8B1D-0D25A68DED0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json index 89ac110e4f2..f61bf92bbfd 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34795", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:10.133", - "lastModified": "2024-11-21T09:19:24.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.21.4", + "matchCriteriaId": "36717553-208F-4541-8B1D-0D25A68DED0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json index 73b17e1b834..1426c12eb41 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-11T15:16:07.840", "lastModified": "2024-11-21T09:20:31.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.26", + "matchCriteriaId": "7280D213-9E4E-4872-95FE-4220EF8113E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-23-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-23-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json index 6e7ee0dcc01..c7fb1a71cf1 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35788.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T13:15:58.640", "lastModified": "2024-11-21T09:20:53.850", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,155 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: Corrige la verificaci\u00f3n de l\u00edmites para dcn35 DcfClocks [Por qu\u00e9] NumFclkLevelsEnabled se usa para la verificaci\u00f3n de l\u00edmites de DcfClocks en lugar del designado NumDcfClkLevelsEnabled. Eso puede provocar un acceso fuera de los l\u00edmites al \u00edndice de matriz. [C\u00f3mo] Utilice la variable designada para comprobar los l\u00edmites de dcn35 DcfClocks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "D395D167-B806-45A5-9C34-38C8A1FE0F7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*", + "matchCriteriaId": "3F2A4A3D-068A-4CF2-A09F-9C7937DDB0A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*", + "matchCriteriaId": "91326417-E981-482E-A5A3-28BC1327521B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DAECDCD8-F556-4606-8D7B-5C6D47A501F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json index d542055e534..fc9cd936d0e 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35790.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T13:15:58.800", "lastModified": "2024-11-21T09:20:54.130", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,146 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: typec: altmodes/displayport: cree nodos sysfs como grupo de atributos de dispositivo predeterminado del controlador Los nodos sysfs del controlador DisplayPort pueden estar presentes en el espacio de usuario antes de que typec_altmode_set_drvdata() se complete en dp_altmode_probe. Esto significa que una lectura de sysfs puede desencadenar un error de puntero NULL al hacer una diferencia entre dp->hpd en hpd_show o dp->lock en pin_assignment_show, ya que dev_get_drvdata() devuelve NULL en esos casos. Elimine la creaci\u00f3n manual de nodos sysfs en favor de agregar un grupo de atributos como predeterminado para los dispositivos vinculados al controlador. La macro ATTRIBUTE_GROUPS() no se utiliza aqu\u00ed; de lo contrario, la ruta a los nodos sysfs ya no cumple con la ABI." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "29EF938F-799F-4D1C-89AD-4D2AFCE5F66C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ad011776c057ce881b7fd6d8c79ecd459c087e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/165376f6b23e9a779850e750fb2eb06622e5a531", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0ad011776c057ce881b7fd6d8c79ecd459c087e9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/165376f6b23e9a779850e750fb2eb06622e5a531", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json index 6b9aebcf4a2..642fe9392b2 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35792.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T13:15:58.950", "lastModified": "2024-11-21T09:20:54.380", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,146 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: crypto: rk3288 - Arreglar el uso despu\u00e9s de liberar en unprepare La llamada de unprepare debe realizarse antes de la llamada de finalizaci\u00f3n ya que esta \u00faltima puede liberar la solicitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "0A32A237-A8EE-4654-9BB7-94C95ED898F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json index a4f0c4a97c6..f82751003ab 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:09.447", "lastModified": "2024-11-21T09:21:07.143", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,126 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Revertir \"drm/amd/display: Enviar mensaje de desactivaci\u00f3n DTBCLK en la primera confirmaci\u00f3n\" Esto revierte la confirmaci\u00f3n f341055b10bd8be55c3c995dff5f770b236b8ca9. Se observ\u00f3 un bloqueo del sistema; se cree que este compromiso es el punto de regresi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.26", + "matchCriteriaId": "820B6E76-73EC-4D11-9B47-9B84788379A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.5", + "matchCriteriaId": "DBD6C99E-4250-4DFE-8447-FF2075939D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05258a0a69b3c5d2c003f818702c0a52b6fea861", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1ba1291172f935e6b6fe703161a948f3347400b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a2ebedf7bcd17a1194a0a18122c885eb578ee882", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/05258a0a69b3c5d2c003f818702c0a52b6fea861", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1ba1291172f935e6b6fe703161a948f3347400b8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a2ebedf7bcd17a1194a0a18122c885eb578ee882", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json index 49d5405fb76..d9c9db789b0 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.373", "lastModified": "2024-11-21T09:21:12.443", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: mediatek: vcodec: agregar bloqueo para proteger la lista de contexto del decodificador. Agregue un bloqueo para ctx_list, para evitar acceder a un puntero NULL dentro de la funci\u00f3n 'vpu_dec_ipi_handler' cuando se ha eliminado ctx_list debido a un comportamiento inesperado en el bloque de IP de SCP. Nombre del hardware: placa Google Juniper sku16 (DT) pstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--) pc: vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec] lr: scp_ipi_handler+0xd0/0x194 [mtk_scp] sp: 31dbbd0 x29: ffffffc0131dbbd0 x28: 0000000000000000 x27: ffffff9bb277f348 x26: ffffff9bb242ad00 x25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4 x23: ffffff9bb7fe85a0 22: ffffffc0133fbdb0 x21: 0000000000000010 x20: ffffff9b050ea328 x19: ffffffc0131dbc08 x18: 0000000000001000 x17: 0000000000000000 x16: 461c6e0 x15: 0000000000000242 x14: 000000000000018f x13: 000000000000004d x12: 0000000000000000 x11: 0000000000000001 x10: fffffffffffffff0 x9: ffffff9bb6e793a8 x8: 0000000000000000 x7: 00000000000 00000 x6: 000000000000003f x5: 0000000000000040 x4: fffffffffffffff0 x3: 0000000000000020 x2: ffffff9bb6e79080 x1: 0000000000000010 x0: ffffffc013 1dbc08 Rastreo de llamadas: vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)] scp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)] mt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)] scp_irq_handler+0x48/0x90 (HASH:7046 3)] irq_thread_fn +0x38/0x94 irq_thread+0x100/0x1c0 kthread+0x140/0x1fc ret_from_fork+0x10/0x30 C\u00f3digo: 54000088 f94ca50a eb14015f 54000060 (f9400108) ---[ end trace ace43ce36cbd5c93 ] --- P\u00e1nico del kernel: no se sincroniza: Ups: excepci\u00f3n fatal SMP : detener CPU secundarias Desplazamiento del kernel: 0x12c4000000 de 0xffffffc010000000 PHYS_OFFSET: 0xffffffe580000000 Caracter\u00edsticas de la CPU: 0x08240002,2188200c L\u00edmite de memoria: ninguno" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.27", + "matchCriteriaId": "3301BF2B-8316-4F95-AE6D-3E81CA63F330" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.6", + "matchCriteriaId": "22CA5433-1303-41EF-AD4C-F4645DC01541" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json index 4f2d65173ef..545c6b0cf6b 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:10.780", "lastModified": "2024-11-21T09:21:17.040", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: sg: Evite la ejecuci\u00f3n de desmontaje del dispositivo sg sg_remove_sfp_usercontext() no debe usar sg_device_destroy() despu\u00e9s de llamar a scsi_device_put(). sg_device_destroy() est\u00e1 accediendo al scsi_device principal request_queue que ya estar\u00e1 configurado en NULL cuando la llamada anterior a scsi_device_put() elimin\u00f3 la \u00faltima referencia al scsi_device principal. La excepci\u00f3n de puntero NULL resultante bloquear\u00e1 el kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.7", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "B86F4EE1-72C4-46B3-A0E8-2532E186FFC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27f58c04a8f438078583041468ec60597841284d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46af9047523e2517712ae8e71d984286c626e022", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0d1ebcc1a9560e494ea9b3ee808540db26c5086", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27f58c04a8f438078583041468ec60597841284d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46af9047523e2517712ae8e71d984286c626e022", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0d1ebcc1a9560e494ea9b3ee808540db26c5086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3519.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3519.json index 1621835c6de..9c6f9ad9db8 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3519.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3519.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json index 79fd2f87965..c430955c0e9 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json index 5e635265e9b..29423034961 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:36.953", "lastModified": "2025-02-28T16:15:36.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json index ec0ed2f010e..683e01b73d9 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36047.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.040", "lastModified": "2025-02-28T16:15:37.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36116.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36116.json index 5c8b990c301..930a3314230 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36116.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36116.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36116", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-19T18:15:10.910", - "lastModified": "2024-11-21T09:21:39.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,32 +69,83 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reposilite:reposilite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.5.12", + "matchCriteriaId": "F935C2DB-75EA-4FCF-92D2-7AEA94878CFE" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dzikoysk/reposilite/commit/848173738e4375482c70365db5cebae29f125eaa", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dzikoysk/reposilite/releases/tag/3.5.12", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dzikoysk/reposilite/security/advisories/GHSA-frvj-cfq4-3228", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] }, { "url": "https://github.com/dzikoysk/reposilite/commit/848173738e4375482c70365db5cebae29f125eaa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dzikoysk/reposilite/releases/tag/3.5.12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dzikoysk/reposilite/security/advisories/GHSA-frvj-cfq4-3228", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json index 6617aca1b61..ce9afd1b286 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36117", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-19T18:15:11.220", - "lastModified": "2024-11-21T09:21:39.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,22 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:reposilite:reposilite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.5.12", + "matchCriteriaId": "F935C2DB-75EA-4FCF-92D2-7AEA94878CFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dzikoysk/reposilite/commit/e172ae4b539c822d0d6e04cf090713c7202a79d6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dzikoysk/reposilite/releases/tag/3.5.12", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dzikoysk/reposilite/security/advisories/GHSA-82j3-hf72-7x93", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] }, { "url": "https://github.com/dzikoysk/reposilite/releases/tag/3.5.12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36118.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36118.json index 0d7eedbeb1a..8550638d282 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36118.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36118", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-30T17:15:34.363", - "lastModified": "2024-11-21T09:21:39.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "2.10.15", + "matchCriteriaId": "32246230-40DC-407E-9151-F46569650A78" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/metersphere/metersphere/security/advisories/GHSA-qxx2-p3w2-w4r6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/metersphere/metersphere/security/advisories/GHSA-qxx2-p3w2-w4r6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36120.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36120.json index 267b47ba186..25b827d6f29 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36120.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36120", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-31T17:15:09.317", - "lastModified": "2024-11-21T09:21:39.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deobfuscate:javascript_deobfuscator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "500CA8B8-540D-4AEF-BD3C-45468ADF505C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ben-sb/javascript-deobfuscator/commit/630d3caec83d5f31c5f7a07e6fadf613d06699d6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ben-sb/javascript-deobfuscator/security/advisories/GHSA-9p6p-8v9r-8c9m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/ben-sb/javascript-deobfuscator/commit/630d3caec83d5f31c5f7a07e6fadf613d06699d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ben-sb/javascript-deobfuscator/security/advisories/GHSA-9p6p-8v9r-8c9m", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json index 3ed1c1f6e34..1d507636301 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36124", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-03T15:15:09.090", - "lastModified": "2024-11-21T09:21:40.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dain:snappy:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.5", + "matchCriteriaId": "7526897D-1392-492D-B5A4-E00D2CE278D4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dain/snappy/security/advisories/GHSA-8wh2-6qhj-h7j9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/dain/snappy/security/advisories/GHSA-8wh2-6qhj-h7j9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json index 86ddaa8112c..7a92b6dfa1a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36353.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@amd.com", "published": "2025-03-02T18:15:34.033", "lastModified": "2025-03-02T18:15:34.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient clearing of GPU global memory could allow a malicious process running on the same GPU to read left over memory values, potentially leading to loss of confidentiality." + }, + { + "lang": "es", + "value": "Una depuraci\u00f3n insuficiente de la memoria global de la GPU podr\u00eda permitir que un proceso malicioso que se ejecuta en la misma GPU lea valores de memoria restantes, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json index 03f69dea19a..e2f090218b1 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:08.683", "lastModified": "2024-11-21T09:22:04.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-305" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] } ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json index a0fafd56dd7..709c14ae87c 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:08.933", "lastModified": "2024-11-21T09:22:04.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json index 4903328d2b0..83a7f68850e 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.163", "lastModified": "2024-11-21T09:22:04.793", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,61 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] } ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json index 7c896d4e14f..c4e4395543a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.413", "lastModified": "2024-11-21T09:22:04.910", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-320" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] } ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json index 3da84e2a6e5..627cfa8df21 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.643", "lastModified": "2024-11-21T09:22:05.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:regular:*:*:*", + "matchCriteriaId": "E2F3586F-AC6E-4771-8E66-36857435ED25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json index 8c17f61dcfa..621584acf49 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:11.900", "lastModified": "2024-11-21T09:22:43.597", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3606.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3606.json index e09dd99e852..21cc96f0748 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3606.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3606.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3607.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3607.json index 68085446317..436efb99573 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3607.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3607.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json index 3788343d53e..0aedd916619 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37566.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.130", "lastModified": "2025-02-28T16:15:37.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json index 65c3f56c78c..50ac020baf1 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37567.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T23:15:37.210", "lastModified": "2025-02-28T16:15:37.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json index 9e86f5533c0..434822d0a75 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T15:15:10.747", "lastModified": "2024-11-21T09:24:30.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.9", + "matchCriteriaId": "FA2DCF7C-EA85-432B-A8BF-F85600D19D7A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Admidio/admidio/commit/3ff02b0c64a6911ab3e81cd61077f392c0b25248", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-69wx-xc6j-28v3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Admidio/admidio/commit/3ff02b0c64a6911ab3e81cd61077f392c0b25248", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-69wx-xc6j-28v3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3714.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3714.json index 9a80b7ecdb8..216870dc42a 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3714.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3714", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T05:15:46.520", - "lastModified": "2024-11-21T09:30:13.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T18:25:53.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.11.0", + "matchCriteriaId": "F9369A20-1BD5-4F00-A490-6647F3DA1E76" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3083390/give/tags/3.11.0/includes/class-give-donate-form.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd8f5cfa-3431-4617-b2cd-d5a8ce4530f4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083390/give/tags/3.11.0/includes/class-give-donate-form.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd8f5cfa-3431-4617-b2cd-d5a8ce4530f4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3730.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3730.json index 3c2b57e627c..03fdfe8d9c9 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3730.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3730.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3731.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3731.json index 00d05812a4d..01b712defc0 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3731.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3731.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3781.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3781.json index cb32a3de4c6..b8317d94853 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3781.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3781.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json index 076f44f80ab..9b7b9148d67 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3782.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3783.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3783.json index 84f35bcc26b..21478d5693a 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3783.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3783.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3789.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3789.json index 12726353b86..8f0aa651aff 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3789.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3789.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3790.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3790.json index 548487a99f7..88a1a7e5526 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3790.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3790.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3791.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3791.json index 33704fb0633..baa919e41d8 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3791.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3791.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3792.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3792.json index e96220d4093..b7980658534 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3792.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3792.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3793.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3793.json index cb7b26413ad..e6ac8691536 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3793.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3793.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3795.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3795.json index e42c03eb080..5b74b0ca3a0 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3795.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3795.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json index aaad15dd630..438426605f1 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3796.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "cve-coordination@incibe.es", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38290.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38290.json index d276ca297d3..a74dd810c28 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38290.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38290.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.357", "lastModified": "2025-02-28T18:15:27.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38291.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38291.json index cd60d22ec93..76eb5138c29 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38291.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.473", "lastModified": "2025-02-28T18:15:27.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38292.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38292.json index 2e942653157..0a30f6b0446 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38292.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.583", "lastModified": "2025-02-28T18:15:27.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json index aa6a187e8d2..4a0cc0d0418 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T15:15:10.990", "lastModified": "2024-11-21T09:26:12.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.10", + "matchCriteriaId": "8871D406-4482-4A1F-BD0C-38A1F8141F71" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Admidio/admidio/commit/3b1cc1cda05747edebe15f2825b79bc5a673d94c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-g872-jwwr-vggm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Admidio/admidio/commit/3b1cc1cda05747edebe15f2825b79bc5a673d94c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-g872-jwwr-vggm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3869.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3869.json index 5a45b952adf..d5811def901 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3869.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3869.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3895.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3895.json index 02dcb0e9c0b..1b019e9d09c 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3895.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3895.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39313.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39313.json index db9e53db8fa..242b49c1217 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39313.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39313", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T22:15:03.690", - "lastModified": "2024-11-21T09:27:26.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:toy-blog_project:toy-blog:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.5.4", + "versionEndExcluding": "0.6.1", + "matchCriteriaId": "5575D38A-A126-48FC-ABE2-45AC2DF5A400" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/KisaragiEffective/toy-blog/commit/f13a45f68c9560124558e6bb445ad441a4cf4732", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-rf2q-5q4q-5fwr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/KisaragiEffective/toy-blog/commit/f13a45f68c9560124558e6bb445ad441a4cf4732", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-rf2q-5q4q-5fwr", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json index 9c783177441..aeb2e54505f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39315", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-02T20:15:06.110", - "lastModified": "2024-11-21T09:27:26.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-14T18:25:37.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.26.1", + "matchCriteriaId": "32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json index dd0e8bea864..b78c6e0c753 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-06-28T07:15:06.330", "lastModified": "2024-11-21T09:27:31.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -51,14 +71,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "11106950-DFD0-441A-8DE3-DA19C15281B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.7-0298", + "matchCriteriaId": "F4DBB838-E652-4C96-AC50-AF07510EF8E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39441.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39441.json index 2733d4fa207..ad508a8cb9c 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39441.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39441.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2025-02-26T13:15:39.547", "lastModified": "2025-02-26T13:15:39.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json index 4ed3ffbe398..0972c1124fe 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json index 3169ce23209..4487c7c7cb8 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json index 069add79776..034daef5063 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json index 74fad58b7c8..23f63a8a383 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json index 93307132472..dc0d095eb4b 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json index 4be94e03910..9e360e7f6a3 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39518", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.363", - "lastModified": "2024-11-21T09:27:54.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-01T02:43:43.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,16 +93,176 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "BC449CC7-B2D6-41CB-8D6C-81DE89E79520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA82982", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA82982", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json index 50bc3641d30..22a5d26fed1 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39539", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:12.633", - "lastModified": "2024-11-21T09:27:57.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,14 +95,485 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72952BFC-45B9-4379-8D9A-A10132CC34EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52699E2B-450A-431C-81E3-DC4483C8B4F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C39DA74D-F5C7-4C11-857D-50631A110644" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F72C850A-0530-4DB7-A553-7E19F82122B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FE2089C-F341-4DC1-B76D-633BC699306D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B557965-0040-4048-B56C-F564FF28635B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB875EBD-A3CD-4466-B2A3-39D47FF94592" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA82999", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA82999", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json index 7a5de1861e4..cde1e857caf 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39540", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:12.883", - "lastModified": "2024-11-21T09:27:57.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,14 +95,229 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D4A86D-BDB4-4A01-96FE-7E023C58074B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE06B18-BFB5-4029-A05D-386CFBFBF683" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48A1DCCD-208C-46D9-8E14-89592B49AB9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "826F893F-7B06-43B5-8653-A8D9794C052E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "462CFD52-D3E2-4F7A-98AC-C589D2420556" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B10DFCE-5331-4D79-8D9F-EF84743493D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA83000", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA83000", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json index 38325e249bd..0e992fd4621 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39550", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:15.900", - "lastModified": "2024-11-21T09:27:59.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process\u00a0of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps)\u00a0to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). \n\nMemory can only be recovered by manually restarting rtlogd process.\u00a0\nThe memory usage can be monitored using the below command.\n\n\u2003\u2003\u2003\u2003user@host> show system processes extensive | match rtlog\u00a0\n\n\n\nThis issue affects Junos OS on MX Series with SPC3 line card:\u00a0\n\n\n\n * from 21.2R3 before 21.2R3-S8,\u00a0\n * from 21.4R2 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3-S1,\u00a0\n * from 23.2 before 23.2R2,\u00a0\n * from 23.4 before 23.4R2." + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process\u00a0of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps)\u00a0to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). \n\nMemory can only be recovered by manually restarting rtlogd process.\u00a0\nThe memory usage can be monitored using the below command.\n\n????user@host> show system processes extensive | match rtlog\u00a0\n\n\n\nThis issue affects Junos OS on MX Series with SPC3 line card:\u00a0\n\n\n\n * from 21.2R3 before 21.2R3-S8,\u00a0\n * from 21.4R2 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3-S1,\u00a0\n * from 23.2 before 23.2R2,\u00a0\n * from 23.4 before 23.4R2." }, { "lang": "es", @@ -95,14 +95,374 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*", + "matchCriteriaId": "78481ABC-3620-410D-BC78-334657E0BB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "BE8A5BA3-87BD-473A-B229-2AAB2C797005" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8B74AC3E-8FC9-400A-A176-4F7F21F10756" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "CB2D1FCE-8019-4CE1-BA45-D62F91AF7B51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA83012", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA83012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json index 2e8c9c0691b..a359d456c4c 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json index 747fe76e1a5..eed1b14abcd 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json index 8fd37037fd2..ee7555a3d5f 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json index 494f15fa0b9..9a49f599470 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json index bbc975b7c3b..315e0368d34 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json index 637cffdda0a..7282ebfc389 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39561", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.383", - "lastModified": "2024-11-21T09:28:01.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:53:57.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,14 +95,460 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "44E98BC3-1D43-481A-AB09-FFA502C36AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "A8377D87-FCAD-449A-9143-575C27D8544C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "BC449CC7-B2D6-41CB-8D6C-81DE89E79520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "19326769-2F08-4E61-8246-CCE7AE4483F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8494546C-00EA-49B6-B6FA-FDE42CA5B1FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*", + "matchCriteriaId": "78481ABC-3620-410D-BC78-334657E0BB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "BE8A5BA3-87BD-473A-B229-2AAB2C797005" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA83021", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA83021", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json index a03d6e4f413..e08c3ae39ec 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json index 6b1628f7caf..460888168b0 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39897", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:12.953", - "lastModified": "2024-11-21T09:28:31.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-14T19:16:42.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,22 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zotregistry:zot:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "474C11AA-39EF-4745-8980-60B31E5DE18C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json index e02c40900b2..73cfa9d1f42 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39902", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T14:15:06.383", - "lastModified": "2024-11-21T09:28:31.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-14T19:07:33.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,38 +71,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "15.9-8", + "matchCriteriaId": "BAD0BC26-272E-40BA-85A1-76079EFDC305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionEndExcluding": "15.10.99.128", + "matchCriteriaId": "4442E90B-4840-4E66-800A-451533E638E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10-6", + "matchCriteriaId": "A33A0CAA-11FD-4A54-8881-3C6C4191F70F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=38675", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=38675", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3927.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3927.json index b02af8c5dc9..985c59f38b5 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3927.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3927.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json index aa6d16dec53..796bb37397b 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json index f57551ea8f6..675d8137b53 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3962.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3962.json index de51ec16891..e811ad412b7 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3962.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3962.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3991.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3991.json index f3e1f9c5e30..d7b09ce70c4 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3991.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3991.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:33.247", "lastModified": "2024-11-21T09:30:51.813", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json index ed1f0cf5731..4a6cd88e486 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40693", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-24T16:15:36.003", - "lastModified": "2025-01-24T16:15:36.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T16:58:06.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "965D63C3-4927-4C7A-9509-017A73A0E7A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "69029120-4E5D-4C3A-8CE0-391D43156DAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7168387", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json index 2597e270adc..15d9f88cf19 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40901.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:13.500", "lastModified": "2024-11-21T09:31:49.137", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,246 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: mpt3sas: Evite que test/set_bit() opere en memoria no asignada. Existe un posible acceso fuera de los l\u00edmites cuando se usa test_bit() en una sola palabra. Las funciones test_bit() y set_bit() operan con valores largos y, al probar o configurar una sola palabra, pueden exceder el l\u00edmite de la palabra. KASAN detecta este problema y produce un volcado: ERROR: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/ bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas Escritura de tama\u00f1o 8 en la direcci\u00f3n ffff8881d26e3c60 mediante tarea kworker/u1536:2/2965 Para obtener el registro completo, consulte [1]. Realice la asignaci\u00f3n al menos del tama\u00f1o de sizeof(unsigned long) para que set_bit() y test_bit() tengan suficiente espacio para operaciones de lectura/escritura sin sobrescribir la memoria no asignada. [1] Enlace: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.317", + "matchCriteriaId": "C956CE1C-EE71-4F6D-8B4A-48997BE3F686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.279", + "matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.221", + "matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.95", + "matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.35", + "matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.6", + "matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/18abb5db0aa9b2d48f7037a88b41af2eef821674", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/19649e49a6df07cd2e03e0a11396fd3a99485ec2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4254dfeda82f20844299dca6c38cbffcfd499f41", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/46bab2bcd771e725ff5ca3a68ba68cfeac45676c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/521f333e644c4246ca04a4fc4772edc53dd2a801", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9079338c5a0d1f1fee34fb1c9e99b754efe414c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/18abb5db0aa9b2d48f7037a88b41af2eef821674", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/19649e49a6df07cd2e03e0a11396fd3a99485ec2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4254dfeda82f20844299dca6c38cbffcfd499f41", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/46bab2bcd771e725ff5ca3a68ba68cfeac45676c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/521f333e644c4246ca04a4fc4772edc53dd2a801", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9079338c5a0d1f1fee34fb1c9e99b754efe414c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json index 8c7d9a51ac0..18eb89b1934 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4017", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-04-19T21:15:08.800", - "lastModified": "2024-11-21T09:42:02.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-11T16:31:40.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,63 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:u-series_appliance:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "4.0.3", + "matchCriteriaId": "CC379986-D6B3-42F8-A514-A51A0DB7F11E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "82132539-3C34-4B63-BE2A-F51077D8BC5A" + } + ] + } + ] } ], "references": [ { "url": "https://www.beyondtrust.com/docs/release-notes/u-series-appliance/bt-appliance-u-series-software-4-0-3.htm", - "source": "13061848-ea10-403d-bd75-c83a022c2891" + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.beyondtrust.com/docs/release-notes/u-series-appliance/bt-appliance-u-series-software-4-0-3.htm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json index 90240d1de7b..5a1f73e7b34 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T07:15:05.810", "lastModified": "2024-12-14T21:15:20.327", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,106 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfs: agregar verificaci\u00f3n de l\u00edmites a xlog_recover_process_data Falta verificaci\u00f3n del espacio ocupado por los miembros fijos de xlog_op_header en xlog_recover_process_data. Podemos crear una imagen manipulada para activar una lectura fuera de los l\u00edmites siguiendo estos pasos: 1) Montar una imagen de xfs y realizar algunas operaciones de archivo para dejar registros 2) Antes de desmontar, copie la imagen para los pasos posteriores para simular una salida anormal. Porque umount garantizar\u00e1 que tail_blk y head_blk sean iguales, lo que resultar\u00e1 en la imposibilidad de ingresar xlog_recover_process_data 3) Escriba una herramienta para analizar y modificar la imagen copiada en el paso 2 4) Haga que el final de las entradas xlog_op_header est\u00e9 a solo 1 byte de distancia xlog_rec_header->h_size 5) xlog_rec_header->h_num_logops++ 6) Modificar xlog_rec_header->h_crc Soluci\u00f3n: agregue una marca para asegurarse de que haya suficiente espacio para acceder a los miembros fijos de xlog_op_header." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "9B0FAB02-E16A-4263-9895-889F5A3200D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11", + "matchCriteriaId": "F0AFF4B3-FB61-4841-BE39-C5786A46BBA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d1e3efe783365db59da88f08a2e0bfe1cc95b143", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json index 70aedc4b8eb..1ed5fd1d914 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:11.200", "lastModified": "2024-11-21T09:32:05.223", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: sched/deadline: Reparar fuga de referencia de task_struct Durante la ejecuci\u00f3n de la siguiente prueba de estr\u00e9s con linux-rt: estr\u00e9s-ng --ciclic 30 --timeout 30 --minimize --quiet kmemleak inform\u00f3 con frecuencia una p\u00e9rdida de memoria relacionada con task_struct: objeto sin referencia 0xffff8881305b8000 (tama\u00f1o 16136): comm \"stress-ng\", pid 614, jiffies 4294883961 (edad 286.412 s) volcado hexadecimal de objeto (primeros 32 bytes): 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ volcado hexadecimal de depuraci\u00f3n (primeros 16 bytes): 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S............... rastreo inverso : [<00000000046b6790>] dup_task_struct+0x30/0x540 [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0 [<00000000ced59777>] kernel_clone+0xb0/0x770 [<00000000a50befd c>] __do_sys_clone+0xb6/0xf0 [<000000001dbf2008>] do_syscall_64+0x5d/ 0xf0 [<00000000552900ff>] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 El problema ocurre en start_dl_timer(), que incrementa el recuento de referencias de task_struct y establece un temporizador. Se supone que la devoluci\u00f3n de llamada del temporizador, dl_task_timer, disminuye el recuento de referencia al expirar. Sin embargo, si se llama a enqueue_task_dl() antes de que expire el temporizador y lo cancela, el recuento de referencias no disminuye, lo que provoca la fuga. Este parche corrige la fuga de referencia al garantizar que el recuento de referencias de task_struct disminuya correctamente cuando se cancela el temporizador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.257", + "versionEndExcluding": "4.20", + "matchCriteriaId": "CC49E974-39F0-4EAB-AA56-2136CE9885A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.212", + "versionEndExcluding": "5.5", + "matchCriteriaId": "1FF42D15-4929-4BA3-A853-6ED272405AD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "6.9.10", + "matchCriteriaId": "70E8209A-2FEE-4F1C-BF15-9EEDAC4788B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", + "matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", + "matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*", + "matchCriteriaId": "11AF4CB9-F697-4EA4-8903-8F9417EFDA8E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json index e525d284fc4..d9eb7256d2f 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.483", "lastModified": "2025-02-28T16:15:37.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json index c31242b334a..386959b9d68 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.577", "lastModified": "2025-02-28T22:15:38.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json index 3990441ba3c..5d42ddf93ff 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41336.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.663", "lastModified": "2025-02-28T17:15:15.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json index 8301aca9ea6..140564a9d34 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41338.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.753", "lastModified": "2025-02-28T15:15:11.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json index ec798d47fe1..e1e2c412e0e 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41339.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.837", "lastModified": "2025-02-28T16:15:37.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41340.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41340.json index 90e285d9eea..a6a0493eab3 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41340.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41340.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:36.923", "lastModified": "2025-02-28T22:15:38.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41778.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41778.json index c1543071d5e..773a5510b26 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41778.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-01T15:15:10.450", "lastModified": "2025-03-01T15:15:10.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts." + }, + { + "lang": "es", + "value": "IBM Controller 11.0.0 a 11.0.1 y 11.1.0 no requiere que los usuarios tengan contrase\u00f1as seguras de forma predeterminada, lo que facilita que los atacantes comprometan las cuentas de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json index 4749650ca50..ab388f47e96 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-15T15:15:07.047", "lastModified": "2024-11-18T17:11:56.587", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1062C8DC-6D32-4761-ABFA-BAA9F25F2A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5CCBC4-696B-4CC4-8274-BF36022D7AF2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7173596", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4164.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4164.json index 08fda0acc68..b1dcd3a6cd5 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4164.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4164.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T11:15:46.777", "lastModified": "2024-11-21T09:42:18.713", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,109 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*", + "matchCriteriaId": "571842E4-137A-4A8C-84B6-6CA46EA180F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1B3B7C-2164-40B6-959A-188796737C16" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.318588", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261983", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261983", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.318588", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4165.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4165.json index 02775ca65ea..851502b5973 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4165.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4165.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T12:15:07.540", "lastModified": "2024-11-21T09:42:18.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,109 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*", + "matchCriteriaId": "571842E4-137A-4A8C-84B6-6CA46EA180F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1B3B7C-2164-40B6-959A-188796737C16" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.318589", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261984", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261984", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.318589", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43055.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43055.json index 56913c48f30..98bced5dbb0 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43055.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43055.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:11.637", "lastModified": "2025-03-03T11:15:11.637", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing camera use case IOCTL call." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de la llamada IOCTL del caso de uso de la c\u00e1mara." } ], "metrics": { @@ -47,10 +51,393 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43150.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43150.json index f04e123c54a..68aaf786e32 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43150.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43150", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-12T23:15:18.897", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpxpro:xpro_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.4.3", + "matchCriteriaId": "42844EF5-EF0A-4587-B69F-56EA64AFD816" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/xpro-elementor-addons/wordpress-xpro-elementor-addons-plugin-1-4-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json index 4cbe0e99a87..1eb1887acb7 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-15T15:15:07.307", "lastModified": "2024-11-18T17:11:56.587", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1062C8DC-6D32-4761-ABFA-BAA9F25F2A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5CCBC4-696B-4CC4-8274-BF36022D7AF2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7173596", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43220.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43220.json index 29f537b0e23..ddb1523dfd5 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43220.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43220.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-12T22:15:11.827", "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.27", + "matchCriteriaId": "AF739461-8BD4-46BF-81F5-3AB632E538E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-plugin-1-15-26-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json index 1c7eeb4e10a..d8488a294fe 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-18T22:15:11.023", "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json index fae9d5cd23b..8f297134556 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json index 56d586d9b1a..241a205a859 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-06T12:15:04.407", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.28", + "matchCriteriaId": "74ABBD36-1A8A-42A8-A762-537565AFD306" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-mobile-friendly-image-gallery-plugin-1-8-27-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json index 61e4a99aa31..f9403042b5d 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44136", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.923", - "lastModified": "2025-02-18T21:15:22.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,73 @@ "value": " Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n de estados. Este problema se solucion\u00f3 en iOS 17.5 y iPadOS 17.5. Un atacante con acceso f\u00edsico a un dispositivo podr\u00eda desactivar la protecci\u00f3n contra dispositivos robados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120905", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json index ba5f2775571..49711ccc28a 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json index d591ad1dfdb..e0a1caa6d6c 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45421", "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T20:15:35.400", - "lastModified": "2025-02-25T20:15:35.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T20:42:55.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,175 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "0F555E18-C547-493A-A3C6-85D42B75C5C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.2.0", + "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.12", + "matchCriteriaId": "A8EE3AB9-DE5E-4141-9974-C735AEEF1DF0" + } + ] + } + ] } ], "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/", - "source": "security@zoom.us" + "source": "security@zoom.us", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json index 6597c20cfc4..531d2a03ef4 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45424", "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T20:15:35.570", - "lastModified": "2025-02-25T20:15:35.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T20:42:55.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,145 @@ "value": "CWE-840" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "BAB2DBC4-95E2-47D1-A343-12A09D3E9D38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "23B5BD12-AA42-47A8-9BC7-5F59B48160C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.10", + "matchCriteriaId": "22369469-1A7D-4130-B5AE-E76F31405B94" + } + ] + } + ] } ], "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24036/", - "source": "security@zoom.us" + "source": "security@zoom.us", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json index b6a58210c4e..b81694de274 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45425", "sourceIdentifier": "security@zoom.us", "published": "2025-02-25T20:15:35.753", - "lastModified": "2025-02-25T20:15:35.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T20:42:55.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,145 @@ "value": "CWE-286" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "BAB2DBC4-95E2-47D1-A343-12A09D3E9D38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "23B5BD12-AA42-47A8-9BC7-5F59B48160C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "F9BEC072-28D9-4F55-B47D-E7EF1298CA6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.0", + "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "6.1.10", + "matchCriteriaId": "22369469-1A7D-4130-B5AE-E76F31405B94" + } + ] + } + ] } ], "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24037/", - "source": "security@zoom.us" + "source": "security@zoom.us", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45779.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45779.json index 3766fb1f0e2..37cd54da6b9 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45779.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45779", "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T15:15:14.660", - "lastModified": "2025-03-05T21:15:19.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T19:37:23.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 } ] }, @@ -49,20 +69,57 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.12", + "matchCriteriaId": "6ECC2401-511C-4A2E-878F-C7053FA3ABB1" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-45779", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345854", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45780.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45780.json index a5ac6675fca..203c39494d1 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45780.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45780", "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T15:15:14.950", - "lastModified": "2025-03-05T21:15:19.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T19:37:23.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.12", + "matchCriteriaId": "6ECC2401-511C-4A2E-878F-C7053FA3ABB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-45780", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345856", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json index a8821b9bc8f..f3c9a7e01e2 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T09:15:08.890", "lastModified": "2024-11-21T09:43:07.400", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46226.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46226.json index a4cb3c978ea..23636bee5b4 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46226.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T16:15:15.947", "lastModified": "2025-02-26T16:15:15.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47051.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47051.json index 55530bfc6e8..2235a78706f 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47051.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47051.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2025-02-26T13:15:39.957", "lastModified": "2025-02-26T13:15:39.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47053.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47053.json index 4f44c6cc3da..5675225c7a6 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47053.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47053.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mautic.org", "published": "2025-02-26T13:15:40.090", "lastModified": "2025-02-26T13:15:40.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47092.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47092.json index 63c838736f6..ff013d89a2f 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47092.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47092.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@checkmk.com", "published": "2025-03-03T14:15:33.473", "lastModified": "2025-03-03T14:15:33.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure deserialization and improper certificate validation in Checkmk Exchange plugin check-mk-api prior to 5.8.1" + }, + { + "lang": "es", + "value": "Deserializaci\u00f3n insegura y validaci\u00f3n de certificados incorrecta en el complemento Check-mk-api de Exchange anterior a la versi\u00f3n 5.8.1" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47259.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47259.json index e936bb0303e..f6782a82fde 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47259.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47259.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-03-04T06:15:29.190", "lastModified": "2025-03-04T06:15:29.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution." + }, + { + "lang": "es", + "value": "Girishunawane, miembro del programa Bug Bounty de AXIS OS, ha descubierto que la API VAPIX dynamicoverlay.cgi no ten\u00eda una validaci\u00f3n de entrada suficiente que permitiera una posible inyecci\u00f3n de comandos que permitiera transferir archivos al dispositivo Axis con el fin de agotar los recursos del sistema. Axis ha publicado versiones parcheadas de AXIS OS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47260.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47260.json index 821b4aacf3b..20dea15b830 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47260.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47260.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-03-04T06:15:29.710", "lastModified": "2025-03-04T06:15:29.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.\u00a0\nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution." + }, + { + "lang": "es", + "value": "51l3nc3, miembro del programa AXIS OS Bug Bounty Program, ha descubierto que el archivo mediaclip.cgi de la API VAPIX no ten\u00eda una validaci\u00f3n de entrada suficiente que permitiera cargar m\u00e1s clips de audio de los dise\u00f1ados, lo que provoc\u00f3 que el dispositivo Axis se quedara sin memoria. Axis ha publicado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47262.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47262.json index 6d46d41de91..3367161ed52 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47262.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47262.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-03-04T06:15:29.867", "lastModified": "2025-03-04T06:15:29.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or services not making use of param.cgi are not affected. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution." + }, + { + "lang": "es", + "value": "Dzmitry Lukyanenka, miembro del programa Bug Bounty de AXIS OS, ha descubierto que el param.cgi de la API de VAPIX era vulnerable a un ataque de condici\u00f3n de ejecuci\u00f3n que permit\u00eda a un atacante bloquear el acceso a la interfaz web del dispositivo de Axis. Otros endpoints o servicios de la API que no utilizan param.cgi no se ven afectados. Axis ha publicado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json index ba89669b776..a1404bd2d97 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-06T11:15:11.743", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.8.1", + "matchCriteriaId": "DED38B63-9591-4E01-A0AB-911BC5418A97" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-6-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47353.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47353.json index beb628c2d72..91bf78f9fb8 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47353.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47353.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-11T19:15:10.003", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.8.1", + "matchCriteriaId": "DED38B63-9591-4E01-A0AB-911BC5418A97" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-6-4-2-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json index a65a4e31c7a..a50e9038cf7 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T16:15:03.530", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5.1", + "matchCriteriaId": "6701FA6F-3513-4A0E-A03C-DF841F909BB0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-5-0-2-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47374.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47374.json index b0512834a8b..3e6f2d3d881 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47374.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T16:15:03.760", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5.1", + "matchCriteriaId": "6701FA6F-3513-4A0E-A03C-DF841F909BB0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-5-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json index e52d34c46f1..6096af08ded 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-16T14:15:06.147", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-23" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5.1", + "matchCriteriaId": "6701FA6F-3513-4A0E-A03C-DF841F909BB0" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-4-1-path-traversal-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json index d0902130e82..b2ca6c02014 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47823", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:31.370", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,24 +93,73 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.12.7", + "matchCriteriaId": "B6446531-ADA1-4E07-927F-1AB6E0169262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.5.2", + "matchCriteriaId": "8834EF93-2302-41B4-A5D2-2918D4740BB3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/livewire/livewire/pull/8624", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Issue Tracking" + ] }, { "url": "https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json index 41a4298693c..9805de0aba1 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47832", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.647", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,18 +95,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ssoready:ssoready:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-10-09", + "matchCriteriaId": "BBB1C352-EABC-4A0E-AC28-EC16A7AEF95B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ssoready/ssoready/commit/7f92a0630439972fcbefa8c7eafe8c144bd89915", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ssoready/ssoready/security/advisories/GHSA-j2hr-q93x-gxvh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://ssoready.com/docs/self-hosting/self-hosting-sso-ready", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json index 97c8c314df2..7e5e704b0ce 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48248.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials)." + }, + { + "lang": "es", + "value": "NAKIVO Backup & Replication anterior a 11.0.0.88174 permite el path traversal absoluto para leer archivos a trav\u00e9s de getImageByPath a /c/router (esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo en toda la empresa porque PhysicalDiscovery tiene credenciales de texto sin formato)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json index ae1c8babcf1..d526a966873 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:12.970", "lastModified": "2025-03-04T02:00:01.987", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json index 56ba9c12e92..c0d281cee66 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:11.570", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json index 4fe2534e073..3cf4066810e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.627", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.0", + "matchCriteriaId": "5F496998-E0FD-4B76-AFD2-60B6EC327CE5" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/themesflat-addons-for-elementor/wordpress-themesflat-addons-for-elementor-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49570.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49570.json index 7f67de76a97..a49fb952f8f 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49570.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:10.267", "lastModified": "2025-02-27T18:15:27.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json index 9818875cddb..8e392fa01f8 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json index c3ff8f0a130..ea0fd28dfe0 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json index d6374638ba6..9165e10dcff 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json index 58edd48c7ba..59455a70592 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json index ee2922be78e..b63e7c8086b 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json index e7a28853cdf..b520e25cbdd 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json index ffa0d3e9c5e..260ac797519 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4923", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T02:15:07.900", - "lastModified": "2024-11-21T09:43:52.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T22:03:20.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/polaris0x1/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264460", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264460", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333874", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/polaris0x1/CVE/issues/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264460", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264460", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333874", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json index 367fe3c49a5..2b044d03760 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json index c8c73124417..0ae654a88ba 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T10:15:04.663", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5.2", + "matchCriteriaId": "724CF604-6D60-44F3-9EAB-06CAF3EDC422" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-5-1-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50572.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50572.json index a1ab8fdddf0..76372bd8a93 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50572.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50572.json @@ -19,7 +19,7 @@ "cvssMetricV40": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json index 835727764b8..53772753701 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T00:15:03.657", "lastModified": "2024-12-23T06:15:06.357", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json index 6f7edfc5e96..a6e90adecda 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50704.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via a specially crafted HTTP POST request." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto no autenticado en Uniguest Tripleplay antes de 24.2.1 permite a los atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n HTTP POST especialmente manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json index 9b48169de45..b4763731886 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50705.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unauthenticated reflected cross-site scripting (XSS) vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary scripts via the page parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross site scripting (XSS) reflejado no autenticada en Uniguest Tripleplay anterior a la versi\u00f3n 24.2.1 permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s del par\u00e1metro de p\u00e1gina." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json index 742c84735d3..1401174eee3 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50706.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL no autenticada en Uniguest Tripleplay anterior a 24.2.1 permite a atacantes remotos ejecutar consultas SQL arbitrarias en la base de datos del backend." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json index 73eb39bb2e1..c155be53f64 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50707.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via the X-Forwarded-For header in an HTTP GET request." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto no autenticado en Uniguest Tripleplay antes de 24.2.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la cabecera X-Forwarded-For en una petici\u00f3n HTTP de tipo GET." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json index 4fc1c07c410..b1a1f92946e 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5049", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-17T14:15:22.407", - "lastModified": "2024-11-21T09:46:51.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T22:16:19.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/polaris0x1/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264746", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264746", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335838", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/polaris0x1/CVE/issues/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264746", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264746", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335838", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5063.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5063.json index e71913eba21..861dfb902dc 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5063.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5063", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-17T19:15:07.683", - "lastModified": "2024-11-21T09:46:53.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T14:47:18.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_course_registration_system:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6A6446-99BC-4B61-B44C-C36C3C6FE6FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.336236", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264922", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264922", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.336236", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5084.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5084.json index 96ec33475be..e90ff4eaa45 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5084.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5084.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51138.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51138.json index f1e2fca44cb..786da666a0f 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51138.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51138.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:37.023", "lastModified": "2025-02-28T22:15:39.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51139.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51139.json index a0f37d19ea5..9263e3684a9 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51139.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:37.123", "lastModified": "2025-02-28T18:15:28.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json index bb63d975103..194f5dca553 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Concert Software 1.0.5 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials." + }, + { + "lang": "es", + "value": "IBM Concert Software 1.0.5 utiliza una configuraci\u00f3n de bloqueo de cuenta inadecuada que podr\u00eda permitir a un atacante remoto obtener por la fuerza las credenciales de la cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51542.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51542.json index 88bc9c2e665..d8f99fa3742 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51542.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51542.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51544.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51544.json index a984831e5c5..8d631b54ceb 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51544.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51544.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51546.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51546.json index f14c74ec3fd..aa5da4a49e6 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51546.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51546.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51787.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51787.json index cffc100f081..1336c598970 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51787.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T09:15:07.133", "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.4.4", + "matchCriteriaId": "61E57435-3324-4948-8754-9A77F2BB7314" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/element-ready-lite/wordpress-elementsready-addons-for-elementor-plugin-6-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51944.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51944.json index 05a4c20ca21..10cf5d28171 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51944.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2025-03-03T20:15:40.327", "lastModified": "2025-03-06T12:29:08.017", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 5.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.3, + "exploitabilityScore": 1.7, "impactScore": 2.7 } ] diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5137.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5137.json index dbedb4403ab..25c390f0822 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5137.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5137", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-20T10:15:14.840", - "lastModified": "2024-11-21T09:47:03.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T15:28:59.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "77986F29-8C0B-4B73-BD32-6A610A89C64B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.265213", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265213", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.339123", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.265213", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265213", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.339123", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json index 6b08956ac66..d0f1dced9e0 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@m-files.com", "published": "2024-05-24T06:15:09.360", "lastModified": "2024-11-21T09:47:03.607", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,16 +93,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.6.0", + "matchCriteriaId": "CF69DBD6-AB20-497F-AA46-9881B022C0EE" + } + ] + } + ] } ], "references": [ { "url": "https://product.m-files.com/security-advisories/cve-2024-5142/", - "source": "security@m-files.com" + "source": "security@m-files.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-5142/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5147.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5147.json index e52b934acaf..b397d7eb4c1 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5147.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5147.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json index df6e2b5896a..ad9f7863060 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52053", "sourceIdentifier": "cve@rapid7.com", "published": "2024-11-21T23:15:05.387", - "lastModified": "2024-11-21T23:15:05.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T19:54:38.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } ] }, "weaknesses": [ @@ -71,16 +93,68 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.9.1", + "matchCriteriaId": "55C357CE-A354-4C63-96CD-828EF5C986E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json index be6631001b1..edd446bf0c0 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52054", "sourceIdentifier": "cve@rapid7.com", "published": "2024-11-21T23:15:05.627", - "lastModified": "2024-11-21T23:15:05.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T19:54:38.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,16 +93,68 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.9.1", + "matchCriteriaId": "55C357CE-A354-4C63-96CD-828EF5C986E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json index 095eae9fc8b..fe02bd11137 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52055", "sourceIdentifier": "cve@rapid7.com", "published": "2024-11-21T23:15:05.890", - "lastModified": "2024-11-21T23:15:05.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T19:54:38.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,16 +93,68 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.9.1", + "matchCriteriaId": "55C357CE-A354-4C63-96CD-828EF5C986E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json index 21ccb7dbc8a..fa378bc57ce 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52056", "sourceIdentifier": "cve@rapid7.com", "published": "2024-11-21T23:15:06.147", - "lastModified": "2024-11-21T23:15:06.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T19:54:38.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -71,16 +93,68 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.9.1", + "matchCriteriaId": "55C357CE-A354-4C63-96CD-828EF5C986E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52359.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52359.json index f26f5ff43c9..ea9f8b8ba70 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52359.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52359.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52359", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-19T20:15:31.840", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,57 @@ "value": "CWE-286" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1062C8DC-6D32-4761-ABFA-BAA9F25F2A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5CCBC4-696B-4CC4-8274-BF36022D7AF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A6203E-334B-4D5C-BD1A-F499E0D3D154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B4556A4F-EE69-4930-BD94-B15102EEF615" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176346", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52360.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52360.json index c16d5dc140b..de6a4a71779 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52360.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52360", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-19T20:15:32.147", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1062C8DC-6D32-4761-ABFA-BAA9F25F2A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5CCBC4-696B-4CC4-8274-BF36022D7AF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A6203E-334B-4D5C-BD1A-F499E0D3D154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:concert_software:1.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B4556A4F-EE69-4930-BD94-B15102EEF615" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176346", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52560.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52560.json index 9a73df9265c..80bd65f148a 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52560.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52560.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:10.573", "lastModified": "2025-02-27T03:15:10.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52925.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52925.json index 861741c2e6c..18f7a27af11 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52925.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:23.867", "lastModified": "2025-02-26T15:15:23.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json index a98cfdaa1dd..c898a3ece17 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53011.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.080", "lastModified": "2025-03-03T13:15:10.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure may occur due to improper permission and access controls to Video Analytics engine." + }, + { + "lang": "es", + "value": "La divulgaci\u00f3n de informaci\u00f3n puede ocurrir debido a permisos y controles de acceso inadecuados al motor de Video Analytics." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53012.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53012.json index e757740053f..932b5fb77a7 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53012.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53012.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.280", "lastModified": "2025-03-03T11:15:13.280", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur due to improper input validation in clock device." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de la memoria puede ocurrir debido a una validaci\u00f3n de entrada incorrecta en el dispositivo de reloj." } ], "metrics": { @@ -45,12 +49,729 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53028.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53028.json index ec3091c389a..884c8f1ec95 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53028.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53028.json @@ -3,19 +3,23 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:14.460", "lastModified": "2025-03-03T11:15:14.460", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur while processing message from frontend during allocation." + }, + { + "lang": "es", + "value": "Puede ocurrir corrupci\u00f3n de memoria mientras se procesa el mensaje desde el frontend durante la asignaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -47,10 +71,987 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53029.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53029.json index 36d0de1b830..557ac0294e5 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53029.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53029.json @@ -3,19 +3,23 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:14.617", "lastModified": "2025-03-03T11:15:14.617", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al leer un valor de un b\u00fafer controlado por la m\u00e1quina virtual invitada." } ], "metrics": { "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -45,12 +69,729 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53246.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53246.json index 22de956aff3..9eec5bd7025 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53246.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@splunk.com", "published": "2024-12-10T18:15:41.553", "lastModified": "2024-12-10T18:15:41.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53382.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53382.json index 663daab5248..f927874d994 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53382.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T07:15:33.397", "lastModified": "2025-03-03T22:15:35.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53386.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53386.json index 35f2e074330..9a3c72d1b0e 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53386.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T07:15:34.560", "lastModified": "2025-03-03T22:15:36.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json index 61159981586..72d24982aca 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de DOM Clobbering en mavo v0.3.2 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el suministro de un elemento HTML manipulado espec\u00edficamente para ello. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json index 150401ce80c..359fcc1c869 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:01.790", "lastModified": "2025-02-28T15:15:12.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53427.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53427.json index c4ded9180a0..27b4d4fa6a0 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53427.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T16:15:16.237", "lastModified": "2025-03-02T02:15:35.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53458.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53458.json index d7a9527b5fa..47c2fa10766 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53458.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53458.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets." + }, + { + "lang": "es", + "value": "Sysax Multi Server 6.99 es vulnerable a una condici\u00f3n de denegaci\u00f3n de servicio (DoS) al procesar paquetes SSH especialmente manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53870.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53870.json index 8f1d3cd1cf3..153f8fccccd 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53870.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53870.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:15.943", "lastModified": "2025-02-25T21:15:15.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53871.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53871.json index 26f982bc1fd..6159d421a99 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53871.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53871.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.100", "lastModified": "2025-02-25T21:15:16.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53872.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53872.json index 446e0b6654c..78da12fec56 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53872.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53872.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.240", "lastModified": "2025-02-25T21:15:16.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53873.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53873.json index ac461874c82..3de461335ac 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53873.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53873.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.387", "lastModified": "2025-02-25T21:15:16.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53874.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53874.json index 6d8e5caf84f..638e2bcb86f 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53874.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53874.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.527", "lastModified": "2025-02-25T21:15:16.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53875.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53875.json index ab5fc559cda..2d44e8ee7e6 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53875.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53875.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.677", "lastModified": "2025-02-25T21:15:16.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53876.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53876.json index 92c783277ca..b7b76d41455 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53876.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53876.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.827", "lastModified": "2025-02-25T21:15:16.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53877.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53877.json index ea1508d8bfc..7915d909245 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53877.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53877.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:16.980", "lastModified": "2025-02-25T21:15:16.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53878.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53878.json index 2c9a7a6151d..944b89528aa 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53878.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:17.127", "lastModified": "2025-02-25T21:15:17.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53879.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53879.json index bf14a8f66d9..b4bb1554730 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53879.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53879.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-25T21:15:17.280", "lastModified": "2025-02-25T21:15:17.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json index e5b6e7a4aa3..021a2f383a4 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-19T18:15:23.543", "lastModified": "2025-02-19T18:15:23.543", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54093.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54093.json index 3d69ba5ed10..394d4f65227 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54093.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54093", "sourceIdentifier": "productcert@siemens.com", "published": "2024-12-10T14:30:47.350", - "lastModified": "2024-12-10T14:30:47.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T18:19:12.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,12 +93,68 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*", + "versionEndExcluding": "224.0", + "matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*", + "matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*", + "matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*", + "matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*", + "matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-730188.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json index b5d7aa27854..d778619e40a 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.100", "lastModified": "2025-02-27T15:15:39.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json index 567eeca176d..f3cb11b2757 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.240", "lastModified": "2025-02-27T15:15:39.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json index 66d0f83c077..9e5321cafb8 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54173.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:09.357", "lastModified": "2025-02-28T03:15:09.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD reveals potentially sensitive information in trace files that could be read by a local user when webconsole trace is enabled." + }, + { + "lang": "es", + "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD revelan informaci\u00f3n potencialmente confidencial en archivos de rastreo que un usuario local podr\u00eda leer cuando el rastreo de la consola web est\u00e1 habilitado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54175.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54175.json index 95643696415..a6e9861ccf0 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54175.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54175.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T17:15:15.487", "lastModified": "2025-02-28T17:15:15.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD \n\ncould allow a local user to cause a denial of service due to an improper check for unusual or exceptional conditions." + }, + { + "lang": "es", + "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD podr\u00edan permitir que un usuario local provoque una denegaci\u00f3n de servicio debido a una verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54179.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54179.json index b4a956f3477..db79da033e8 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54179.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54179.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-03T14:15:33.960", "lastModified": "2025-03-03T14:15:33.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Business Automation Workflow and IBM Business Automation Workflow Enterprise Service Bus 24.0.0, 24.0.1 and earlier unsupported versions are vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Business Automation Workflow e IBM Business Automation Workflow Enterprise Service Bus 24.0.0, 24.0.1 y versiones anteriores no admitidas son vulnerables a ataques de cross-site scripting. Esta vulnerabilidad permite que un usuario autenticado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista y puede provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json index c40df4912c5..cad79df1d64 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:42.530", "lastModified": "2024-12-09T13:15:42.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.4.8", + "matchCriteriaId": "54E42E19-9697-4859-A79C-F39E91DF4F08" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/element-ready-lite/vulnerability/wordpress-elementsready-addons-for-elementor-plugin-6-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54456.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54456.json index 2ca0510e29d..0f063a0e262 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54456.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:10.667", "lastModified": "2025-02-27T03:15:10.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54458.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54458.json index b30012031c7..e2b2d23f366 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54458.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:10.770", "lastModified": "2025-02-27T18:15:27.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json index c4d3e80245f..39842f8c7cd 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54468", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.187", - "lastModified": "2025-02-18T20:15:21.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,162 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, iPadOS 17.7.3, macOS Sonoma 14.7.2 y macOS Sequoia 15.2. Es posible que una aplicaci\u00f3n pueda salir de su sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.7.3", + "matchCriteriaId": "FAC0D0A4-D9E3-43CB-9275-3355B04D5AEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.2", + "matchCriteriaId": "DF72B8B5-0A02-4875-89EF-10D28FADB9CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121838", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json index 203b72ae9fe..ca19f31254b 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54475", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.283", - "lastModified": "2025-02-18T20:15:21.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json index d67cd4abfa7..afd955054f4 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54478", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.377", - "lastModified": "2025-02-18T20:15:21.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,160 @@ "value": "Se solucion\u00f3 un problema de acceso a fuera de los l\u00edmites mejorando la verificaci\u00f3n de l\u00edmites. Este problema se solucion\u00f3 en iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sonoma 14.7.2 y macOS Sequoia 15.2. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.2", + "matchCriteriaId": "DF72B8B5-0A02-4875-89EF-10D28FADB9CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "FDA872B0-E74D-48A7-ADAE-EA2701F97007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2", + "matchCriteriaId": "16F83EAF-2879-4515-BC44-6AE5006D35EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.2", + "matchCriteriaId": "E1989A6E-08BD-47AE-BABE-B8721EA42121" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121845", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json index 55c181aa3c7..829d1553084 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54507", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.777", - "lastModified": "2025-02-18T20:15:21.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,88 @@ "value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Un atacante con privilegios de usuario podr\u00eda leer la memoria del n\u00facleo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json index b6d7e472017..b34447b341f 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54519", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.367", - "lastModified": "2025-02-18T19:15:18.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "El problema se resolvi\u00f3 con el registro de desinfectando. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2 y macOS Sequoia 15.2. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "FDA872B0-E74D-48A7-ADAE-EA2701F97007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json index 295fec033f1..7d621cf63af 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54520", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.473", - "lastModified": "2025-02-18T20:15:21.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda sobrescribir archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json index c991078bd33..4d77b56ca3a 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54523", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.660", - "lastModified": "2025-02-18T19:15:18.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,116 @@ "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json index 5c68581305f..e847e70338c 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.753", "lastModified": "2025-02-18T20:15:21.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json index d6a99fbb164..2c37eca7f4c 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54537", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.940", - "lastModified": "2025-02-18T20:15:21.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda leer y escribir archivos fuera de su sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json index 99fda7f2777..1e4f4e7a6c1 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.037", "lastModified": "2025-02-18T20:15:21.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json index b4d4b1574df..c093a3a93cb 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54540", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.703", - "lastModified": "2025-02-18T21:15:22.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,89 @@ "value": " El problema se solucion\u00f3 con una mejora en la desinfecci\u00f3n de entradas. Este problema se solucion\u00f3 en Apple Music 1.5.0.152 para Windows. El procesamiento de contenido web creado con fines malintencionados puede revelar estados internos de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:music:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.0.152", + "matchCriteriaId": "A892F5D6-8509-471E-B119-9E57A7F0603E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "08EE1F3A-A8DE-4867-BB5B-8A8ED867F3CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122043", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json index 1f678e43cd3..69a2b7d1762 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.217", "lastModified": "2025-02-18T20:15:22.007", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json index 0d52855bada..673f09f10c8 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.400", "lastModified": "2025-02-18T20:15:22.093", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json index 75be83e3e80..9db1f0cf5bb 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.580", "lastModified": "2025-02-18T20:15:22.183", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json index 9ebb837d5ca..2a1b929677f 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54957.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:01.980", "lastModified": "2025-03-03T16:15:38.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json index 55f6f2bb840..ac20bf921e9 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-06-04T10:15:12.747", "lastModified": "2024-11-21T09:47:43.833", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.1-0383", + "matchCriteriaId": "4C858D12-C0E1-4BB2-904D-F200B7AB4367" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FD618BD-29BD-4F43-9BEF-F73065247580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.1-0383", + "matchCriteriaId": "3673C8C4-86CE-496E-8B58-C56AD79BAAB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_07", - "source": "security@synology.com" + "source": "security@synology.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_07", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json index 917119925ff..f7f7b5fca30 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T22:15:36.700", "lastModified": "2025-03-04T17:15:13.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easyvirt:dc_netscope:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.6.4", + "matchCriteriaId": "091580ED-828D-4E25-A8FF-507B5D6B94C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-55064.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json index 1b714209859..8da125cbcf1 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T21:15:37.213", "lastModified": "2025-03-03T16:15:38.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55540.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55540.json index 5dfa8c5300b..2ff332160ff 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55540.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55540", "sourceIdentifier": "security@acronis.com", "published": "2025-01-02T16:15:07.847", - "lastModified": "2025-01-02T16:15:07.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T18:25:29.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -51,10 +73,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", + "versionEndIncluding": "15", + "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update2:*:*:*:*:*:*", + "matchCriteriaId": "FEA4EC9E-1766-499B-8B93-6A23F17C4D75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-2245", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55541.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55541.json index 90e64bdd241..0f17f284e0e 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55541.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55541", "sourceIdentifier": "security@acronis.com", "published": "2025-01-02T16:15:07.970", - "lastModified": "2025-01-02T16:15:07.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T18:25:29.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -51,10 +73,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", + "versionEndIncluding": "15", + "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update2:*:*:*:*:*:*", + "matchCriteriaId": "FEA4EC9E-1766-499B-8B93-6A23F17C4D75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-3647", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55543.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55543.json index 9453a3c97e3..eaa5ec617a3 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55543.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55543", "sourceIdentifier": "security@acronis.com", "published": "2025-01-02T16:15:08.237", - "lastModified": "2025-01-02T16:15:08.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-26T18:25:29.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -51,10 +73,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", + "versionEndIncluding": "15", + "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update2:*:*:*:*:*:*", + "matchCriteriaId": "FEA4EC9E-1766-499B-8B93-6A23F17C4D75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-6418", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55907.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55907.json index 6c0e12f3871..fd955ae6d08 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55907.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55907.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-02T16:15:34.577", "lastModified": "2025-03-02T16:15:34.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Analytics Mobile 1.1 for iOS application could allow an attacker to reverse engineer the codebase to gain knowledge about the programming technique, interface, class definitions, algorithms and functions used due to weak obfuscation." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n IBM Cognos Analytics Mobile 1.1 para iOS podr\u00eda permitir a un atacante realizar ingenier\u00eda inversa del c\u00f3digo base para obtener conocimiento sobre la t\u00e9cnica de programaci\u00f3n, la interfaz, las definiciones de clase, los algoritmos y las funciones utilizadas debido a una ofuscaci\u00f3n d\u00e9bil." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5530.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5530.json index 864f4ff8613..d2853882158 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5530.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-11T05:15:53.680", "lastModified": "2024-11-21T09:47:52.657", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json index e521094e35f..f8c8916e3cd 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56062.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-31T23:15:41.237", "lastModified": "2024-12-31T23:15:41.237", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56226.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56226.json index b016e788389..694b86b4dce 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56226.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-31T11:15:08.527", "lastModified": "2024-12-31T11:15:08.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56227.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56227.json index 223c1c3e8a5..118dfec04f9 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56227.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56227.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-31T11:15:08.670", "lastModified": "2024-12-31T11:15:08.670", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json index 697eaeaf318..a6821f99b35 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56274.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-07T11:15:08.960", "lastModified": "2025-01-07T11:15:08.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56340.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56340.json index a6106d3379f..904fb97d207 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56340.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56340.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.363", "lastModified": "2025-02-28T03:15:10.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Analytics 11.2.0 through 11.2.4 FP5 is vulnerable to local file inclusion vulnerability, allowing an attacker to access sensitive files by inserting path traversal payloads inside the deficon parameter." + }, + { + "lang": "es", + "value": "IBM Cognos Analytics 11.2.0 a 11.2.4 FP5 es vulnerable a la vulnerabilidad de inclusi\u00f3n de archivos locales, lo que permite a un atacante acceder a archivos confidenciales insertando payloads de path traversal dentro del par\u00e1metro deficon." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json index 6bac37e365f..9d3b889b65c 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-14T17:15:16.420", "lastModified": "2025-02-14T17:15:16.420", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "3D6ADD3A-99BC-495F-9835-92D16DF18FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "5C899CFD-26F5-43FA-A39E-7196E2929AD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "BD0A459A-C74A-4E18-83B3-4C29D47D2C2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "721EFDD7-EE35-430C-AF17-C54BDB10434E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "4C3D4D7E-0B57-47E3-BD16-5BBCE05063F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7183251", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56493.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56493.json index db84226ae56..e4f4b7cf6a7 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56493.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56493.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.377", "lastModified": "2025-02-27T15:15:39.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56494.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56494.json index 9365b81765d..4c8ffd88487 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56494.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56494.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.517", "lastModified": "2025-02-27T15:15:39.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56495.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56495.json index 2c671613a47..c3a1a5db8f6 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56495.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.657", "lastModified": "2025-02-27T15:15:39.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56496.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56496.json index 6eb94735f24..f40736e207b 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56496.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56496.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.793", "lastModified": "2025-02-27T15:15:39.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json index 5fedaabb781..578af741ea2 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56695.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:15.533", "lastModified": "2024-12-28T10:15:15.533", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: Uso de asignaci\u00f3n din\u00e1mica para la matriz de ocupaci\u00f3n de CU en 'kfd_get_cu_occupancy()' La funci\u00f3n `kfd_get_cu_occupancy` declar\u00f3 anteriormente una matriz `cu_occupancy` grande como una variable local, lo que podr\u00eda provocar desbordamientos de pila debido al uso excesivo de la pila. Esta confirmaci\u00f3n reemplaza la asignaci\u00f3n de matriz est\u00e1tica con asignaci\u00f3n de memoria din\u00e1mica utilizando `kcalloc`, lo que reduce el tama\u00f1o de la pila. Este cambio evita el riesgo de desbordamientos de pila en el espacio del kernel, en escenarios donde `AMDGPU_MAX_QUEUES` es grande. La memoria asignada se libera utilizando `kfree` antes de que la funci\u00f3n regrese para evitar fugas de memoria. Corrige lo siguiente con gcc W=1: drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_process.c: En la funci\u00f3n 'kfd_get_cu_occupancy': drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_process.c:322:1: advertencia: el tama\u00f1o del marco de 1056 bytes es mayor que 1024 bytes [-Wframe-larger-than=] 322 | } | ^" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6d9f07196389f35a3afebcf1a12c1425725caddd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/922f0e00017b09d9d47e3efac008c8b20ed546a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56810.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56810.json index 4f6eeb2a7e5..3076d393edb 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56810.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:39.930", "lastModified": "2025-02-27T15:15:39.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56811.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56811.json index 3b4f7c00712..e457658ebb5 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56811.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56811.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:40.067", "lastModified": "2025-02-27T15:15:40.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56812.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56812.json index 11cd630b4f4..0a260cfc2a7 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56812.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:40.200", "lastModified": "2025-02-27T15:15:40.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json index c187099f0d5..10fff230806 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5659", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-06-14T17:15:51.600", - "lastModified": "2024-11-21T09:48:06.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-27T15:15:08.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,16 +93,196 @@ "value": "CWE-670" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:34.011:*:*:*:*:*:*:*", + "matchCriteriaId": "02F74A5B-BE74-4F8B-B8D3-D1D48A6C5CA0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:34.011:*:*:*:*:*:*:*", + "matchCriteriaId": "D8B88DDE-9002-4EE8-BAA8-73330CB0BE50" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:1756-en4_firmware:4.001:*:*:*:*:*:*:*", + "matchCriteriaId": "3B050175-3923-4B1E-AE98-53AF028EE8AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:1756-en4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6935642C-4CBF-4B4F-A509-561B3E39A66B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:34.011:*:*:*:*:*:*:*", + "matchCriteriaId": "EC388DFC-DA67-44B6-AE97-731B33F38992" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:34.011:*:*:*:*:*:*:*", + "matchCriteriaId": "01EB5C9E-A10F-4D53-AF3D-38055F966BD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62414E65-73C7-4172-B7BF-F40A66AFBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:34.011:*:*:*:*:*:*:*", + "matchCriteriaId": "A913AF0F-DA08-4FE9-9E94-AA1D6227981B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968" + } + ] + } + ] } ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1673.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1673.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5667.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5667.json index 53f70129613..f42e1c8fa2b 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5667.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5667.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Featherlight.js JavaScript library (versions 1.7.13 to 1.7.14) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Varios complementos para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s de la librer\u00eda de JavaScript Featherlight.js incluida en el complemento (versiones 1.7.13 a 1.7.14) en varias versiones debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json index a93fea94e58..8a582e51220 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.013", "lastModified": "2025-02-18T22:15:13.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json index 52095114c97..732a00e6e51 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.113", "lastModified": "2025-02-18T22:15:13.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json index 2ae8aee4a96..4013042150d 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.213", "lastModified": "2025-02-18T22:15:13.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json index 04e313a425a..ad8589c6b8d 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.307", "lastModified": "2025-02-18T22:15:13.713", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json index d4fd5d9df46..ce64bd73281 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.403", "lastModified": "2025-02-18T22:15:13.827", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json index 74ce4c2cac3..8678c23ff40 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.500", "lastModified": "2025-02-18T22:15:13.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json index fc1790bbe5b..3fb16788d63 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.597", "lastModified": "2025-02-18T22:15:14.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json index 0e9952bddc3..5953cf35c0c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.693", "lastModified": "2025-02-18T22:15:14.133", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json index 332225b25fc..1cbdc24b803 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.797", "lastModified": "2025-02-18T22:15:14.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json index cbd44e11c60..aadce2f865e 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.890", "lastModified": "2025-02-18T22:15:14.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json index 9b54353f99a..da51a4fec4f 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.987", "lastModified": "2025-02-18T22:15:14.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json index 42c7d6453fa..4395546c887 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.083", "lastModified": "2025-02-18T22:15:14.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json index e28b9a0fdae..4adb805f6f3 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57162", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:33.063", - "lastModified": "2025-02-18T21:15:23.657", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-22T01:18:33.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Campcodes Cybercafe Management System v1.0 es vulnerable a una inyecci\u00f3n SQL en /ccms/view-user-detail.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:cybercafe_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "76B02852-BBA6-49C7-82F9-A92F2DBFC0A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57852.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57852.json index acf05a343a8..9c882334804 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57852.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:10.977", "lastModified": "2025-02-27T03:15:10.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57929.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57929.json index c3e8c0817a1..121438c44f1 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57929.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57929.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:27.013", "lastModified": "2025-02-02T11:15:14.227", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57974.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57974.json index b9906b04581..e15c2f1b463 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57974.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57974.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:10.590", "lastModified": "2025-02-27T02:15:10.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57975.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57975.json index eed75b3e292..4549d93963c 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57975.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:10.687", "lastModified": "2025-02-27T02:15:10.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57976.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57976.json index 3016e92202b..8a46790c21a 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57976.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:10.790", "lastModified": "2025-02-27T02:15:10.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57979.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57979.json index 6754d25e844..2fcb9695bac 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57979.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.087", "lastModified": "2025-02-27T19:15:49.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57981.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57981.json index 42d7b33015f..577dff092f3 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57981.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57981.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.293", "lastModified": "2025-02-27T02:15:11.293", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,122 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: Fix NULL pointer dereference on certain command aborts Si un comando se pone en cola en el TRB utilizable final de un segmento de anillo, el puntero de encolado avanza al TRB de enlace posterior y no m\u00e1s all\u00e1. Si el comando se aborta m\u00e1s tarde, cuando se maneja la finalizaci\u00f3n del aborto, el puntero de desencolado avanza al primer TRB del siguiente segmento. Si no se ponen en cola m\u00e1s comandos, xhci_handle_stopped_cmd_ring() ve que los punteros de anillo son desiguales y supone que hay un comando pendiente, por lo que llama a xhci_mod_cmd_timer() que se bloquea si cur_cmd era NULL. No intente configurar el temporizador si cur_cmd es NULL. El timbre de puerta posterior probablemente tambi\u00e9n sea innecesario, pero es inofensivo. D\u00e9jelo en paz. Probablemente se trate del error 219532, pero no se ha recibido confirmaci\u00f3n. El problema se ha reproducido de forma independiente y se ha confirmado que se ha solucionado utilizando una MCU USB programada para anular la etapa de estado de SET_ADDRESS para siempre. Todo sigui\u00f3 funcionando normalmente despu\u00e9s de varios fallos evitados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "9244F393-9DC7-4BC2-A176-D235D5853C12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ce5c0dac768be14afe2426101b568a0f66bfc4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1e0a19912adb68a4b2b74fd77001c96cd83eb073", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4ff18870af793ce2034a6ad746e91d0a3d985b88", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ae069cd2ba09a2bd6a87a68c59ef0b7ea39cd641", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b649f0d5bc256f691c7d234c3986685d54053de1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57984.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57984.json index 30d0c7cd891..a7cf9b003e6 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57984.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57984.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.603", "lastModified": "2025-02-27T18:15:27.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57985.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57985.json index df0d1e15482..5b329c72eea 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57985.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57985.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:11.703", "lastModified": "2025-02-27T02:15:11.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57986.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57986.json index 4cd6d5b3fed..c935159d3dc 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57986.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:12.597", "lastModified": "2025-02-27T02:15:12.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json index e8191afb179..a7fc0c479be 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57987", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:12.700", - "lastModified": "2025-02-27T02:15:12.700", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,92 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btrtl: verificaci\u00f3n de NULL en btrtl_setup_realtek() Si se inserta un dispositivo USB cuyo chip no se mantiene en ic_id_table, se alcanzar\u00e1 el punto NULL al que se accedi\u00f3. Agregue una verificaci\u00f3n de punto nulo para evitar el error de kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "5BB3C00D-6033-4D2A-8C20-605FF5E938FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57988.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57988.json index acdeca11f09..56c01f507d8 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57988.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57988", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:12.800", - "lastModified": "2025-02-27T02:15:12.800", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btbcm: Se ha corregido la desreferencia NULL en btbcm_get_board_name(). devm_kstrdup() puede devolver un puntero NULL en caso de error, pero este valor devuelto en btbcm_get_board_name() no se comprueba. Se ha a\u00f1adido la comprobaci\u00f3n NULL en btbcm_get_board_name() para controlar el error de desreferencia de puntero NULL del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "AF4DF509-8040-448A-9D90-DDFA1A298CFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/74af8b9d0e79deefd2d43e14b84575839a849169", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b88655bc6593c6a7fdc1248b212d17e581c4334e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df2f2d9199e61819cca5da0121dfa4d4cb57000f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json index 5f2d3ae1f60..bc62e2a226e 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57989", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:12.907", - "lastModified": "2025-02-27T02:15:12.907", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,92 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7925: se corrige la comprobaci\u00f3n de deref NULL en mt7925_change_vif_links. En mt7925_change_vif_links(), devm_kzalloc() puede devolver NULL, pero este valor devuelto no se comprueba." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2C65B261-0C55-4563-835E-FD44483D02B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2f709fe755c16b811ba7339ae4c3ee2c72323d3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5872530c2862700070223a2c2ea85642bf2f8875", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5cd0bd815c8a48862a296df9b30e0ea0da14acd3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json index d424174c2e4..1f333040e9d 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57990", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.010", - "lastModified": "2025-02-27T02:15:13.010", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,99 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7925: correcci\u00f3n de uno en mt7925_load_clc(). Esta comparaci\u00f3n debe ser >= en lugar de > para evitar una lectura y escritura fuera de los l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10.13", + "versionEndExcluding": "6.11", + "matchCriteriaId": "B88D322F-6F03-45A1-8C58-9E45EAB64B13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.2", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "36A302E0-25BB-4336-8320-055552CC64E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08fa656c91fd5fdf47ba393795b9c0d1e97539ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2d1628d32300e4f67ac0b7409cbfa7b912a8fe9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d03b8fe1b518fc2ea2d82588e905f56d80cd64b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json index a52e43d9f09..f99116a7e49 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57991", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.110", - "lastModified": "2025-02-27T02:15:13.110", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,85 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: chan: se corrige el bloqueo suave en rtw89_entity_recalc_mgnt_roles() Durante rtw89_entity_recalc_mgnt_roles(), hay un proceso de normalizaci\u00f3n que reordenar\u00e1 la lista si se encuentra una entrada con el patr\u00f3n objetivo. Y una vez que se encuentra una, deber\u00eda haber abortado el list_for_each_entry. Pero, `break` simplemente abort\u00f3 el bucle for interno. El list_for_each_entry externo a\u00fan contin\u00faa. Normalmente, solo la primera entrada coincidir\u00e1 con el patr\u00f3n objetivo y el reordenamiento no cambiar\u00e1 nada, por lo que no habr\u00e1 un bloqueo suave. Sin embargo, en algunos casos especiales, se producir\u00eda un bloqueo suave. Arr\u00e9glelo con `goto fill` para interrumpir desde list_for_each_entry. El siguiente es un ejemplo de registro del kernel para este problema. watchdog: BUG: bloqueo suave - \u00a1CPU n.\u00ba 1 atascada durante 26 s! [wpa_supplicant:2055] [...] RIP: 0010:rtw89_entity_recalc ([...] chan.c:392 chan.c:479) rtw89_core [...]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01d2d34e9fcc9897081c3c16a666f793c8a38c58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/223ba95fdcd3c6090e2bd51dce66abb6dd4f9df9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e4790b3e314a4814f1680a5dc552031fb199b878", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57992.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57992.json index 424b82c5572..c7021634455 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57992.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57992.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.210", "lastModified": "2025-02-27T02:15:13.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57993.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57993.json index 6b834a1460c..c947d338cc4 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57993.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57993.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.310", "lastModified": "2025-02-27T02:15:13.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57994.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57994.json index 02d287fe95b..2cf0574aac3 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57994.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.417", "lastModified": "2025-02-27T02:15:13.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json index 3bf04e0d9a6..4ea4a8de531 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57995", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.517", - "lastModified": "2025-02-27T02:15:13.517", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,77 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: correcci\u00f3n del puntero de lectura despu\u00e9s de la liberaci\u00f3n en ath12k_mac_assign_vif_to_vdev() En ath12k_mac_assign_vif_to_vdev(), si se crea arvif en una radio diferente, se elimina de esa radio mediante una llamada a ath12k_mac_unassign_link_vif(). Esta acci\u00f3n libera el puntero arvif. Posteriormente, hay una comprobaci\u00f3n que involucra arvif, lo que dar\u00e1 como resultado un escenario de lectura despu\u00e9s de la liberaci\u00f3n. Corrija esto moviendo esta comprobaci\u00f3n despu\u00e9s de que arvif se asigne nuevamente mediante una llamada a ath12k_mac_assign_link_vif(). Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "E568A7D7-3775-460E-ABAE-924E4513B89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a10971c7645a95f5d5dc23c26fbac4bf61801d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f3a95a312419e4f1e992525917da9dbcd247038f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57996.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57996.json index 80df4141aa3..ac3f80e52dd 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57996.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57996", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.620", - "lastModified": "2025-02-27T02:15:13.620", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: sch_sfq: no permitir l\u00edmite de 1 paquete La implementaci\u00f3n actual no funciona correctamente con un l\u00edmite de 1. iproute2 en realidad verifica esto y este parche tambi\u00e9n agrega la verificaci\u00f3n en el kernel. Esto corrige el siguiente fallo informado por syzkaller reported crash: UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x125/0x19f lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:148 [inline] __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347 sfq_link net/sched/sch_sfq.c:210 [inline] sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238 sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500 sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525 qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026 tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319 qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026 dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296 netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline] dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362 __dev_close_many+0x214/0x350 net/core/dev.c:1468 dev_close_many+0x207/0x510 net/core/dev.c:1506 unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738 unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695 unregister_netdevice include/linux/netdevice.h:2893 [inline] __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689 tun_detach drivers/net/tun.c:705 [inline] tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640 __fput+0x203/0x840 fs/file_table.c:280 task_work_run+0x129/0x1b0 kernel/task_work.c:185 exit_task_work include/linux/task_work.h:33 [inline] do_exit+0x5ce/0x2200 kernel/exit.c:931 do_group_exit+0x144/0x310 kernel/exit.c:1046 __do_sys_exit_group kernel/exit.c:1057 [inline] __se_sys_exit_group kernel/exit.c:1055 [inline] __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055 do_syscall_64+0x6c/0xd0 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fe5e7b52479 Code: Unable to access opcode bytes at RIP 0x7fe5e7b5244f. RSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0 R13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270 The crash can be also be reproduced with the following (with a tc recompiled to allow for sfq limits of 1): tc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s ../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1 ifconfig dummy0 up ping -I dummy0 -f -c2 -W0.1 8.8.8.8 sleep 1 Scenario that triggers the crash: * the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1 * TBF dequeues: it peeks from SFQ which moves the packet to the gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so it schedules itself for later. * the second packet is sent and TBF tries to queues it to SFQ. qdisc qlen is now 2 and because the SFQ limit is 1 the packet is dropped by SFQ. At this point qlen is 1, and all of the SFQ slots are empty, however q->tail is not NULL. En este punto, asumiendo que no hay m\u00e1s paquetes en cola, cuando sch_dequeue se ejecute nuevamente, disminuir\u00e1 el qlen para la ranura vac\u00eda actual, lo que provocar\u00e1 un desbordamiento y el posterior acceso fuera de l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "7CFA9ED9-656E-463E-A661-B2C4369D63EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10685681bafce6febb39770f3387621bf5d67d0b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35d0137305ae2f97260a9047f445bd4434bd6cc7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d8947f2153ee9c5ab4cb17861a11cc45f30e8c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7fefc294204f10a3405f175f4ac2be16d63f135e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/833e9a1c27b82024db7ff5038a51651f48f05e5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57997.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57997.json index 1633fa3bffe..e16e5755b9a 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57997.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57997", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.720", - "lastModified": "2025-02-27T02:15:13.720", - "vulnStatus": "Received", + "lastModified": "2025-03-07T11:54:06.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: wcn36xx: se corrige el tama\u00f1o de asignaci\u00f3n de memoria de la encuesta de canal KASAN inform\u00f3 un problema de asignaci\u00f3n de memoria en wcn->chan_survey debido a un c\u00e1lculo de tama\u00f1o incorrecto. Esta confirmaci\u00f3n utiliza kcalloc para asignar memoria para wcn->chan_survey, lo que garantiza una inicializaci\u00f3n adecuada y evita el uso de valores no inicializados cuando no hay marcos en el canal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "F97600FD-25BD-4A8A-A64D-C51ED328C14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/34cd2817708aec51ef1a6c007e0d6d5342a025d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6200d947f050efdba4090dfefd8a01981363d954", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64c4dcaeac1dc1030e47883b04a617ca9a4f164e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae68efdff7a7a42ab251cac79d8713de6f0dbaa0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e95f9c408ff8311f75eeabc8acf34a66670d8815", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57998.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57998.json index 3e62fb4344f..45d2c651928 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57998.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57998.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.820", "lastModified": "2025-02-27T02:15:13.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57999.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57999.json index 13114b90731..0a079229ff7 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57999.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57999.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:13.930", "lastModified": "2025-02-27T02:15:13.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58000.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58000.json index 6f1208861dc..5cb1bd6286a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58000.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58000.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.033", "lastModified": "2025-02-27T02:15:14.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58001.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58001.json index 6d415b91607..7f2471ac505 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58001.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58001.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.080", "lastModified": "2025-02-27T03:15:11.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58003.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58003.json index e9c4943c800..20b4e84df70 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58003.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58003.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.277", "lastModified": "2025-02-27T03:15:11.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58004.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58004.json index 8fbf2d047e3..b6b4d25e856 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58004.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58004.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.380", "lastModified": "2025-02-27T03:15:11.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58006.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58006.json index be09eb8271c..af2b8cb8113 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58006.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58006.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.583", "lastModified": "2025-02-27T03:15:11.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58008.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58008.json index 893b73714f1..9c7e8068e59 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58008.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58008.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.780", "lastModified": "2025-02-27T03:15:11.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58009.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58009.json index 36023b42959..e01ee6c8788 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58009.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58009.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.880", "lastModified": "2025-02-27T03:15:11.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58014.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58014.json index 1c6f5a1f995..4126034ca58 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58014.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:12.390", "lastModified": "2025-02-27T03:15:12.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58015.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58015.json index 515dfd7523c..b0d1e160365 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58015.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:12.493", "lastModified": "2025-02-27T03:15:12.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58016.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58016.json index 52b0e7e2695..90ac9af4b65 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58016.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58016.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:12.590", "lastModified": "2025-02-27T03:15:12.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58018.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58018.json index ec59e284e53..ca2a24d0f47 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58018.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58018.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:12.797", "lastModified": "2025-02-27T03:15:12.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58019.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58019.json index d1cc88dc04c..cabb0b92110 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58019.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:12.897", "lastModified": "2025-02-27T03:15:12.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json index 24bc0845c3b..49488ccf890 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58043.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:34.480", "lastModified": "2025-03-04T08:15:34.480", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission bypass vulnerability in the window module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de permisos en el m\u00f3dulo de ventana Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,87 @@ "value": "CWE-840" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "082BBC06-A0B2-481E-BF6F-56180E17ABEF" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json index 4b39de66bba..90f36402df7 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58044.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58044", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:34.750", - "lastModified": "2025-03-04T08:15:34.750", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission verification bypass vulnerability in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de verificaci\u00f3n de permisos en el m\u00f3dulo de notificaci\u00f3n Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,87 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "082BBC06-A0B2-481E-BF6F-56180E17ABEF" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json index 94889a87d41..7a02f7698a7 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58045.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58045", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:34.973", - "lastModified": "2025-03-04T08:15:34.973", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multi-concurrency vulnerability in the media digital copyright protection module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de multiconcurrencia en el m\u00f3dulo de protecci\u00f3n de derechos de autor de medios digitales Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json index 4658473f80b..2d223b1ec0e 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58046.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58046", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:35.117", - "lastModified": "2025-03-04T08:15:35.117", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission management vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de gesti\u00f3n de permisos en el m\u00f3dulo de pantalla de bloqueo Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json index 020e8f35dc7..7fc12e187b4 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58047.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58047", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:35.267", - "lastModified": "2025-03-04T08:15:35.267", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission verification vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de verificaci\u00f3n de permisos en el m\u00f3dulo de librer\u00eda multimedia Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json index 7e5b4d8a2f6..f6702bcc969 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58048", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:35.417", - "lastModified": "2025-03-04T08:15:35.417", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multi-thread problem vulnerability in the package management module\nImpact: Successful exploitation of this vulnerability may affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de problema de m\u00faltiples subprocesos en el m\u00f3dulo de gesti\u00f3n de paquetes Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json index 3bb76ebf3f0..7db8699de31 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58049.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58049", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:35.593", - "lastModified": "2025-03-04T08:15:35.593", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Permission verification vulnerability in the media library module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de verificaci\u00f3n de permisos en el m\u00f3dulo de librer\u00eda multimedia Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json index a95cf3e8b74..80909e04801 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58050.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58050", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:35.767", - "lastModified": "2025-03-04T08:15:35.767", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper access permission in the HDC module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de permiso de acceso indebido en el m\u00f3dulo HDC Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json index 2e1654ce1f6..039fceb23d5 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: ipmb: Add check devm_kasprintf() returned value\n\ndevm_kasprintf() can return a NULL pointer on failure but this\nreturned value is not checked." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipmi: ipmb: Agregar verificaci\u00f3n del valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se verifica." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json index 4cddab10660..dcf71ebe43b 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table\n\nThe function atomctrl_get_smc_sclk_range_table() does not check the return\nvalue of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to\nretrieve SMU_Info table, it returns NULL which is later dereferenced.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\nIn practice this should never happen as this code only gets called\non polaris chips and the vbios data table will always be present on\nthose chips." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Arreglar posible desreferencia de puntero NULL en atomctrl_get_smc_sclk_range_table La funci\u00f3n atomctrl_get_smc_sclk_range_table() no comprueba el valor de retorno de smu_atom_get_data_table(). Si smu_atom_get_data_table() no puede recuperar la tabla SMU_Info, devuelve NULL que luego se desreferencia. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE. En la pr\u00e1ctica, esto nunca deber\u00eda suceder ya que este c\u00f3digo solo se llama en chips polaris y la tabla de datos vbios siempre estar\u00e1 presente en esos chips." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json index 608b4790171..9e639cbfe88 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix handling of received connection abort\n\nFix the handling of a connection abort that we've received. Though the\nabort is at the connection level, it needs propagating to the calls on that\nconnection. Whilst the propagation bit is performed, the calls aren't then\nwoken up to go and process their termination, and as no further input is\nforthcoming, they just hang.\n\nAlso add some tracing for the logging of connection aborts." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rxrpc: Se ha corregido la gesti\u00f3n de la interrupci\u00f3n de la conexi\u00f3n recibida Se ha corregido la gesti\u00f3n de una interrupci\u00f3n de la conexi\u00f3n que hemos recibido. Aunque la interrupci\u00f3n se produce a nivel de conexi\u00f3n, es necesario propagarla a las llamadas de esa conexi\u00f3n. Mientras se realiza el bit de propagaci\u00f3n, las llamadas no se activan para procesar su finalizaci\u00f3n y, como no se recibe ninguna otra entrada, simplemente se cuelgan. Tambi\u00e9n se ha a\u00f1adido alg\u00fan seguimiento para el registro de las interrupciones de la conexi\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json index bdf18b1a35a..bcd0270a7a1 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: media: max96712: fix kernel oops when removing module\n\nThe following kernel oops is thrown when trying to remove the max96712\nmodule:\n\nUnable to handle kernel paging request at virtual address 00007375746174db\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=000000010af89000\n[00007375746174db] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] PREEMPT SMP\nModules linked in: crct10dif_ce polyval_ce mxc_jpeg_encdec flexcan\n snd_soc_fsl_sai snd_soc_fsl_asoc_card snd_soc_fsl_micfil dwc_mipi_csi2\n imx_csi_formatter polyval_generic v4l2_jpeg imx_pcm_dma can_dev\n snd_soc_imx_audmux snd_soc_wm8962 snd_soc_imx_card snd_soc_fsl_utils\n max96712(C-) rpmsg_ctrl rpmsg_char pwm_fan fuse\n [last unloaded: imx8_isi]\nCPU: 0 UID: 0 PID: 754 Comm: rmmod\n\t Tainted: G C 6.12.0-rc6-06364-g327fec852c31 #17\nTainted: [C]=CRAP\nHardware name: NXP i.MX95 19X19 board (DT)\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : led_put+0x1c/0x40\nlr : v4l2_subdev_put_privacy_led+0x48/0x58\nsp : ffff80008699bbb0\nx29: ffff80008699bbb0 x28: ffff00008ac233c0 x27: 0000000000000000\nx26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000\nx23: ffff000080cf1170 x22: ffff00008b53bd00 x21: ffff8000822ad1c8\nx20: ffff000080ff5c00 x19: ffff00008b53be40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000004 x13: ffff0000800f8010 x12: 0000000000000000\nx11: ffff000082acf5c0 x10: ffff000082acf478 x9 : ffff0000800f8010\nx8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d\nx5 : 8080808000000000 x4 : 0000000000000020 x3 : 00000000553a3dc1\nx2 : ffff00008ac233c0 x1 : ffff00008ac233c0 x0 : ff00737574617473\nCall trace:\n led_put+0x1c/0x40\n v4l2_subdev_put_privacy_led+0x48/0x58\n v4l2_async_unregister_subdev+0x2c/0x1a4\n max96712_remove+0x1c/0x38 [max96712]\n i2c_device_remove+0x2c/0x9c\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1cc/0x228\n driver_detach+0x4c/0x98\n bus_remove_driver+0x6c/0xbc\n driver_unregister+0x30/0x60\n i2c_del_driver+0x54/0x64\n max96712_i2c_driver_exit+0x18/0x1d0 [max96712]\n __arm64_sys_delete_module+0x1a4/0x290\n invoke_syscall+0x48/0x10c\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xd8\n el0t_64_sync_handler+0x120/0x12c\n el0t_64_sync+0x190/0x194\nCode: f9000bf3 aa0003f3 f9402800 f9402000 (f9403400)\n---[ end trace 0000000000000000 ]---\n\nThis happens because in v4l2_i2c_subdev_init(), the i2c_set_cliendata()\nis called again and the data is overwritten to point to sd, instead of\npriv. So, in remove(), the wrong pointer is passed to\nv4l2_async_unregister_subdev(), leading to a crash." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: media: max96712: arregla el error del kernel al eliminar el m\u00f3dulo El siguiente error del kernel se produce al intentar eliminar el m\u00f3dulo max96712: No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 00007375746174db Informaci\u00f3n de aborto de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010af89000 [00007375746174db] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: crct10dif_ce polyval_ce mxc_jpeg_encdec flexcan snd_soc_fsl_sai snd_soc_fsl_asoc_card snd_soc_fsl_micfil dwc_mipi_csi2 imx_csi_formatter polyval_generic v4l2_jpeg imx_pcm_dma can_dev snd_soc_imx_audmux snd_soc_wm8962 snd_soc_imx_card snd_soc_fsl_utils max96712(C-) rpmsg_ctrl rpmsg_char pwm_fan fuse [last unloaded: imx8_isi] CPU: 0 UID: 0 PID: 754 Comm: rmmod Tainted: G C 6.12.0-rc6-06364-g327fec852c31 #17 Tainted: [C]=CRAP Hardware name: NXP i.MX95 19X19 board (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : led_put+0x1c/0x40 lr : v4l2_subdev_put_privacy_led+0x48/0x58 sp : ffff80008699bbb0 x29: ffff80008699bbb0 x28: ffff00008ac233c0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: ffff000080cf1170 x22: ffff00008b53bd00 x21: ffff8000822ad1c8 x20: ffff000080ff5c00 x19: ffff00008b53be40 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000004 x13: ffff0000800f8010 x12: 0000000000000000 x11: ffff000082acf5c0 x10: ffff000082acf478 x9 : ffff0000800f8010 x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d x5 : 8080808000000000 x4 : 0000000000000020 x3 : 00000000553a3dc1 x2 : ffff00008ac233c0 x1 : ffff00008ac233c0 x0 : ff00737574617473 Call trace: led_put+0x1c/0x40 v4l2_subdev_put_privacy_led+0x48/0x58 v4l2_async_unregister_subdev+0x2c/0x1a4 max96712_remove+0x1c/0x38 [max96712] i2c_device_remove+0x2c/0x9c device_remove+0x4c/0x80 device_release_driver_internal+0x1cc/0x228 driver_detach+0x4c/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 i2c_del_driver+0x54/0x64 max96712_i2c_driver_exit+0x18/0x1d0 [max96712] __arm64_sys_delete_module+0x1a4/0x290 invoke_syscall+0x48/0x10c el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xd8 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x190/0x194 Code: f9000bf3 aa0003f3 f9402800 f9402000 (f9403400) ---[ end trace 0000000000000000 ]--- Esto sucede porque en v4l2_i2c_subdev_init(), se vuelve a llamar a i2c_set_cliendata() y los datos se sobrescriben para apuntar a sd, en lugar de priv. Entonces, en remove(), se pasa el puntero incorrecto a v4l2_async_unregister_subdev(), lo que genera un bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json index 3ae9d7df65a..157103a9c42 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_tcm: Don't free command immediately\n\nDon't prematurely free the command. Wait for the status completion of\nthe sense status. It can be freed then. Otherwise we will double-free\nthe command." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_tcm: No libere el comando inmediatamente No libere el comando de forma prematura. Espere a que se complete el estado de detecci\u00f3n. En ese momento, se puede liberar. De lo contrario, liberaremos el comando dos veces." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json index 47406b09288..42b3300de3f 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Fix ida_free call while not allocated\n\nIn the rproc_alloc() function, on error, put_device(&rproc->dev) is\ncalled, leading to the call of the rproc_type_release() function.\nAn error can occurs before ida_alloc is called.\n\nIn such case in rproc_type_release(), the condition (rproc->index >= 0) is\ntrue as rproc->index has been initialized to 0.\nida_free() is called reporting a warning:\n[ 4.181906] WARNING: CPU: 1 PID: 24 at lib/idr.c:525 ida_free+0x100/0x164\n[ 4.186378] stm32-display-dsi 5a000000.dsi: Fixed dependency cycle(s) with /soc/dsi@5a000000/panel@0\n[ 4.188854] ida_free called for id=0 which is not allocated.\n[ 4.198256] mipi-dsi 5a000000.dsi.0: Fixed dependency cycle(s) with /soc/dsi@5a000000\n[ 4.203556] Modules linked in: panel_orisetech_otm8009a dw_mipi_dsi_stm(+) gpu_sched dw_mipi_dsi stm32_rproc stm32_crc32 stm32_ipcc(+) optee(+)\n[ 4.224307] CPU: 1 UID: 0 PID: 24 Comm: kworker/u10:0 Not tainted 6.12.0 #442\n[ 4.231481] Hardware name: STM32 (Device Tree Support)\n[ 4.236627] Workqueue: events_unbound deferred_probe_work_func\n[ 4.242504] Call trace:\n[ 4.242522] unwind_backtrace from show_stack+0x10/0x14\n[ 4.250218] show_stack from dump_stack_lvl+0x50/0x64\n[ 4.255274] dump_stack_lvl from __warn+0x80/0x12c\n[ 4.260134] __warn from warn_slowpath_fmt+0x114/0x188\n[ 4.265199] warn_slowpath_fmt from ida_free+0x100/0x164\n[ 4.270565] ida_free from rproc_type_release+0x38/0x60\n[ 4.275832] rproc_type_release from device_release+0x30/0xa0\n[ 4.281601] device_release from kobject_put+0xc4/0x294\n[ 4.286762] kobject_put from rproc_alloc.part.0+0x208/0x28c\n[ 4.292430] rproc_alloc.part.0 from devm_rproc_alloc+0x80/0xc4\n[ 4.298393] devm_rproc_alloc from stm32_rproc_probe+0xd0/0x844 [stm32_rproc]\n[ 4.305575] stm32_rproc_probe [stm32_rproc] from platform_probe+0x5c/0xbc\n\nCalling ida_alloc earlier in rproc_alloc ensures that the rproc->index is\nproperly set." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: remoteproc: core: Se corrige en ida_free call while not allocated In the rproc_alloc() function, on error, put_device(&rproc->dev) is called, leading to the call of the rproc_type_release() function. An error can occurs before ida_alloc is called. In such case in rproc_type_release(), the condition (rproc->index >= 0) is true as rproc->index has been initialized to 0. ida_free() is called reporting a warning: [ 4.181906] WARNING: CPU: 1 PID: 24 at lib/idr.c:525 ida_free+0x100/0x164 [ 4.186378] stm32-display-dsi 5a000000.dsi: Fixed dependency cycle(s) with /soc/dsi@5a000000/panel@0 [ 4.188854] ida_free called for id=0 which is not allocated. [ 4.198256] mipi-dsi 5a000000.dsi.0: Fixed dependency cycle(s) with /soc/dsi@5a000000 [ 4.203556] Modules linked in: panel_orisetech_otm8009a dw_mipi_dsi_stm(+) gpu_sched dw_mipi_dsi stm32_rproc stm32_crc32 stm32_ipcc(+) optee(+) [ 4.224307] CPU: 1 UID: 0 PID: 24 Comm: kworker/u10:0 Not tainted 6.12.0 #442 [ 4.231481] Hardware name: STM32 (Device Tree Support) [ 4.236627] Workqueue: events_unbound deferred_probe_work_func [ 4.242504] Call trace: [ 4.242522] unwind_backtrace from show_stack+0x10/0x14 [ 4.250218] show_stack from dump_stack_lvl+0x50/0x64 [ 4.255274] dump_stack_lvl from __warn+0x80/0x12c [ 4.260134] __warn from warn_slowpath_fmt+0x114/0x188 [ 4.265199] warn_slowpath_fmt from ida_free+0x100/0x164 [ 4.270565] ida_free from rproc_type_release+0x38/0x60 [ 4.275832] rproc_type_release from device_release+0x30/0xa0 [ 4.281601] device_release from kobject_put+0xc4/0x294 [ 4.286762] kobject_put from rproc_alloc.part.0+0x208/0x28c [ 4.292430] rproc_alloc.part.0 from devm_rproc_alloc+0x80/0xc4 [ 4.298393] devm_rproc_alloc from stm32_rproc_probe+0xd0/0x844 [stm32_rproc] [ 4.305575] stm32_rproc_probe [stm32_rproc] from platform_probe+0x5c/0xbc Llamar a ida_alloc antes en rproc_alloc garantiza que rproc->index est\u00e1 configurado correctamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json index 7bee3e37edb..44e14db48de 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: convert workqueues to unbound\n\nWhen a workqueue is created with `WQ_UNBOUND`, its work items are\nserved by special worker-pools, whose host workers are not bound to\nany specific CPU. In the default configuration (i.e. when\n`queue_delayed_work` and friends do not specify which CPU to run the\nwork item on), `WQ_UNBOUND` allows the work item to be executed on any\nCPU in the same node of the CPU it was enqueued on. While this\nsolution potentially sacrifices locality, it avoids contention with\nother processes that might dominate the CPU time of the processor the\nwork item was scheduled on.\n\nThis is not just a theoretical problem: in a particular scenario\nmisconfigured process was hogging most of the time from CPU0, leaving\nless than 0.5% of its CPU time to the kworker. The IDPF workqueues\nthat were using the kworker on CPU0 suffered large completion delays\nas a result, causing performance degradation, timeouts and eventual\nsystem crash.\n\n\n* I have also run a manual test to gauge the performance\n improvement. The test consists of an antagonist process\n (`./stress --cpu 2`) consuming as much of CPU 0 as possible. This\n process is run under `taskset 01` to bind it to CPU0, and its\n priority is changed with `chrt -pQ 9900 10000 ${pid}` and\n `renice -n -20 ${pid}` after start.\n\n Then, the IDPF driver is forced to prefer CPU0 by editing all calls\n to `queue_delayed_work`, `mod_delayed_work`, etc... to use CPU 0.\n\n Finally, `ktraces` for the workqueue events are collected.\n\n Without the current patch, the antagonist process can force\n arbitrary delays between `workqueue_queue_work` and\n `workqueue_execute_start`, that in my tests were as high as\n `30ms`. With the current patch applied, the workqueue can be\n migrated to another unloaded CPU in the same node, and, keeping\n everything else equal, the maximum delay I could see was `6us`." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: idpf: convertir colas de trabajo en no vinculadas Cuando se crea una cola de trabajo con `WQ_UNBOUND`, sus elementos de trabajo son atendidos por grupos de trabajadores especiales, cuyos trabajadores host no est\u00e1n vinculados a ninguna CPU espec\u00edfica. En la configuraci\u00f3n predeterminada (es decir, cuando `queue_delayed_work` y amigos no especifican en qu\u00e9 CPU ejecutar el elemento de trabajo), `WQ_UNBOUND` permite que el elemento de trabajo se ejecute en cualquier CPU en el mismo nodo de la CPU en la que se puso en cola. Si bien esta soluci\u00f3n potencialmente sacrifica la localidad, evita la contenci\u00f3n con otros procesos que podr\u00edan dominar el tiempo de CPU del procesador en el que se program\u00f3 el elemento de trabajo. Este no es solo un problema te\u00f3rico: en un escenario particular, el proceso mal configurado acaparaba la mayor parte del tiempo de la CPU0, dejando menos del 0,5% de su tiempo de CPU al kworker. Las colas de trabajo IDPF que estaban usando el kworker en CPU0 sufrieron grandes retrasos en la finalizaci\u00f3n como resultado, causando degradaci\u00f3n del rendimiento, tiempos de espera y eventualmente falla del sistema. * Tambi\u00e9n he ejecutado una prueba manual para medir la mejora del rendimiento. La prueba consiste en un proceso antagonista (`./stress --cpu 2`) que consume la mayor cantidad posible de CPU 0. Este proceso se ejecuta bajo `taskset 01` para vincularlo a CPU0, y su prioridad se cambia con `chrt -pQ 9900 10000 ${pid}` y `renice -n -20 ${pid}` despu\u00e9s del inicio. Luego, el controlador IDPF se ve obligado a preferir CPU0 editando todas las llamadas a `queue_delayed_work`, `mod_delayed_work`, etc... para usar CPU 0. Finalmente, se recopilan `ktraces` para los eventos de la cola de trabajo. Sin el parche actual, el proceso antagonista puede forzar demoras arbitrarias entre `workqueue_queue_work` y `workqueue_execute_start`, que en mis pruebas fueron tan altas como `30ms`. Con el parche actual aplicado, la cola de trabajo se puede migrar a otra CPU sin carga en el mismo nodo y, manteniendo todo lo dem\u00e1s igual, la demora m\u00e1xima que pude ver fue `6us`." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json index 15d99288d7f..1859f048c25 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: skip dumping tnc tree when zroot is null\n\nClearing slab cache will free all znode in memory and make\nc->zroot.znode = NULL, then dumping tnc tree will access\nc->zroot.znode which cause null pointer dereference." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: omite el volcado del \u00e1rbol tnc cuando zroot es nulo. Limpiar el cach\u00e9 de slab liberar\u00e1 todos los znode en la memoria y har\u00e1 que c->zroot.znode = NULL, luego, al volcar el \u00e1rbol tnc se acceder\u00e1 a c->zroot.znode, lo que provocar\u00e1 una desreferencia del puntero nulo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json index d2bd929fcd5..ee7805b7991 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix deadlock during uvc_probe\n\nIf uvc_probe() fails, it can end up calling uvc_status_unregister() before\nuvc_status_init() is called.\n\nFix this by checking if dev->status is NULL or not in\nuvc_status_unregister()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Se solucion\u00f3 el bloqueo durante uvc_probe Si uvc_probe() falla, puede terminar llamando a uvc_status_unregister() antes de que se llame a uvc_status_init(). Solucione esto verificando si dev->status es NULL o no en uvc_status_unregister()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json index ad3c67505a4..a406d231094 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing\n\nThere is a UAF report in the bpf_struct_ops when CONFIG_MODULES=n.\nIn particular, the report is on tcp_congestion_ops that has\na \"struct module *owner\" member.\n\nFor struct_ops that has a \"struct module *owner\" member,\nit can be extended either by the regular kernel module or\nby the bpf_struct_ops. bpf_try_module_get() will be used\nto do the refcounting and different refcount is done\nbased on the owner pointer. When CONFIG_MODULES=n,\nthe btf_id of the \"struct module\" is missing:\n\nWARN: resolve_btfids: unresolved symbol module\n\nThus, the bpf_try_module_get() cannot do the correct refcounting.\n\nNot all subsystem's struct_ops requires the \"struct module *owner\" member.\ne.g. the recent sched_ext_ops.\n\nThis patch is to disable bpf_struct_ops registration if\nthe struct_ops has the \"struct module *\" member and the\n\"struct module\" btf_id is missing. The btf_type_is_fwd() helper\nis moved to the btf.h header file for this test.\n\nThis has happened since the beginning of bpf_struct_ops which has gone\nthrough many changes. The Fixes tag is set to a recent commit that this\npatch can apply cleanly. Considering CONFIG_MODULES=n is not\ncommon and the age of the issue, targeting for bpf-next also." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Rechazar el registro de struct_ops que usa el m\u00f3dulo ptr y falta el m\u00f3dulo btf_id Hay un informe UAF en bpf_struct_ops cuando CONFIG_MODULES=n. En particular, el informe est\u00e1 en tcp_congestion_ops que tiene un miembro \"struct module *owner\". Para struct_ops que tiene un miembro \"struct module *owner\", puede extenderse mediante el m\u00f3dulo de kernel regular o mediante bpf_struct_ops. bpf_try_module_get() se usar\u00e1 para hacer el recuento de referencias y se realiza un recuento de referencias diferente seg\u00fan el puntero del propietario. Cuando CONFIG_MODULES=n, falta el btf_id del \"struct module\": WARN: resolve_btfids: m\u00f3dulo de s\u00edmbolo sin resolver Por lo tanto, bpf_try_module_get() no puede hacer el recuento de referencias correcto. No todos los struct_ops de los subsistemas requieren el miembro \"struct module *owner\", por ejemplo, el reciente sched_ext_ops. Este parche sirve para deshabilitar el registro de bpf_struct_ops si struct_ops tiene el miembro \"struct module *\" y falta el btf_id \"struct module\". El asistente btf_type_is_fwd() se ha movido al archivo de encabezado btf.h para esta prueba. Esto ha sucedido desde el comienzo de bpf_struct_ops, que ha sufrido muchos cambios. La etiqueta Fixes se establece en una confirmaci\u00f3n reciente que este parche puede aplicar sin problemas. Teniendo en cuenta que CONFIG_MODULES=n no es com\u00fan y la antig\u00fcedad del problema, tambi\u00e9n se apunta a bpf-next." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json index 990c35cd578..f2ec33c51fb 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: prohibit deactivating all links\n\nIn the internal API this calls this is a WARN_ON, but that\nshould remain since internally we want to know about bugs\nthat may cause this. Prevent deactivating all links in the\ndebugfs write directly." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: proh\u00edbe desactivar todos los enlaces En la API interna, esto es un WARN_ON, pero eso deber\u00eda permanecer ya que internamente queremos saber sobre los errores que pueden causar esto. Evite desactivar todos los enlaces en la escritura debugfs directamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json index 962679f2cdb..d7705b7df1c 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: avoid NULL pointer dereference\n\nWhen iterating over the links of a vif, we need to make sure that the\npointer is valid (in other words - that the link exists) before\ndereferncing it.\nUse for_each_vif_active_link that also does the check." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: evitar la desreferencia de puntero NULL Al iterar sobre los enlaces de un vif, debemos asegurarnos de que el puntero sea v\u00e1lido (en otras palabras, que el enlace exista) antes de desreferenciarlo. Utilice for_each_vif_active_link que tambi\u00e9n realiza la verificaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json index 9a2a8372424..ed191ece3a0 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: fix memory leaks and invalid access at probe error path\n\nDeinitialize at reverse order when probe fails.\n\nWhen init_sw_vars fails, rtl_deinit_core should not be called, specially\nnow that it destroys the rtl_wq workqueue.\n\nAnd call rtl_pci_deinit and deinit_sw_vars, otherwise, memory will be\nleaked.\n\nRemove pci_set_drvdata call as it will already be cleaned up by the core\ndriver code and could lead to memory leaks too. cf. commit 8d450935ae7f\n(\"wireless: rtlwifi: remove unnecessary pci_set_drvdata()\") and\ncommit 3d86b93064c7 (\"rtlwifi: Fix PCI probe error path orphaned memory\")." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtlwifi: corrige fugas de memoria y acceso no v\u00e1lido en la ruta de error de la sonda Desinicializar en orden inverso cuando la sonda falla. Cuando init_sw_vars falla, no se debe llamar a rtl_deinit_core, especialmente ahora que destruye la cola de trabajo rtl_wq. Y llame a rtl_pci_deinit y deinit_sw_vars, de lo contrario, se perder\u00e1 memoria. Elimine la llamada a pci_set_drvdata ya que ya estar\u00e1 limpiada por el c\u00f3digo del controlador central y tambi\u00e9n podr\u00eda provocar fugas de memoria. cf. commit 8d450935ae7f (\"wireless: rtlwifi: eliminar pci_set_drvdata() innecesario\") y commit 3d86b93064c7 (\"rtlwifi: corregir la memoria hu\u00e9rfana en la ruta de error de la sonda PCI\")." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json index b1f7bcc1342..13c8b40fd69 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()\n\nkunit_kzalloc() may return NULL, dereferencing it without NULL check may\nlead to NULL dereference.\nAdd a NULL check for ies." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: pruebas: Se corrige la posible desreferenciaci\u00f3n de NULL en test_cfg80211_parse_colocated_ap() kunit_kzalloc() puede devolver NULL, desreferenciarlo sin la comprobaci\u00f3n de NULL puede provocar una desreferencia de NULL. Agregue una comprobaci\u00f3n de NULL para ies." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json index 388d0887120..638f72c7ffc 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check\n\nThe devm_kzalloc() function returns NULL on error, not error pointers.\nFix the check." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-apbc: Se ha corregido la comprobaci\u00f3n NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() devuelve NULL en caso de error, no punteros de error. Corrija la comprobaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json index c9803ba3263..789ad177c44 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check\n\nThe devm_kzalloc() function doesn't return error pointers, it returns\nNULL on error. Update the check to match." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-apbcp: Se corrige una comprobaci\u00f3n de NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() no devuelve punteros de error, devuelve NULL en caso de error. Actualice la comprobaci\u00f3n para que coincida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json index e6de969d9fb..69819302e11 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check\n\nThe devm_kzalloc() function returns NULL on error, not error pointers.\nUpdate the check to match." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-mpmu: Se corrige una comprobaci\u00f3n de NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() devuelve NULL en caso de error, no punteros de error. Actualice la comprobaci\u00f3n para que coincida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json index b9316a90935..b1345b2b454 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nOPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized\n\nIf a driver calls dev_pm_opp_find_bw_ceil/floor() the retrieve bandwidth\nfrom the OPP table but the bandwidth table was not created because the\ninterconnect properties were missing in the OPP consumer node, the\nkernel will crash with:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000004\n...\npc : _read_bw+0x8/0x10\nlr : _opp_table_find_key+0x9c/0x174\n...\nCall trace:\n _read_bw+0x8/0x10 (P)\n _opp_table_find_key+0x9c/0x174 (L)\n _find_key+0x98/0x168\n dev_pm_opp_find_bw_ceil+0x50/0x88\n...\n\nIn order to fix the crash, create an assert function to check\nif the bandwidth table was created before trying to get a\nbandwidth with _read_bw()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: OPP: se corrige dev_pm_opp_find_bw_*() cuando la tabla de ancho de banda no est\u00e1 inicializada Si un controlador llama a dev_pm_opp_find_bw_ceil/floor() para recuperar el ancho de banda de la tabla OPP pero la tabla de ancho de banda no se cre\u00f3 porque faltaban las propiedades de interconexi\u00f3n en el nodo consumidor de OPP, el kernel se bloquear\u00e1 con: No se puede gestionar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000004 ... pc : _read_bw+0x8/0x10 lr : _opp_table_find_key+0x9c/0x174 ... Rastreo de llamada: _read_bw+0x8/0x10 (P) _opp_table_find_key+0x9c/0x174 (L) _find_key+0x98/0x168 dev_pm_opp_find_bw_ceil+0x50/0x88 ... Para solucionar el fallo, cree una funci\u00f3n de afirmaci\u00f3n para verificar si la tabla de ancho de banda se cre\u00f3 antes de intentar obtener un ancho de banda con _read_bw()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json index ea313143fa9..331b31c0604 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read\n\nThe nvmem interface supports variable buffer sizes, while the regmap\ninterface operates with fixed-size storage. If an nvmem client uses a\nbuffer size less than 4 bytes, regmap_read will write out of bounds\nas it expects the buffer to point at an unsigned int.\n\nFix this by using an intermediary unsigned int to hold the value." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: pcf85063: se corrige una posible escritura OOB en la lectura NVMEM PCF85063 La interfaz nvmem admite tama\u00f1os de b\u00fafer variables, mientras que la interfaz regmap opera con almacenamiento de tama\u00f1o fijo. Si un cliente nvmem usa un tama\u00f1o de b\u00fafer menor a 4 bytes, regmap_read escribir\u00e1 fuera de los l\u00edmites ya que espera que el b\u00fafer apunte a una int sin signo. Corrija esto usando una int sin signo intermedia para contener el valor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json index fd4238707cb..54ed637e203 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT\n\nIn PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible\ncontext. bpf_mem_alloc must be used in PREEMPT_RT. This patch is\nto enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT\nis enabled.\n\n[ 35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[ 35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs\n[ 35.118569] preempt_count: 1, expected: 0\n[ 35.118571] RCU nest depth: 1, expected: 1\n[ 35.118577] INFO: lockdep is turned off.\n ...\n[ 35.118647] __might_resched+0x433/0x5b0\n[ 35.118677] rt_spin_lock+0xc3/0x290\n[ 35.118700] ___slab_alloc+0x72/0xc40\n[ 35.118723] __kmalloc_noprof+0x13f/0x4e0\n[ 35.118732] bpf_map_kzalloc+0xe5/0x220\n[ 35.118740] bpf_selem_alloc+0x1d2/0x7b0\n[ 35.118755] bpf_local_storage_update+0x2fa/0x8b0\n[ 35.118784] bpf_sk_storage_get_tracing+0x15a/0x1d0\n[ 35.118791] bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66\n[ 35.118795] bpf_trace_run3+0x222/0x400\n[ 35.118820] __bpf_trace_inet_sock_set_state+0x11/0x20\n[ 35.118824] trace_inet_sock_set_state+0x112/0x130\n[ 35.118830] inet_sk_state_store+0x41/0x90\n[ 35.118836] tcp_set_state+0x3b3/0x640\n\nThere is no need to adjust the gfp_flags passing to the\nbpf_mem_cache_alloc_flags() which only honors the GFP_KERNEL.\nThe verifier has ensured GFP_KERNEL is passed only in sleepable context.\n\nIt has been an old issue since the first introduction of the\nbpf_local_storage ~5 years ago, so this patch targets the bpf-next.\n\nbpf_mem_alloc is needed to solve it, so the Fixes tag is set\nto the commit when bpf_mem_alloc was first used in the bpf_local_storage." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT In PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible context. bpf_mem_alloc must be used in PREEMPT_RT. This patch is to enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT is enabled. [ 35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 [ 35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs [ 35.118569] preempt_count: 1, expected: 0 [ 35.118571] RCU nest depth: 1, expected: 1 [ 35.118577] INFO: lockdep is turned off. ... [ 35.118647] __might_resched+0x433/0x5b0 [ 35.118677] rt_spin_lock+0xc3/0x290 [ 35.118700] ___slab_alloc+0x72/0xc40 [ 35.118723] __kmalloc_noprof+0x13f/0x4e0 [ 35.118732] bpf_map_kzalloc+0xe5/0x220 [ 35.118740] bpf_selem_alloc+0x1d2/0x7b0 [ 35.118755] bpf_local_storage_update+0x2fa/0x8b0 [ 35.118784] bpf_sk_storage_get_tracing+0x15a/0x1d0 [ 35.118791] bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66 [ 35.118795] bpf_trace_run3+0x222/0x400 [ 35.118820] __bpf_trace_inet_sock_set_state+0x11/0x20 [ 35.118824] trace_inet_sock_set_state+0x112/0x130 [ 35.118830] inet_sk_state_store+0x41/0x90 [ 35.118836] tcp_set_state+0x3b3/0x640 No es necesario ajustar el gfp_flags que se pasa a bpf_mem_cache_alloc_flags() que solo respeta el GFP_KERNEL. El verificador se ha asegurado de que GFP_KERNEL se pase solo en un contexto en el que se pueda dormir. Ha sido un problema antiguo desde la primera introducci\u00f3n de bpf_local_storage hace unos 5 a\u00f1os, por lo que este parche apunta a bpf-next. Se necesita bpf_mem_alloc para resolverlo, por lo que la etiqueta Fixes se establece en el commit cuando bpf_mem_alloc se utiliz\u00f3 por primera vez en bpf_local_storage." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json index a3b92051634..a4b6def9c90 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: prevent adding a device which is already a team device lower\n\nPrevent adding a device which is already a team device lower,\ne.g. adding veth0 if vlan1 was already added and veth0 is a lower of\nvlan1.\n\nThis is not useful in practice and can lead to recursive locking:\n\n$ ip link add veth0 type veth peer name veth1\n$ ip link set veth0 up\n$ ip link set veth1 up\n$ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1\n$ ip link add team0 type team\n$ ip link set veth0.1 down\n$ ip link set veth0.1 master team0\nteam0: Port device veth0.1 added\n$ ip link set veth0 down\n$ ip link set veth0 master team0\n\n============================================\nWARNING: possible recursive locking detected\n6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted\n--------------------------------------------\nip/7684 is trying to acquire lock:\nffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n\nbut task is already holding lock:\nffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977)\n\nother info that might help us debug this:\nPossible unsafe locking scenario:\n\nCPU0\n----\nlock(team->team_lock_key);\nlock(team->team_lock_key);\n\n*** DEADLOCK ***\n\nMay be due to missing lock nesting notation\n\n2 locks held by ip/7684:\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nCall Trace:\n\ndump_stack_lvl (lib/dump_stack.c:122)\nprint_deadlock_bug.cold (kernel/locking/lockdep.c:3040)\n__lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226)\n? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548)\nlock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2))\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? lock_acquire (kernel/locking/lockdep.c:5822)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n__mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? fib_sync_up (net/ipv4/fib_semantics.c:2167)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nteam_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\n__dev_notify_flags (net/core/dev.c:8993)\n? __dev_change_flags (net/core/dev.c:8975)\ndev_change_flags (net/core/dev.c:9027)\nvlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470)\n? br_device_event (net/bridge/br.c:143)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\ndev_open (net/core/dev.c:1519 net/core/dev.c:1505)\nteam_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977)\n? __pfx_team_add_slave (drivers/net/team/team_core.c:1972)\ndo_set_master (net/core/rtnetlink.c:2917)\ndo_setlink.isra.0 (net/core/rtnetlink.c:3117)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: equipo: evitar agregar un dispositivo que ya es un dispositivo de equipo inferior Evitar agregar un dispositivo que ya es un dispositivo de equipo inferior, por ejemplo, agregar veth0 si vlan1 ya se agreg\u00f3 y veth0 es un inferior de vlan1. Esto no es \u00fatil en la pr\u00e1ctica y puede provocar un bloqueo recursivo: $ ip link add veth0 type veth peer name veth1 $ ip link set veth0 up $ ip link set veth1 up $ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1 $ ip link add team0 type team $ ip link set veth0.1 down $ ip link set veth0.1 master team0 team0: Port device veth0.1 added $ ip link set veth0 down $ ip link set veth0 master team0 ============================================ WARNING: possible recursive locking detected 6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted -------------------------------------------- ip/7684 is trying to acquire lock: ffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) but task is already holding lock: ffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977) other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(team->team_lock_key); lock(team->team_lock_key); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by ip/7684: stack backtrace: CPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: dump_stack_lvl (lib/dump_stack.c:122) print_deadlock_bug.cold (kernel/locking/lockdep.c:3040) __lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226) ? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548) lock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2)) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? lock_acquire (kernel/locking/lockdep.c:5822) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) __mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? fib_sync_up (net/ipv4/fib_semantics.c:2167) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) notifier_call_chain (kernel/notifier.c:85) call_netdevice_notifiers_info (net/core/dev.c:1996) __dev_notify_flags (net/core/dev.c:8993) ? __dev_change_flags (net/core/dev.c:8975) dev_change_flags (net/core/dev.c:9027) vlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470) ? br_device_event (net/bridge/br.c:143) notifier_call_chain (kernel/notifier.c:85) call_netdevice_notifiers_info (net/core/dev.c:1996) dev_open (net/core/dev.c:1519 net/core/dev.c:1505) team_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977) ? __pfx_team_add_slave (drivers/net/team/team_core.c:1972) do_set_master (net/core/rtnetlink.c:2917) do_setlink.isra.0 (net/core/rtnetlink.c:3117) " } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json index 16f60ed4817..135ba526f5a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: remove unused check_buddy_priv\n\nCommit 2461c7d60f9f (\"rtlwifi: Update header file\") introduced a global\nlist of private data structures.\n\nLater on, commit 26634c4b1868 (\"rtlwifi Modify existing bits to match\nvendor version 2013.02.07\") started adding the private data to that list at\nprobe time and added a hook, check_buddy_priv to find the private data from\na similar device.\n\nHowever, that function was never used.\n\nBesides, though there is a lock for that list, it is never used. And when\nthe probe fails, the private data is never removed from the list. This\nwould cause a second probe to access freed memory.\n\nRemove the unused hook, structures and members, which will prevent the\npotential race condition on the list and its corruption during a second\nprobe when probe fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtlwifi: eliminar check_buddy_priv no utilizado el commit 2461c7d60f9f (\"rtlwifi: Actualizar archivo de encabezado\") introdujo una lista global de estructuras de datos privados. M\u00e1s tarde, el commit 26634c4b1868 (\"rtlwifi Modificar bits existentes para que coincidan con la versi\u00f3n del proveedor 2013.02.07\") comenz\u00f3 a agregar los datos privados a esa lista en el momento del sondeo y agreg\u00f3 un gancho, check_buddy_priv para encontrar los datos privados de un dispositivo similar. Sin embargo, esa funci\u00f3n nunca se us\u00f3. Adem\u00e1s, aunque hay un bloqueo para esa lista, nunca se usa. Y cuando el sondeo falla, los datos privados nunca se eliminan de la lista. Esto har\u00eda que un segundo sondeo acceda a la memoria liberada. Elimine el gancho, las estructuras y los miembros no utilizados, lo que evitar\u00e1 la posible condici\u00f3n de ejecuci\u00f3n en la lista y su corrupci\u00f3n durante un segundo sondeo cuando el sondeo falla." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json index 8e54a1b6c06..396a14e74d5 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp\n\nSimilar to the r_pipe sspp protect, add a check to protect\nthe pipe state prints to avoid NULL ptr dereference for cases when\nthe state is dumped without a corresponding atomic_check() where the\npipe->sspp is assigned.\n\nPatchwork: https://patchwork.freedesktop.org/patch/628404/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: comprobar dpu_plane_atomic_print_state() para sspp v\u00e1lidos De manera similar a la protecci\u00f3n r_pipe sspp, agregue una verificaci\u00f3n para proteger las impresiones del estado de la tuber\u00eda para evitar la desreferencia de ptr NULL para los casos en que el estado se vuelca sin un atomic_check() correspondiente donde se asigna pipe->sspp. Patchwork: https://patchwork.freedesktop.org/patch/628404/" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json index a072b90ea07..2dde01502a0 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Grab intel_display from the encoder to avoid potential oopsies\n\nGrab the intel_display from 'encoder' rather than 'state'\nin the encoder hooks to avoid the massive footgun that is\nintel_sanitize_encoder(), which passes NULL as the 'state'\nargument to encoder .disable() and .post_disable().\n\nTODO: figure out how to actually fix intel_sanitize_encoder()..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915: Tomar intel_display del codificador para evitar posibles errores Tomar intel_display de 'encoder' en lugar de 'state' en los ganchos del codificador para evitar el enorme problema que es intel_sanitize_encoder(), que pasa NULL como el argumento 'state' a .disable() y .post_disable() del codificador. TODO: averiguar c\u00f3mo solucionar realmente intel_sanitize_encoder()..." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json index 16535f44a0b..aeeccf4b2bb 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: tegra - do not transfer req when tegra init fails\n\nThe tegra_cmac_init or tegra_sha_init function may return an error when\nmemory is exhausted. It should not transfer the request when they return\nan error." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: tegra - no transferir solicitud cuando falla la inicializaci\u00f3n de tegra La funci\u00f3n tegra_cmac_init o tegra_sha_init puede devolver un error cuando se agota la memoria. No deber\u00eda transferir la solicitud cuando devuelven un error." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json index d1507561266..1dc39976e61 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-sm6350: Add missing parent_map for two clocks\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n [ 3.388105] Call trace:\n [ 3.390664] qcom_find_src_index+0x3c/0x70 (P)\n [ 3.395301] qcom_find_src_index+0x1c/0x70 (L)\n [ 3.399934] _freq_tbl_determine_rate+0x48/0x100\n [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28\n [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4\n [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc\n [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc\n [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300\n [ 3.455886] clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for two clocks where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: gcc-sm6350: Add missing parent_map for two clocks If a clk_rcg2 has a parent, it should also have parent_map defined, otherwise we'll get a NULL pointer dereference when calling clk_set_rate like the following: [ 3.388105] Call trace: [ 3.390664] qcom_find_src_index+0x3c/0x70 (P) [ 3.395301] qcom_find_src_index+0x1c/0x70 (L) [ 3.399934] _freq_tbl_determine_rate+0x48/0x100 [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28 [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4 [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300 [ 3.455886] clk_set_rate+0x38/0x14c Agregue la propiedad parent_map para dos relojes donde falta y tambi\u00e9n desvincule parent_data para mantener juntos los parent_map y parent_data coincidentes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json index 35054834fbd..f0127c260e3 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback\n\ncommit 1f5664351410 (\"ASoC: lower \"no backend DAIs enabled for ... Port\"\nlog severity\") ignores -EINVAL error message on common soc_pcm_ret().\nIt is used from many functions, ignoring -EINVAL is over-kill.\n\nThe reason why -EINVAL was ignored was it really should only be used\nupon invalid parameters coming from userspace and in that case we don't\nwant to log an error since we do not want to give userspace a way to do\na denial-of-service attack on the syslog / diskspace.\n\nSo don't use soc_pcm_ret() on .prepare callback is better idea." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: soc-pcm: no usar soc_pcm_ret() en la devoluci\u00f3n de llamada .prepare commit 1f5664351410 (\"ASoC: menor severidad del registro \"no backend DAIs enabled for ... Port\") ignora el mensaje de error -EINVAL en soc_pcm_ret() com\u00fan. Se usa desde muchas funciones, ignorar -EINVAL es exagerado. La raz\u00f3n por la que se ignor\u00f3 -EINVAL fue que realmente solo deber\u00eda usarse en par\u00e1metros no v\u00e1lidos que provengan del espacio de usuario y, en ese caso, no queremos registrar un error ya que no queremos darle al espacio de usuario una forma de realizar un ataque de denegaci\u00f3n de servicio en el syslog / espacio de disco. Por lo tanto, no usar soc_pcm_ret() en la devoluci\u00f3n de llamada .prepare es una mejor idea." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json index 41940ebc438..9c422223352 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors\n\nmisc_minor_alloc was allocating id using ida for minor only in case of\nMISC_DYNAMIC_MINOR but misc_minor_free was always freeing ids\nusing ida_free causing a mismatch and following warn:\n> > WARNING: CPU: 0 PID: 159 at lib/idr.c:525 ida_free+0x3e0/0x41f\n> > ida_free called for id=127 which is not allocated.\n> > <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n...\n> > [<60941eb4>] ida_free+0x3e0/0x41f\n> > [<605ac993>] misc_minor_free+0x3e/0xbc\n> > [<605acb82>] misc_deregister+0x171/0x1b3\n\nmisc_minor_alloc is changed to allocate id from ida for all minors\nfalling in the range of dynamic/ misc dynamic minors" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: misc_minor_alloc para usar ida para todos los menores din\u00e1micos/misc din\u00e1micos misc_minor_alloc asignaba id usando ida para menores solo en el caso de MISC_DYNAMIC_MINOR pero misc_minor_free siempre liberaba id usando ida_free, lo que causaba una falta de coincidencia y la siguiente advertencia: > > WARNING: CPU: 0 PID: 159 at lib/idr.c:525 ida_free+0x3e0/0x41f > > ida_free called for id=127 which is not allocated. > > <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< ... > > [<60941eb4>] ida_free+0x3e0/0x41f > > [<605ac993>] misc_minor_free+0x3e/0xbc > > [<605acb82>] misc_deregister+0x171/0x1b3 misc_minor_alloc Se cambi\u00f3 misc_minor_alloc para asignar id de ida para todos los menores que caen en el rango de menores din\u00e1micos/misc din\u00e1micos" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json index 49d62c3091e..623e22601b3 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: dispcc-sm6350: Add missing parent_map for a clock\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n [ 3.388105] Call trace:\n [ 3.390664] qcom_find_src_index+0x3c/0x70 (P)\n [ 3.395301] qcom_find_src_index+0x1c/0x70 (L)\n [ 3.399934] _freq_tbl_determine_rate+0x48/0x100\n [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28\n [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4\n [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc\n [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc\n [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300\n [ 3.455886] clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for the clock where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: dispcc-sm6350: Add missing parent_map for a clock If a clk_rcg2 has a parent, it should also have parent_map defined, otherwise we'll get a NULL pointer dereference when calling clk_set_rate like the following: [ 3.388105] Call trace: [ 3.390664] qcom_find_src_index+0x3c/0x70 (P) [ 3.395301] qcom_find_src_index+0x1c/0x70 (L) [ 3.399934] _freq_tbl_determine_rate+0x48/0x100 [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28 [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4 [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300 [ 3.455886] clk_set_rate+0x38/0x14c Agregue la propiedad parent_map para el reloj donde falta y tambi\u00e9n desvincule parent_data para mantener juntos los parent_map y parent_data coincidentes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json index 5f154660be8..44b2d336a39 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp2: call pm_genpd_init() only after genpd.name is set\n\nSetting the genpd's struct device's name with dev_set_name() is\nhappening within pm_genpd_init(). If it remains NULL, things can blow up\nlater, such as when crafting the devfs hierarchy for the power domain:\n\n Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read\n ...\n Call trace:\n strlen from start_creating+0x90/0x138\n start_creating from debugfs_create_dir+0x20/0x178\n debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144\n genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90\n genpd_debug_init from do_one_initcall+0x5c/0x244\n do_one_initcall from kernel_init_freeable+0x19c/0x1f4\n kernel_init_freeable from kernel_init+0x1c/0x12c\n kernel_init from ret_from_fork+0x14/0x28\n\nBisecting tracks this crash back to commit 899f44531fe6 (\"pmdomain: core:\nAdd GENPD_FLAG_DEV_NAME_FW flag\"), which exchanges use of genpd->name\nwith dev_name(&genpd->dev) in genpd_debug_add.part()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp2: llamar a pm_genpd_init() solo despu\u00e9s de que se establece genpd.name La configuraci\u00f3n del nombre del dispositivo de la estructura genpd con dev_set_name() ocurre dentro de pm_genpd_init(). Si permanece NULL, las cosas pueden explotar m\u00e1s tarde, como al crear la jerarqu\u00eda devfs para el dominio de energ\u00eda: No se puede gestionar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se lee ... Rastreo de llamadas: start_creating+0x90/0x138 start_creating from debugfs_create_dir+0x20/0x178 debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144 genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90 genpd_debug_init from do_one_initcall+0x5c/0x244 do_one_initcall from kernel_init_freeable+0x19c/0x1f4 kernel_init_freeable from kernel_init+0x1c/0x12c kernel_init from ret_from_fork+0x14/0x28 Bisecting rastrea este fallo hasta el commit 899f44531fe6 (\"pmdomain: core: Agregar bandera GENPD_FLAG_DEV_NAME_FW\"), que intercambia el uso de genpd->name con dev_name(&genpd->dev) en genpd_debug_add.part()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json index 0beb5a7cda2..ced261d581b 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nuvoton: Fix an error check in npcm_video_ece_init()\n\nWhen function of_find_device_by_node() fails, it returns NULL instead of\nan error code. So the corresponding error check logic should be modified\nto check whether the return value is NULL and set the error code to be\nreturned as -ENODEV." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: nuvoton: Se corrige una comprobaci\u00f3n de errores en npcm_video_ece_init(). Cuando la funci\u00f3n of_find_device_by_node() falla, devuelve NULL en lugar de un c\u00f3digo de error. Por lo tanto, se debe modificar la l\u00f3gica de comprobaci\u00f3n de errores correspondiente para verificar si el valor de retorno es NULL y establecer el c\u00f3digo de error que se devolver\u00e1 como -ENODEV." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json index 9ea356833fd..f72b3d5bbd6 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool()\n\nCommit 2e4955167ec5 (\"firmware: qcom: scm: Fix __scm and waitq\ncompletion variable initialization\") introduced a write barrier in probe\nfunction to store global '__scm' variable. We all known barriers are\npaired (see memory-barriers.txt: \"Note that write barriers should\nnormally be paired with read or address-dependency barriers\"), therefore\naccessing it from concurrent contexts requires read barrier. Previous\ncommit added such barrier in qcom_scm_is_available(), so let's use that\ndirectly.\n\nLack of this read barrier can result in fetching stale '__scm' variable\nvalue, NULL, and dereferencing it.\n\nNote that barrier in qcom_scm_is_available() satisfies here the control\ndependency." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool() el commit 2e4955167ec5 (\"firmware: qcom: scm: Fix __scm and waitq ending variable initialization\") introdujo una barrera de escritura en la funci\u00f3n de sondeo para almacenar la variable global '__scm'. Todos sabemos que las barreras est\u00e1n emparejadas (consulte memory-barriers.txt: \"Note que las barreras de escritura normalmente deben emparejarse con barreras de lectura o de dependencia de direcci\u00f3n\"), por lo tanto, acceder a ellas desde contextos concurrentes requiere una barrera de lectura. Una confirmaci\u00f3n anterior agreg\u00f3 dicha barrera en qcom_scm_is_available(), as\u00ed que us\u00e9mosla directamente. La falta de esta barrera de lectura puede resultar en la obtenci\u00f3n del valor de la variable '__scm' obsoleto, NULL, y su desreferenciaci\u00f3n. Tenga en cuenta que la barrera en qcom_scm_is_available() satisface aqu\u00ed la dependencia de control." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json index db828c4d320..2f0abdf39e0 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: don't emit warning in tomoyo_write_control()\n\nsyzbot is reporting too large allocation warning at tomoyo_write_control(),\nfor one can write a very very long line without new line character. To fix\nthis warning, I use __GFP_NOWARN rather than checking for KMALLOC_MAX_SIZE,\nfor practically a valid line should be always shorter than 32KB where the\n\"too small to fail\" memory-allocation rule applies.\n\nOne might try to write a valid line that is longer than 32KB, but such\nrequest will likely fail with -ENOMEM. Therefore, I feel that separately\nreturning -EINVAL when a line is longer than KMALLOC_MAX_SIZE is redundant.\nThere is no need to distinguish over-32KB and over-KMALLOC_MAX_SIZE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tomoyo: no emitir advertencia en tomoyo_write_control() syzbot informa una advertencia de asignaci\u00f3n demasiado grande en tomoyo_write_control(), ya que se puede escribir una l\u00ednea muy larga sin un car\u00e1cter de nueva l\u00ednea. Para corregir esta advertencia, uso __GFP_NOWARN en lugar de verificar KMALLOC_MAX_SIZE, ya que pr\u00e1cticamente una l\u00ednea v\u00e1lida siempre debe ser m\u00e1s corta que 32 KB donde se aplica la regla de asignaci\u00f3n de memoria \"demasiado peque\u00f1a para fallar\". Uno podr\u00eda intentar escribir una l\u00ednea v\u00e1lida que sea m\u00e1s larga que 32 KB, pero tal solicitud probablemente fallar\u00e1 con -ENOMEM. Por lo tanto, creo que devolver por separado -EINVAL cuando una l\u00ednea es m\u00e1s larga que KMALLOC_MAX_SIZE es redundante. No hay necesidad de distinguir entre m\u00e1s de 32 KB y m\u00e1s de KMALLOC_MAX_SIZE." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json index d5bfae85f60..64f105120ef 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Stop active perfmon if it is being destroyed\n\nIf the active performance monitor (`v3d->active_perfmon`) is being\ndestroyed, stop it first. Currently, the active perfmon is not\nstopped during destruction, leaving the `v3d->active_perfmon` pointer\nstale. This can lead to undefined behavior and instability.\n\nThis patch ensures that the active perfmon is stopped before being\ndestroyed, aligning with the behavior introduced in commit\n7d1fd3638ee3 (\"drm/v3d: Stop the active perfmon before being destroyed\")." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/v3d: Detener el monitor de rendimiento activo si se est\u00e1 destruyendo Si se est\u00e1 destruyendo el monitor de rendimiento activo (`v3d->active_perfmon`), det\u00e9ngalo primero. Actualmente, el monitor de rendimiento activo no se detiene durante la destrucci\u00f3n, lo que deja obsoleto el puntero `v3d->active_perfmon`. Esto puede provocar un comportamiento indefinido e inestabilidad. Este parche garantiza que el monitor de rendimiento activo se detenga antes de destruirse, en consonancia con el comportamiento introducido en el commit 7d1fd3638ee3 (\"drm/v3d: Detener el monitor de rendimiento activo antes de destruirse\")." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5848.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5848.json index 9e30e83b83a..c895003defb 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5848.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5848.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "published": "2025-02-27T08:15:30.887", "lastModified": "2025-02-27T08:15:30.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5871.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5871.json index 9bfdb8c3e1f..37553261eab 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5871.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5871.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6261.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6261.json index a3db303de27..da705a1b90b 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6261.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T06:15:21.790", "lastModified": "2025-02-27T06:15:21.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json index 13e7c38376d..ab709af22a6 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json index c30477b1ace..f87bd25b625 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json index bc85ea517f0..b90ceff1932 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6489.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6489.json index c59772ac51b..30b98580a12 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6489.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6489.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6491.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6491.json index 0f9ace5cc0e..0738d194a27 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6491.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6491.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6567.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6567.json index 0d823a2cdf2..d8b6e8308d0 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6567.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6567.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6635.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6635.json index 5e12ad73ac7..b5f8430e9ff 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6635.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6635.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6636.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6636.json index 99def365c5d..59b2b9f0a48 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6636.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6636.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6637.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6637.json index 7a674621c89..da53c064fc4 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6637.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6637.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json index c26ae24454a..5dd7b3b54b0 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6638", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T20:15:04.723", - "lastModified": "2024-11-21T09:50:03.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,110 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2021", + "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*", + "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*", + "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*", + "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*", + "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/integer-overflow-vulnerability-reading-tdms-files-in-labview.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/integer-overflow-vulnerability-reading-tdms-files-in-labview.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6784.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6784.json index c6c75a8c856..a7908d13d95 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6784.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6784.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cybersecurity@ch.abb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6810.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6810.json index 68fd0fd8110..cd2e1f89a50 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6810.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-26T13:15:40.600", "lastModified": "2025-02-26T13:15:40.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6823.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6823.json index 7689abd917c..cc5ca460e2f 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6823.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6823.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7135.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7135.json index 6fae0101511..63c97eaafa3 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7135.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-07-31T11:15:11.010", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,64 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.21.8", + "matchCriteriaId": "584F2C97-A3D2-4895-ABCB-C0E7807BE11F" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tainacan/trunk/classes/api/endpoints/class-tainacan-rest-background-processes-controller.php#L370", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tainacan/trunk/classes/api/endpoints/class-tainacan-rest-background-processes-controller.php#L378", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3127693/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4dd0c6a-75af-4b53-ac13-fc4ef0e9001d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7389.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7389.json index be2a138d1ca..d094b44faee 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7389.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7389.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7484.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7484.json index 1493c869947..a832a980ce9 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7484.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7484.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json index 5b3a58dbb02..4709950f21a 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json index b4e60c068b8..daa5cd63bc7 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7559", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-23T03:15:04.060", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T18:17:21.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filemanagerpro.io:file_manager_pro:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "8.3.7", + "matchCriteriaId": "39D8F4C1-74C1-4F93-B18C-674CC5984D56" + } + ] + } + ] } ], "references": [ { "url": "https://filemanagerpro.io/file-manager-pro/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4b45791-4b85-4a2d-8019-1d438bd694cb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7624.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7624.json index 55e64a22ede..a532ddf7873 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7624.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7624.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7791.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7791.json index 925eb0fdbbf..163ee72663f 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7791.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-27T11:15:04.817", "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,28 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpxpro:xpro_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.4.4", + "matchCriteriaId": "3D345B99-A0FE-410D-8508-E99FD3593298" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/xpro-elementor-addons/trunk/widgets/post-grid/post-grid.php#L1891", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3141892/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3141892/#file2", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/xpro-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6025dd5-a1d7-48cc-90b3-f020d3d2298b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7855.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7855.json index 66f12fadc3d..b0c213d31e6 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7855.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7855.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7872.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7872.json index 4b32a7a0996..3d75f253f47 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7872.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7872.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in ExtremePACS Extreme XDS allows Retrieve Embedded Sensitive Data.This issue affects Extreme XDS: before 3933." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en ExtremePACS Extreme XDS permite recuperar datos confidenciales integrados. Este problema afecta a Extreme XDS: antes de 3933." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json index fd072407c4b..cee96c03d35 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7986", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-08-23T12:15:03.920", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T19:08:44.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,86 @@ "value": "CWE-732" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.0", + "versionEndExcluding": "11.1.8", + "matchCriteriaId": "2BC59B57-F8F5-4979-826B-EAA0A8456B2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2.0", + "versionEndExcluding": "11.2.9", + "matchCriteriaId": "79481998-C98B-4486-A2DC-C4DE324DCA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.0.7", + "matchCriteriaId": "BFD553E2-EB04-4D97-AD70-2175933E3DCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.1.0", + "versionEndExcluding": "12.1.8", + "matchCriteriaId": "FC5BBCD2-0C47-4B48-81DD-D56D5677BFA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.0.5", + "matchCriteriaId": "7EEDB253-45FB-4722-994A-E0EF00C7F405" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.1.0", + "versionEndExcluding": "13.1.3", + "matchCriteriaId": "F2FB9C58-1AAF-46CB-BBB5-909223EE5572" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.2.0", + "versionEndExcluding": "13.2.2", + "matchCriteriaId": "BB3AA59A-9CA4-4CD0-981C-B974A94BAC30" + } + ] + } + ] } ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8000.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8000.json index 233c0740fb6..7cefe85042a 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8000.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8000.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restart. \n\nNote: supplicants with pending captive-portal authentication during ASU would be impacted with this bug." + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS con 802.1X configurado, pueden ocurrir ciertas condiciones en las que se recibe una ACL din\u00e1mica del servidor AAA, lo que hace que solo se instale la primera l\u00ednea de la ACL despu\u00e9s de un reinicio de la Actualizaci\u00f3n de software acelerada (ASU). Nota: los solicitantes con autenticaci\u00f3n de portal cautivo pendiente durante la ASU se ver\u00edan afectados por este error." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8105.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8105.json index ca1c3622c2e..667e8ca597c 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8105.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cret@cert.org", "published": "2024-08-26T20:15:08.380", "lastModified": "2024-11-21T09:52:40.667", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8186.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8186.json index c2c36452e90..35adaea87b2 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8186.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2025-03-03T10:15:09.937", "lastModified": "2025-03-03T10:15:09.937", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.6 before 17.7.6, 17.8 before 17.8.4, and 17.9 before 17.9.1. An attacker could inject HMTL into the child item search potentially leading to XSS in certain situations." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.6 hasta la 17.7.6, desde la 17.8 hasta la 17.8.4 y desde la 17.9 hasta la 17.9.1. Un atacante podr\u00eda inyectar HTML en la b\u00fasqueda de elementos secundarios, lo que podr\u00eda provocar un XSS en determinadas situaciones." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,14 +71,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.6.0", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "6280CF51-DBF6-43EF-B411-859AB0B05901" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.6.0", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "6D4D80E8-2B17-4AE0-AA83-EF34C8AF31BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.4", + "matchCriteriaId": "AB79FD0B-E2CB-48C8-9403-FC11D98CE75B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.4", + "matchCriteriaId": "BBA524F8-D246-4E22-AD19-D5A7A73BAFDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:community:*:*:*", + "matchCriteriaId": "840493B6-1601-45C8-835A-2ACFBB4A84E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "520D3C67-BAA9-49B0-8613-7DC0127499D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480751", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2655757", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json index 68286b0955b..bf1ef428081 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8261.json @@ -2,20 +2,24 @@ "id": "CVE-2024-8261", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-03-03T15:15:15.820", - "lastModified": "2025-03-03T15:15:15.820", - "vulnStatus": "Received", + "lastModified": "2025-03-07T19:37:23.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in Proliz Software OBS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects OBS: before 24.0927." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario en Proliz Software OBS permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a OBS: antes de 24.0927." } ], "metrics": { "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prolizyazilim:student_affairs_information_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.0927", + "matchCriteriaId": "5C2A1F3F-906E-41CE-A1BD-EADF58069BB5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-25-0049", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json index 85e5575da50..467ae8ca213 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8262.json @@ -2,20 +2,24 @@ "id": "CVE-2024-8262", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-03-03T15:15:15.990", - "lastModified": "2025-03-03T15:15:15.990", - "vulnStatus": "Received", + "lastModified": "2025-03-07T19:37:23.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Proliz Software OBS allows Path Traversal.This issue affects OBS: before 24.0927." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Proliz Software OBS permite Path Traversal. Este problema afecta a OBS: antes de 24.0927." } ], "metrics": { "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prolizyazilim:student_affairs_information_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.0927", + "matchCriteriaId": "5C2A1F3F-906E-41CE-A1BD-EADF58069BB5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-25-0049", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8548.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8548.json index 8ff518493c2..50ac3ad2fd6 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8548.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8548.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8584.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8584.json index b01fe64d132..4522198bd31 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8584.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8584.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "twcert@cert.org.tw", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json index b72c08fe6ca..12c479216f9 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8632.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8682.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8682.json index e383f50367c..ec4b2210d4d 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8682.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8682.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The JNews - WordPress Newspaper Magazine Blog AMP Theme theme for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 11.6.6. This is due to the plugin not properly validate if the user can register option is enabled prior to creating a user though the register_handler() function. This makes it possible for unauthenticated attackers to register as a user even when user registration is disabled." + }, + { + "lang": "es", + "value": "El tema JNews - WordPress Newspaper Magazine Blog AMP Theme de WordPress es vulnerable al registro de usuarios no autorizados en todas las versiones hasta la 11.6.6 incluida. Esto se debe a que el complemento no valida correctamente si la opci\u00f3n de registro de usuarios est\u00e1 habilitada antes de crear un usuario a trav\u00e9s de la funci\u00f3n register_handler(). Esto hace posible que atacantes no autenticados se registren como usuarios incluso cuando el registro de usuarios est\u00e1 deshabilitado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json index 2121dd10e5a..121e76dadbd 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json index bcb8bc54432..db6bf5e968a 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9135.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9135.json index a9825217323..6aaa1fd68b6 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9135.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9135.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping." + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS con BGP Link State configurado, la inestabilidad de los pares BGP puede provocar que el agente BGP pierda memoria. Esto puede provocar la finalizaci\u00f3n del procesamiento de enrutamiento BGP y la inestabilidad de las rutas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json index f2c73741985..442063b26df 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9149.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wind Media E-Commerce Website Template allows SQL Injection.This issue affects E-Commerce Website Template: before v1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Wind Media E-Commerce Website Template permite la inyecci\u00f3n SQL. Este problema afecta a la plantilla de sitio web de comercio electr\u00f3nico: anterior a v1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9169.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9169.json index 2c71c05780e..929788449f6 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9169.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T09:15:03.380", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5", + "matchCriteriaId": "B9350AAA-1A44-4533-BD66-57AD0275BF41" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.litespeedtech.com/products/cache-plugins/wordpress-acceleration", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/051a987a-944a-4898-872b-0456f0f59b27?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json index 4e32c70105f..f063e27aa22 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@m-files.com", "published": "2024-10-02T06:15:10.387", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,12 +93,43 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.8.6", + "matchCriteriaId": "1CE2CE9F-9B06-4AE1-99AD-8FEA98773D5C" + } + ] + } + ] } ], "references": [ { "url": "https://product.m-files.com/security-advisories/cve-2024-9174/", - "source": "security@m-files.com" + "source": "security@m-files.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json index 34d23c003e1..574df22d5d7 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:11.437", "lastModified": "2025-02-28T09:15:11.437", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WHMpress - WHMCS WordPress Integration Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.3-revision-0 via the whmpress_domain_search_ajax_extended_results() function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. Utilizing the /admin/services.php file, this can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento WHMpress - WHMCS WordPress Integration Plugin para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 6.3-revisi\u00f3n-0 incluida a trav\u00e9s de la funci\u00f3n whmpress_domain_search_ajax_extended_results(). Esto permite que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\". Esto permite que atacantes no autenticados actualicen opciones arbitrarias en el sitio de WordPress. Al utilizar el archivo /admin/services.php, esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9195.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9195.json index 91ddc81ad19..ecfe041c7f8 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9195.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9195.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:11.633", "lastModified": "2025-02-28T09:15:11.633", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WHMPress - WHMCS Client Area plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the update_settings case in the /admin/ajax.php file in all versions up to, and including, 4.3-revision-3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento WHMPress - WHMCS Client Area para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos que puede provocar una escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en el caso update_settings en el archivo /admin/ajax.php en todas las versiones hasta la 4.3-revision-3 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9212.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9212.json index 0e9a7c9e6f6..7cfa771c4a5 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9212.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9212.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:15.580", "lastModified": "2025-03-01T05:15:15.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SKU Generator for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento SKU Generator for WooCommerce para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.6.2 incluida. Esto hace posible que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9217.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9217.json index 36d7225946b..5d76e6b6984 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9217.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9217.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:15.773", "lastModified": "2025-03-01T05:15:15.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Currency Switcher for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.16.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Currency Switcher for WooCommerce para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.16.2 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9285.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9285.json index 021170d83d2..2523c68c002 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9285.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T17:15:15.953", "lastModified": "2025-02-27T17:15:15.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9334.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9334.json index 3ae3fb391cb..4a8084147a1 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9334.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-02-27T14:15:34.783", "lastModified": "2025-02-27T14:15:34.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9444.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9444.json index 23796a3bf41..6c47a377941 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9444.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9444.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T10:15:02.620", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quomodosoft:elementsready:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.4.4", + "matchCriteriaId": "61E57435-3324-4948-8754-9A77F2BB7314" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/element-ready-lite/trunk/inc/helper_functions.php#L1559", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3167864/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/element-ready-lite/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bea7a4d0-d589-420b-a4ff-eaccf12e623b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json index 4a3234192ab..b4ebad07845 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T07:15:28.360", "lastModified": "2025-01-07T07:15:28.360", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9538.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9538.json index db38b3fbb88..acc88fc32d5 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9538.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9538.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:19.373", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9598.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9598.json index 74f5f80d6f1..410fab23642 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9598.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9598.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9618.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9618.json index e5544d5fc4e..190f9fd3959 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9618.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9618.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Master Addons \u2013 Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 2.0.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Addons \u2013 Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de m\u00faltiples widgets en todas las versiones hasta la 2.0.7.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9634.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9634.json index 6ca4a92d60d..2925861ea03 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9634.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9634.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9658.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9658.json index d78e489a029..cbf2ca2226b 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9658.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The School Management System for Wordpress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 93.0.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email and password through the mj_smgt_update_user() and mj_smgt_add_admission() functions, along with a local file inclusion vulnerability. This makes it possible for authenticated attackers, with student-level access and above, to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account. This was escalated four months ago after no response to our initial outreach, yet it still vulnerable." + }, + { + "lang": "es", + "value": "El complemento School Management System for Wordpress para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 93.0.0 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar sus datos, como el correo electr\u00f3nico y la contrase\u00f1a, a trav\u00e9s de las funciones mj_smgt_update_user() y mj_smgt_add_admission(), junto con una vulnerabilidad de inclusi\u00f3n de archivos locales. Esto hace posible que los atacantes autenticados, con acceso a nivel de estudiante y superior, cambien las direcciones de correo electr\u00f3nico y las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen eso para obtener acceso a su cuenta. Esto se intensific\u00f3 hace cuatro meses despu\u00e9s de que no recibimos respuesta a nuestro contacto inicial, pero a\u00fan es vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9669.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9669.json index 0584fe451fd..d03c18efd36 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9669.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9669.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json index 8dc738b38ea..d9bb0da8cd0 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T19:15:36.243", "lastModified": "2025-02-28T19:15:36.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request." + }, + { + "lang": "es", + "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 a 8.5.0.13, 8.5.1.0, 8.5.2.0 a 8.5.2.3, 8.5.3.0 a 8.5.3.1, 8.5.4.0, 8.6.0.0 a 8.6.0.5, 8.6.1.0, 8.6.2.0 a 8.6.2.1, 8.6.3.0, 8.7.0.0 a 8.7.0.2, 8.7.1.0, 8.7.2.0 a 8.7.2.1) podr\u00eda permitir que un atacante remoto omita la autenticaci\u00f3n del endpoint RPCAdapter mediante el env\u00edo de una solicitud HTTP espec\u00edficamente manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json index 7bc65a01254..f74720ef989 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T19:15:36.393", "lastModified": "2025-02-28T19:15:36.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service." + }, + { + "lang": "es", + "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 a 8.5.0.13, 8.5.1.0, 8.5.2.0 a 8.5.2.3, 8.5.3.0 a 8.5.3.1, 8.5.4.0, 8.6.0.0 a 8.6.0.5, 8.6.1.0, 8.6.2.0 a 8.6.2.1, 8.6.3.0, 8.7.0.0 a 8.7.0.2, 8.7.1.0, 8.7.2.0 a 8.7.2.1) podr\u00eda permitir que un atacante remoto con acceso al sistema ejecute c\u00f3digo Java arbitrario debido a restricciones inadecuadas en el servicio RPCAdapter." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0234.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0234.json index 633f712d4ba..90b5e913e35 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0234.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", "published": "2025-02-26T08:12:46.393", "lastModified": "2025-02-26T08:12:46.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0235.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0235.json index fb898e97c93..9afcd34d375 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0235.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0235.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", "published": "2025-02-26T08:12:46.617", "lastModified": "2025-02-26T08:12:46.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0236.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0236.json index fc51377f6f5..4d0f1241eef 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0236.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", "published": "2025-02-26T08:12:46.730", "lastModified": "2025-02-26T08:12:46.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json index d5ae8800788..de3324dfe9f 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine." + }, + { + "lang": "es", + "value": "Paragon Partition Manager versi\u00f3n 7.9.1 contiene una vulnerabilidad de escritura arbitraria en la memoria del kernel dentro de biontdrv.sys que es causada por una falla al validar correctamente la longitud de los datos proporcionados por el usuario, lo que puede permitir que un atacante ejecute c\u00f3digo arbitrario en la m\u00e1quina v\u00edctima." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json index 04c67a06938..db8458bc607 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-08T22:15:28.477", "lastModified": "2025-02-08T22:15:28.477", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json index d0817e74f95..b7e2de429df 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0336", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:27.860", - "lastModified": "2025-01-09T07:15:27.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T22:33:14.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CF56923B-4DFB-477A-8839-5AA94FD11344" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/fuulof/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.290823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475493", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json index 85ecc8ed4e1..48d2fd5bc83 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ServiceNow has addressed an authorization bypass vulnerability that was identified in the Washington release of the Now Platform. This vulnerability, if exploited, potentially could enable an authenticated user to access unauthorized data stored within the Now Platform that the user otherwise would not be entitled to access. \n\nThis issue is addressed in the listed patches and family release, which have been made available to hosted and self-hosted customers, as well as partners." + }, + { + "lang": "es", + "value": "ServiceNow ha solucionado una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n que se identific\u00f3 en la versi\u00f3n de Washington de Now Platform. Esta vulnerabilidad, si se explota, podr\u00eda permitir que un usuario autenticado acceda a datos no autorizados almacenados en Now Platform a los que, de otro modo, el usuario no tendr\u00eda derecho a acceder. Este problema se soluciona en los parches y la versi\u00f3n de la familia que se indican, que se han puesto a disposici\u00f3n de los clientes alojados y autoalojados, as\u00ed como de los socios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json index 28734fa6d4d..6199b4e7c6d 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0342.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0342", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T08:15:30.310", - "lastModified": "2025-01-09T08:15:30.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T17:42:59.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB15F952-C410-4C9D-98D2-E9538B393C28" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Computer%20Laboratory%20Management%20System.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.290829", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290829", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.476897", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0359.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0359.json index cb37bcf670e..e78057aa105 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0359.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-03-04T06:15:30.023", "lastModified": "2025-03-04T06:15:30.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution." + }, + { + "lang": "es", + "value": "Durante una prueba de penetraci\u00f3n anual realizada en nombre de Axis Communication, Truesec descubri\u00f3 una falla en el marco de la aplicaci\u00f3n ACAP que permit\u00eda a las aplicaciones acceder a m\u00e9todos D-Bus restringidos dentro del framework. Axis ha publicado versiones parcheadas del sistema operativo AXIS para la falla destacada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0360.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0360.json index 54030c7c6b7..6e2496002b5 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0360.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0360.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@axis.com", "published": "2025-03-04T06:15:30.180", "lastModified": "2025-03-04T06:15:30.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API." + }, + { + "lang": "es", + "value": "Durante una prueba de penetraci\u00f3n anual realizada en nombre de Axis Communication, Truesec descubri\u00f3 una falla en el marco de configuraci\u00f3n del dispositivo VAPIX que podr\u00eda generar un nivel de privilegio de usuario incorrecto en la API D-Bus de la cuenta de servicio VAPIX." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0433.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0433.json index 6d57fc0c2e9..086e533114c 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0433.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0433.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Master Addons \u2013 Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 2.0.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Addons \u2013 Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 2.0.7.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0469.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0469.json index bf381aef122..6a6ddfcb6ec 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0469.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T05:15:13.950", "lastModified": "2025-02-27T05:15:13.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0514.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0514.json index 7257036cc36..42090b6fe9d 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0514.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@documentfoundation.org", "published": "2025-02-25T22:15:14.887", "lastModified": "2025-02-25T22:15:14.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in The Document Foundation LibreOffice allows Windows Executable hyperlink targets to be executed unconditionally on activation.This issue affects LibreOffice: from 24.8 before < 24.8.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n de entrada incorrecta en The Document Foundation LibreOffice permite que los destinos de hiperv\u00ednculos ejecutables de Windows se ejecuten incondicionalmente durante la activaci\u00f3n. Este problema afecta a LibreOffice: desde la versi\u00f3n 24.8 hasta la versi\u00f3n < 24.8.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json index 6edef09c907..7bc2bd38d18 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0527", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T14:15:32.840", - "lastModified": "2025-01-17T14:15:32.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:20:23.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F48C076B-BB6E-4EEE-A714-F847EA4119DD" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Curious-L/-/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.292411", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.292411", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.477899", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json index cce9900ca2c..c46fb9e8c36 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0529", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T15:15:12.670", - "lastModified": "2025-01-17T15:15:12.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:20:23.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:train_ticket_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A431224C-8FCE-4968-A8E7-1BD43D926EC4" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.292413", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.292413", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.478447", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json index ff97f4e2753..44c76315f56 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0530", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T16:15:33.937", - "lastModified": "2025-01-17T16:15:33.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:20:23.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ha0day125/cve/blob/main/xss-ha0day.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.292414", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.292414", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.478674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json index 49c0fa3c212..08dfe6b1482 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0531", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T16:15:34.250", - "lastModified": "2025-01-17T16:15:34.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:20:23.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C53942AF-E982-409D-BFDF-FAFD90E5C154" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/LamentXU123/cve/blob/main/sql_injection2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.292415", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.292415", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.478688", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0555.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0555.json index b99e61e18af..68d4d6473b4 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0555.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0555.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0555", "sourceIdentifier": "cve@gitlab.com", "published": "2025-03-03T16:15:39.227", - "lastModified": "2025-03-03T16:15:39.227", - "vulnStatus": "Received", + "lastModified": "2025-03-07T19:37:57.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability in GitLab-EE affecting all versions from 16.6 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows an attacker to bypass security controls and execute arbitrary scripts in a users browser under specific conditions." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en GitLab-EE que afecta a todas las versiones desde la 16.6 anterior a la 17.7.6, desde la 17.8 anterior a la 17.8.4 y desde la 17.9 anterior a la 17.9.1 permite a un atacante eludir los controles de seguridad y ejecutar secuencias de comandos arbitrarias en el navegador de un usuario en condiciones espec\u00edficas." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -47,14 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.6.0", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "6D4D80E8-2B17-4AE0-AA83-EF34C8AF31BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.4", + "matchCriteriaId": "BBA524F8-D246-4E22-AD19-D5A7A73BAFDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "520D3C67-BAA9-49B0-8613-7DC0127499D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/514004", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2939833", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json index ea8f48a0dfe..13f17ec6e98 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json @@ -3,12 +3,16 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:11.240", "lastModified": "2025-03-04T04:15:11.240", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante un desbordamiento de enteros. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +71,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:4.1:-:*:*:-:*:*:*", + "matchCriteriaId": "55B44077-3E16-404D-94A7-B1A3B363643C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:5.0.2:-:*:*:-:*:*:*", + "matchCriteriaId": "03EE6151-BE9F-4FD1-B313-C2759C14B026" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0684.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0684.json index 5bd3b906814..4e44f2cfc17 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0684.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0684.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T18:15:30.537", "lastModified": "2025-03-03T18:15:30.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub's reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution, by-passing secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en grub2. Al realizar una b\u00fasqueda de enlace simb\u00f3lico desde un sistema de archivos reiserfs, el m\u00f3dulo de sistema de archivos reiserfs de grub utiliza par\u00e1metros controlados por el usuario de la geometr\u00eda del sistema de archivos para determinar el tama\u00f1o del b\u00fafer interno; sin embargo, verifica incorrectamente si hay desbordamientos de enteros. Un sistema de archivos manipulados con fines malintencionados puede provocar que algunos de esos c\u00e1lculos de tama\u00f1o de b\u00fafer se desborden, lo que hace que realice una operaci\u00f3n grub_malloc() con un tama\u00f1o menor al esperado. Como resultado, grub_reiserfs_read_symlink() llamar\u00e1 a grub_reiserfs_read_real() con un par\u00e1metro de longitud desbordado, lo que lleva a una escritura fuera de los l\u00edmites basada en el mont\u00f3n durante la lectura de datos. Esta falla puede aprovecharse para corromper los datos cr\u00edticos internos de grub y puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario, eludiendo las protecciones de arranque seguro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0685.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0685.json index 75abde928f0..3e3b24b8fe4 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0685.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0685.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T18:15:30.733", "lastModified": "2025-03-03T18:15:30.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en grub2. Al leer datos de un sistema de archivos jfs, el m\u00f3dulo de sistema de archivos jfs de grub utiliza par\u00e1metros controlados por el usuario de la geometr\u00eda del sistema de archivos para determinar el tama\u00f1o del b\u00fafer interno; sin embargo, verifica incorrectamente si hay desbordamientos de n\u00fameros enteros. Un sistema de archivos malipulados con fines malintencionados puede provocar que algunos de esos c\u00e1lculos de tama\u00f1o de b\u00fafer se desborden, lo que hace que realice una operaci\u00f3n grub_malloc() con un tama\u00f1o menor al esperado. Como resultado, la funci\u00f3n grub_jfs_lookup_symlink() escribir\u00e1 m\u00e1s all\u00e1 de la longitud del b\u00fafer interno durante grub_jfs_read_file(). Este problema se puede aprovechar para corromper los datos cr\u00edticos internos de grub y puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario, eludiendo las protecciones de arranque seguro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0686.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0686.json index 151dad0400f..bfc4956ee02 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0686.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0686.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T18:15:30.930", "lastModified": "2025-03-03T18:15:30.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub's romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution by-passing secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en grub2. Al realizar una b\u00fasqueda de enlace simb\u00f3lico desde un sistema de archivos romfs, el m\u00f3dulo de sistema de archivos romfs de grub utiliza par\u00e1metros controlados por el usuario de la geometr\u00eda del sistema de archivos para determinar el tama\u00f1o del b\u00fafer interno; sin embargo, verifica incorrectamente si hay desbordamientos de n\u00fameros enteros. Un sistema de archivos manipulado con fines malintencionados puede provocar que algunos de esos c\u00e1lculos de tama\u00f1o de b\u00fafer se desborden, lo que hace que realice una operaci\u00f3n grub_malloc() con un tama\u00f1o menor al esperado. Como resultado, grub_romfs_read_symlink() puede provocar escrituras fuera de los l\u00edmites cuando se llama a la funci\u00f3n grub_disk_read(). Este problema se puede aprovechar para corromper los datos cr\u00edticos internos de grub y puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario que pasa por alto las protecciones de arranque seguro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0710.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0710.json index d3ff0b08c60..56fcef8929b 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0710.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0710", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-24T21:15:11.420", - "lastModified": "2025-01-24T21:15:11.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-21T21:35:05.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F55A7C78-D29A-46C8-8847-3189E7085C15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/anamika126/Stackofvulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting%20-%20Notice%20Board.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.293238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.293238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.484934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0719.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0719.json index b3b6475845c..5ee477547db 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0719.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0719.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-26T14:15:11.587", "lastModified": "2025-02-26T14:15:11.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0731.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0731.json index 7c4262e08dd..4c4250322c5 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0731.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0731.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2025-02-26T13:15:41.040", "lastModified": "2025-02-26T13:15:41.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0759.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0759.json index 9c62cbab9b5..73dfb34a952 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0759.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-27T15:15:40.603", "lastModified": "2025-02-27T15:15:40.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0760.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0760.json index 88de73b7b3e..087ed9d7e32 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0760.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0760.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-02-26T00:15:10.890", "lastModified": "2025-02-26T00:15:10.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0767.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0767.json index 0da376095e0..70a086801d5 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0767.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0767.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2025-02-27T19:15:49.350", "lastModified": "2025-02-27T19:15:49.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json index 92d445b173a..b86477ae723 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2025-02-28T20:15:46.440", "lastModified": "2025-02-28T20:15:46.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PixelYourSite - Your smart PIXEL (TAG) and API Manager 10.1.1.1 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/modules/facebook/facebook-server-a sync-task.php." + }, + { + "lang": "es", + "value": "Se ha descubierto que PixelYourSite - Your smart PIXEL (TAG) y API Manager 10.1.1.1 son vulnerables. La entrada de usuario no validada se utiliza directamente en una funci\u00f3n de anulaci\u00f3n de serializaci\u00f3n en myapp/modules/facebook/facebook-server-a sync-task.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0820.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0820.json index 805fcbdef7f..89daafe7a67 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0820.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0820.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T05:15:15.953", "lastModified": "2025-03-01T05:15:15.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Clicface Trombi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018nom\u2019 parameter in all versions up to, and including, 2.08 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Clicface Trombi para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'nom' en todas las versiones hasta la 2.08 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0823.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0823.json index 37426a3d56a..8b4ba7b86f5 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0823.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0823.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.510", "lastModified": "2025-02-28T03:15:10.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Analytics 11.2.0 through 11.2.4 FP5 and 12.0.0 through 12.0.4 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." + }, + { + "lang": "es", + "value": "IBM Cognos Analytics 11.2.0 a 11.2.4 FP5 y 12.0.0 a 12.0.4 podr\u00edan permitir que un atacante remoto recorra los directorios del sistema. Un atacante podr\u00eda enviar una solicitud de URL especialmente manipulada que contenga secuencias de \"punto punto\" (/../) para ver archivos arbitrarios en el sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0863.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0863.json index 8dfe15085d4..55b7643f5db 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0863.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0863.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Flexmls\u00ae IDX Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'idx_frame' shortcode in all versions up to, and including, 3.14.27 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Flexmls\u00ae IDX Plugin para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'idx_frame' del complemento en todas las versiones hasta la 3.14.27 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json index 4159e56a6a9..1a72883c1d8 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0865", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T08:15:21.853", - "lastModified": "2025-02-19T08:15:21.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,80 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:de-baat:wp_media_category_management:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.4.0", + "matchCriteriaId": "4F59B803-E766-43DA-9B4C-F094C5558B15" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-media-category-management/tags/2.3.3/include/admin/class-WP_MCM_Render_Settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/class-WP_MCM_Options.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3242626/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-media-category-management/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d42ca2f-f061-4cd1-812b-46d42c440498?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json index 859081ed516..efaec8f1c77 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0877.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AtaksAPP Reservation Management System allows Cross-Site Scripting (XSS).This issue affects Reservation Management System: before 4.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en AtaksAPP Reservation Management System permite Cross-Site Scripting (XSS). Este problema afecta al sistema de gesti\u00f3n de reservas: anterior a la versi\u00f3n 4.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0889.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0889.json index e66c666b4ff..1c97c6716ec 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0889.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2025-02-26T08:13:09.050", "lastModified": "2025-02-26T08:13:09.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0895.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0895.json index 82e327af815..577373377c7 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0895.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0895.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-02T16:15:35.410", "lastModified": "2025-03-02T16:15:35.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cognos Analytics Mobile 1.1 for Android could allow a user with physical access to the device, to obtain sensitive information from debugging code log messages." + }, + { + "lang": "es", + "value": "IBM Cognos Analytics Mobile 1.1 para Android podr\u00eda permitir a un usuario con acceso f\u00edsico al dispositivo obtener informaci\u00f3n confidencial de los mensajes de registro del c\u00f3digo de depuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0912.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0912.json index fee548d9ed7..d9898658b3e 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0912.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0912.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0912", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-04T04:15:11.390", - "lastModified": "2025-03-04T04:15:11.390", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Donations Widget plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.4 via deserialization of untrusted input from the Donation Form through the 'card_address' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution." + }, + { + "lang": "es", + "value": "El complemento Donations Widget para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.19.4 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del formulario de donaciones mediante el par\u00e1metro 'card_address'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes lograr la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { @@ -45,32 +49,78 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.20.0", + "matchCriteriaId": "04645A10-A7FC-4550-9321-6F01E2FBF448" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/impress-org/givewp/pull/7679/files", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Properties/BillingAddress.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Repositories/DonationRepository.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donors/Repositories/DonorRepository.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3234114%40give&new=3234114%40give&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8ae1b0-e9a0-4179-970b-dbcb0642547c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0914.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0914.json index 0ce83310ea4..19c02eb1b0c 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0914.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0914.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@rapid7.com", "published": "2025-02-27T16:15:38.237", "lastModified": "2025-02-27T16:15:38.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0941.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0941.json index 0bc9d8f7aff..626511f87c9 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0941.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0941.json @@ -3,7 +3,7 @@ "sourceIdentifier": "4ad3d9a7-bd20-4af3-8862-46d6b5a570db", "published": "2025-02-26T17:15:21.910", "lastModified": "2025-02-26T17:15:21.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0954.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0954.json index 0f80882fe05..039fe59973a 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0954.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0954.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Online Contract plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the json_import() and json_export() functions in all versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to import and export the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento WP Online Contract para WordPress es vulnerable al acceso no autorizado debido a una falta de verificaci\u00f3n de capacidad en las funciones json_import() y json_export() en todas las versiones hasta la 5.1.4 incluida. Esto permite que atacantes no autenticados importen y exporten la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0956.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0956.json index f9fd669262e..8e593d2a849 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0956.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0956.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WooCommerce Recover Abandoned Cart plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 24.3.0 via deserialization of untrusted input from the 'raccookie_guest_email' cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Recover Abandoned Cart para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 24.3.0 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable de la cookie 'raccookie_guest_email'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0959.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0959.json index d235c35b224..4105690ccad 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0959.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0959.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Eventer - WordPress Event & Booking Manager Plugin plugin for WordPress is vulnerable to SQL Injection via the reg_id parameter in all versions up to, and including, 3.9.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Eventer - WordPress Event & Booking Manager Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro reg_id en todas las versiones hasta la 3.9.9.2 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json index 4bc23d4a802..3de7a7647b5 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0975.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.653", "lastModified": "2025-02-28T03:15:10.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD console could allow an authenticated user to execute code due to improper neutralization of escape characters." + }, + { + "lang": "es", + "value": "La consola de IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD podr\u00eda permitir que un usuario autenticado ejecute c\u00f3digo debido a una neutralizaci\u00f3n incorrecta de los caracteres de escape." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0985.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0985.json index 3d9d1a2265e..b291e4adeec 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0985.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0985.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T17:15:15.937", "lastModified": "2025-02-28T17:15:15.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD \n\nstores potentially sensitive information in environment variables that could be obtained by a local user." + }, + { + "lang": "es", + "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD almacenan informaci\u00f3n potencialmente confidencial en variables de entorno que un usuario local podr\u00eda obtener." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0990.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0990.json index 9372ced5bbf..dabfe85e068 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0990.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0990.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The I Am Gloria plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.4. This is due to missing or incorrect nonce validation on the iamgloria23_gloria_settings_page function. This makes it possible for unauthenticated attackers to reset the tenant ID via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento I Am Gloria para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.1.4 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n iamgloria23_gloria_settings_page. Esto permite que atacantes no autenticados restablezcan el ID del inquilino a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1008.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1008.json index 06a6a1d14eb..98c0f780606 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1008.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1008.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Recently Purchased Products For Woo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018view\u2019 parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Recently Purchased Products For Woo para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro \"view\" en todas las versiones hasta la 1.1.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1080.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1080.json index bb0f147f39e..f87aa0f6e8f 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1080.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1080.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner URL that when passed to LibreOffice could call internal macros with arbitrary arguments.\nThis issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1." + }, + { + "lang": "es", + "value": "LibreOffice admite esquemas URI de Office para permitir la integraci\u00f3n de LibreOffice en el navegador con el servidor MS SharePoint. Se agreg\u00f3 un esquema adicional 'vnd.libreoffice.command' espec\u00edfico para LibreOffice. En las versiones afectadas de LibreOffice, se pod\u00eda construir un v\u00ednculo en un navegador que usara ese esquema con una URL interna incrustada que, cuando se pasaba a LibreOffice, pod\u00eda llamar a macros internas con argumentos arbitrarios. Este problema afecta a LibreOffice: desde la versi\u00f3n 24.8 hasta la 24.8.5, desde la versi\u00f3n 25.2 hasta la 25.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1091.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1091.json index 5612a0811d2..840242d9b48 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1091.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1091.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-02-26T00:15:11.250", "lastModified": "2025-02-26T00:15:11.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json index 7748e4cd161..368fc520f4c 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1148.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1148", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T14:15:29.927", - "lastModified": "2025-02-10T14:15:29.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-04T14:53:43.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,6 +63,26 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -122,32 +142,82 @@ "value": "CWE-404" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*", + "matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04" + } + ] + } + ] } ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.295052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.485747", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json index 5a426f1706a..3032c7b7f12 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T17:15:18.517", "lastModified": "2025-02-10T17:15:18.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json index 68fc8ea19eb..2103f2f7f6d 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T17:15:18.713", "lastModified": "2025-02-10T17:15:18.713", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,73 @@ "value": "CWE-404" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*", + "matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04" + } + ] + } + ] } ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.295055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1249.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1249.json index e3eaa109222..ff33d392424 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1249.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-26T15:15:24.470", "lastModified": "2025-02-26T15:15:24.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1259.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1259.json index c3b414b58f5..7a387e81768 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1259.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1259.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue\u00a0can result in users retrieving data that should not have been available" + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS con OpenConfig configurado, se puede ejecutar una solicitud gNOI cuando deber\u00eda haber sido rechazada. Este problema puede provocar que los usuarios recuperen datos que no deber\u00edan haber estado disponibles" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1260.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1260.json index f63b2d8b390..e5454a92216 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1260.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue\u00a0can result in unexpected configuration/operations being applied to the switch." + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS con OpenConfig configurado, se puede ejecutar una solicitud gNOI cuando deber\u00eda haber sido rechazada. Este problema puede provocar que se apliquen operaciones o configuraciones inesperadas al conmutador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1282.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1282.json index e9221b524df..a2ded963544 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1282.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T09:15:10.160", "lastModified": "2025-02-27T09:15:10.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1291.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1291.json index f7a440bc3c9..66b2ceb2128 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1291.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1291.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T09:15:09.710", "lastModified": "2025-03-01T09:15:09.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018icon\u2019 parameter in all versions up to, and including, 3.4.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks with AI de Kadence WP \u2013 Page Builder Features para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'icon' en todas las versiones hasta la 3.4.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json index d5d583185df..2f51b20e7c7 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1295.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T06:15:21.990", "lastModified": "2025-02-27T06:15:21.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json index 83407bc5c3d..1f97afee2b4 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json @@ -3,12 +3,16 @@ "sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "published": "2025-02-28T13:15:27.043", "lastModified": "2025-02-28T13:15:27.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5." + }, + { + "lang": "es", + "value": "CodeChecker es una herramienta de an\u00e1lisis, una base de datos de defectos y una extensi\u00f3n de visualizaci\u00f3n para Clang Static Analyzer y Clang Tidy. El servidor web CodeChecker contiene una vulnerabilidad de redireccionamiento abierto debido a la falta de protecciones contra m\u00faltiples barras despu\u00e9s del nombre del producto en la URL. Esto hace que se evadan las protecciones contra CVE-2021-28861, lo que conduce a la misma v\u00eda de redireccionamiento abierto. Este problema afecta a CodeChecker: hasta la versi\u00f3n 6.24.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1307.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1307.json index c7c33497c4d..155411644b7 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1307.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1307.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1307", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-04T05:15:14.233", - "lastModified": "2025-03-04T05:15:14.233", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newscrunch theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check in the newscrunch_install_and_activate_plugin() function in all versions up to, and including, 1.8.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El tema Newscrunch para WordPress es vulnerable a la carga de archivos arbitrarios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n newscrunch_install_and_activate_plugin() en todas las versiones hasta la 1.8.4.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { @@ -45,20 +49,57 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spicethemes:newscrunch:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.4.1", + "matchCriteriaId": "73F69598-46A4-41CE-A39D-EBAE2B821F95" + } + ] + } + ] } ], "references": [ { "url": "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b55567e9-24e6-4738-b7f7-b95b541e6067?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1309.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1309.json index 6a9fadb510e..527275b5b72 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1309.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the uip_save_form_as_option() function in all versions up to, and including, 3.5.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + }, + { + "lang": "es", + "value": "El complemento UiPress lite | Effortless custom dashboards, admin themes and pages para WordPress es vulnerable a modificaciones no autorizadas de datos que pueden llevar a una escalada de privilegios debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n uip_save_form_as_option() en todas las versiones hasta la 3.5.04 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias en el sitio de WordPress. Esto se puede aprovechar para actualizar el rol predeterminado para el registro como administrador y habilitar el registro de usuarios para que los atacantes obtengan acceso de usuario administrativo a un sitio vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1315.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1315.json index a74f580e652..e17a6b2b0aa 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1315.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1315.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The InWave Jobs plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 3.5.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account." + }, + { + "lang": "es", + "value": "El complemento InWave Jobs para WordPress es vulnerable a la escalada de privilegios mediante el restablecimiento de contrase\u00f1a en todas las versiones hasta la 3.5.1 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario antes de actualizar su contrase\u00f1a. Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de usuarios arbitrarios, incluidos los administradores, y aprovechen esa posibilidad para obtener acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1316.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1316.json index 1d705a41f31..f3115f271cd 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1316.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1316.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device" + }, + { + "lang": "es", + "value": "Edimax IC-7100 no neutraliza adecuadamente las solicitudes. Un atacante puede crear solicitudes especialmente manipuladas para lograr la ejecuci\u00f3n remota de c\u00f3digo en el dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1321.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1321.json index 4b1b42fb14e..e63f899ff4c 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1321.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1321.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1321", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-04T04:15:11.547", - "lastModified": "2025-03-04T04:15:11.547", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The teachPress plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tpsearch' shortcode in all versions up to, and including, 9.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento teachPress para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'order' del shortcode 'tpsearch' en todas las versiones hasta la 9.0.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mtrv:teachpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.0.8", + "matchCriteriaId": "CE54CA6D-5C0E-402B-80AA-769DCB1072A8" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json index ffbc86d1caf..0f930c534b4 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T01:15:20.440", "lastModified": "2025-02-16T01:15:20.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,20 +142,60 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xjd2020:fastcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.1.5", + "matchCriteriaId": "6CF200B4-F238-440D-A1D3-56042183AAA9" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/xjd2020/fastcms/issues/IBKJ1W", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.295942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json index 0bc9f919e9c..f21067c6b59 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T12:15:08.173", "lastModified": "2025-02-16T12:15:08.173", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json index 196d95bf587..2649e57264e 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T14:15:21.130", "lastModified": "2025-02-16T14:15:21.130", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1361.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1361.json index 7045860c067..261375b70c2 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1361.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1361.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1361", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T09:15:24.033", - "lastModified": "2025-02-22T09:15:24.033", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T21:28:15.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.38.9", + "matchCriteriaId": "543F4CC6-E676-48C1-A516-32A1527E763C" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ip2location-country-blocker/trunk/ip2location-country-blocker.php#L114", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3244193/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ip2location-country-blocker/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b63bc2b6-1abc-4cfa-a7e5-3995640f66a7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json index 7c317337606..94e99501959 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Podlove Podcast Publisher plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.2. This is due to missing or incorrect nonce validation on the ajax_transcript_delete() function. This makes it possible for unauthenticated attackers to delete arbitrary episode transcripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Podlove Podcast Publisher para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.2.2 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n ajax_transcript_delete(). Esto permite que atacantes no autenticados eliminen transcripciones de episodios arbitrarios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1393.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1393.json index 49e3211870d..b74149839db 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1393.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1393.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product." + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado puede usar credenciales codificadas para obtener privilegios de administraci\u00f3n completos en el producto afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1404.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1404.json index 60ac94367ae..cc559f9d32c 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1404.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1404.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T12:15:34.310", "lastModified": "2025-03-01T12:15:34.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ays_sccp_reports_user_search() function in all versions up to, and including, 4.4.7. This makes it possible for unauthenticated attackers to retrieve a list of registered user emails." + }, + { + "lang": "es", + "value": "El complemento Secure Copy Content Protection and Content Locking para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ays_sccp_reports_user_search() en todas las versiones hasta la 4.4.7 incluida. Esto permite que atacantes no autenticados recuperen una lista de correos electr\u00f3nicos de usuarios registrados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json index eaa82f524fe..dc3e9e0d7d8 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T09:15:11.850", "lastModified": "2025-02-28T09:15:11.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DaVinci Resolve on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects DaVinci Resolve on MacOS in versions\u00a0before 19.1.3." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DaVinci Resolve en MacOS se instal\u00f3 con permisos de archivo incorrectos (rwxrwxrwx). Esto es incompatible con las pr\u00e1cticas de seguridad est\u00e1ndar de macOS, donde las aplicaciones deben tener permisos drwxr-xr-x. Los permisos incorrectos permiten el secuestro de Dylib. Las cuentas de invitado, otros usuarios y aplicaciones pueden aprovechar esta vulnerabilidad para la escalada de privilegios. Este problema afecta a DaVinci Resolve en MacOS en versiones anteriores a la 19.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json index f921d6cc55e..efeb6ca59a8 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1424.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A privilege escalation vulnerability in PocketBook InkPad Color 3 allows attackers to escalate to root privileges if they gain physical access to the device.\nThis issue affects InkPad Color 3 in version U743k3.6.8.3671." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de escalada de privilegios en PocketBook InkPad Color 3 permite a los atacantes escalar a privilegios de superusuario si obtienen acceso f\u00edsico al dispositivo. Este problema afecta a InkPad Color 3 en la versi\u00f3n U743k3.6.8.3671." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json index 5c101c4eb54..4fef906337e 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Sudo privilege misconfiguration vulnerability in PocketBook InkPad Color 3 on Linux, ARM allows attackers to read file contents on the device.This issue affects InkPad Color 3: U743k3.6.8.3671." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de configuraci\u00f3n incorrecta de privilegios de Sudo en PocketBook InkPad Color 3 en Linux, ARM permite a los atacantes leer el contenido de archivos en el dispositivo. Este problema afecta a InkPad Color 3: U743k3.6.8.3671." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1435.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1435.json index a26c6096e69..32c81fd38c9 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1435.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1435.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The bbPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.11. This is due to missing or incorrect nonce validation on the bbp_user_add_role_on_register() function. This makes it possible for unauthenticated attackers to elevate their privileges to that of a bbPress Keymaster via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Rather than implementing a nonce check to provide protection against this vulnerability, which would break functionality, the plugin no longer makes it possible to select a role during registration." + }, + { + "lang": "es", + "value": "El complemento bbPress para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6.11 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n bbp_user_add_role_on_register(). Esto permite que atacantes no autenticados eleven sus privilegios a los de un Keymaster de bbPress a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. En lugar de implementar una verificaci\u00f3n de nonce para brindar protecci\u00f3n contra esta vulnerabilidad, que interrumpir\u00eda la funcionalidad, el complemento ya no permite seleccionar un rol durante el registro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1450.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1450.json index 0f6608fcce8..2da84e3bace 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1450.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1450.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T10:15:10.677", "lastModified": "2025-02-27T10:15:10.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1459.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1459.json index 2e8a695a2fe..d7eeb7dfe06 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1459.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1459.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T07:15:10.980", "lastModified": "2025-03-01T07:15:10.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Embedded Video(PB) widget in all versions up to, and including, 2.31.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Page Builder de SiteOrigin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del widget Embedded Video (PB) en todas las versiones hasta la 2.31.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1463.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1463.json index d40f0649619..b36a4a48d6e 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1463.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1463.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.2. This is due to improper nonce validation within the class-wpgsi-show.php script. This makes it possible for unauthenticated attackers to publish arbitrary posts, including private, granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Spreadsheet Integration para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.8.2 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta dentro del script class-wpgsi-show.php. Esto permite que atacantes no autenticados publiquen publicaciones arbitrarias, incluidas las privadas, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1491.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1491.json index 2498e5de50a..c231b1b28e6 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1491.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T13:15:10.750", "lastModified": "2025-03-01T13:15:10.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Posts Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018auto_play_timeout\u2019 parameter in all versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Posts Carousel para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'auto_play_timeout' en todas las versiones hasta la 1.3.7 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1502.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1502.json index f2e5af53e4c..95f5a857f73 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1502.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T07:15:11.183", "lastModified": "2025-03-01T07:15:11.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IP2Location Redirection plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'download_ip2location_redirection_backup' AJAX action in all versions up to, and including, 1.33.3. This makes it possible for unauthenticated attackers to download the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento IP2Location Redirection para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n AJAX 'download_ip2location_redirection_backup' en todas las versiones hasta la 1.33.3 incluida. Esto hace posible que atacantes no autenticados descarguen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json index ebcfaf2ca1c..287e9f2ce1e 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T06:15:25.557", "lastModified": "2025-02-28T06:15:25.557", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Wp Social Login and Register Social Counter para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.1.0 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n counter_access_key_setup(). Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del proveedor de inicio de sesi\u00f3n social a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { @@ -45,20 +49,57 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:wp_social_login_and_register_social_counter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "63E4D3FB-21A4-4BF1-97E4-A1E115C650A0" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-social/tags/3.0.9/inc/counter.php#L189", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3246155/wp-social/trunk/inc/counter.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/669833b3-1689-4051-8990-c6eddae4858f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1509.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1509.json index b36756f86d4..10e9c88f6d4 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1509.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1509.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1509", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:09.883", - "lastModified": "2025-02-22T04:15:09.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpguru:show_me_the_cookies:1.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "EC3E46BE-4431-467D-A43E-6D21816EBEE9" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/show-me-the-cookies/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65d15ceb-ab39-4088-a289-7244063aedf8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1510.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1510.json index aa707ebe7b3..7df49e9dfbd 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1510.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1510.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1510", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-22T04:15:10.040", - "lastModified": "2025-02-22T04:15:10.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T12:42:22.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keesiemeijer:custom_post_type_date_archives:*:*:*:*:*:wordpresss:*:*", + "versionEndIncluding": "2.7.1", + "matchCriteriaId": "B4360940-9F8F-434E-8F92-7D79D40F09F9" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/custom-post-type-date-archives/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/996ade9c-2531-4f43-87f6-eddb2ce98a12?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1515.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1515.json index 45d0a1645d2..6767a25f8e4 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1515.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1515.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Real Estate Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.8. This is due to insufficient identity verification on the LinkedIn login request process. This makes it possible for unauthenticated attackers to bypass official authentication and log in as any user on the site, including administrators." + }, + { + "lang": "es", + "value": "El complemento WP Real Estate Manager para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 2.8 incluida. Esto se debe a una verificaci\u00f3n de identidad insuficiente en el proceso de solicitud de inicio de sesi\u00f3n de LinkedIn. Esto hace posible que atacantes no autenticados eludan la autenticaci\u00f3n oficial e inicien sesi\u00f3n como cualquier usuario del sitio, incluidos los administradores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1517.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1517.json index cc425c5fe0e..321b7ebf4be 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1517.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-26T13:15:41.193", "lastModified": "2025-02-26T13:15:41.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1539.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1539.json index 3ce61206dda..5c88ac74e4d 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1539.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1539.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1539", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-21T15:15:12.830", - "lastModified": "2025-02-21T15:15:12.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-25T20:29:38.367", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -70,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -87,6 +87,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,7 +138,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -129,32 +149,89 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DD16A696-CC8A-489B-9930-DC3457FEF2E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dap-1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87CC92EB-3439-4FD1-9439-8DFF5D8BCDB8" + } + ] + } + ] } ], "references": [ { "url": "https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-replace_special_char-Vulnerability-1960448e6195809c94f9fd2ff1f59bcf?pvs=4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296480", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.296480", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.497496", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json index 8c456306d51..5cffef11c33 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab CE/EE for Self-Managed and Dedicated instances affecting all versions from 17.5 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. It was possible for a user added as an External to read and clone internal projects under certain circumstances.\"" + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab CE/EE para instancias autoadministradas y dedicadas que afecta a todas las versiones desde la 17.5 anterior a la 17.6.5, desde la 17.7 anterior a la 17.7.4 y desde la 17.8 anterior a la 17.8.2. Era posible que un usuario agregado como externo leyera y clonara proyectos internos en determinadas circunstancias." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1564.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1564.json index 2836c7d36ac..d9a769bf23b 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1564.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1564.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:34.007", "lastModified": "2025-03-01T08:15:34.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SetSail Membership plugin for WordPress is vulnerable to in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a users identity through the social login. This makes it possible for unauthenticated attackers to log in as any user, including administrators and take over access to their account." + }, + { + "lang": "es", + "value": "El complemento SetSail Membership para WordPress es vulnerable en todas las versiones hasta la 1.0.3 incluida. Esto se debe a que el complemento no verifica correctamente la identidad de los usuarios a trav\u00e9s del inicio de sesi\u00f3n con redes sociales. Esto permite que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario, incluidos los administradores, y obtengan acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1571.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1571.json index 24f40896df9..c4358bb4687 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1571.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1571.json @@ -3,19 +3,23 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T07:15:34.227", "lastModified": "2025-02-28T07:15:34.227", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Animated Text and Image Comparison Widgets in all versions up to, and including, 2.7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Exclusive Addons for Elementor para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de los widgets de comparaci\u00f3n de im\u00e1genes y texto animado del complemento en todas las versiones hasta la 2.7.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,20 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.7.7", + "matchCriteriaId": "D8F8D43A-53F1-4659-B5D1-BBDCC1E406A0" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3245128/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd2ec0b3-2784-4506-99f4-05187527fe6d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1579.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1579.json index 3aed778ce7b..a4dcf284867 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1579.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1579.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1579", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T09:15:09.393", - "lastModified": "2025-02-23T09:15:09.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/R2og/cve/blob/main/xss-r2og.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296555", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296555", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.502876", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1599.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1599.json index ac1798ec7bc..f3b9f87df4a 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1599.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1599.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1599", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-24T00:15:09.393", - "lastModified": "2025-02-24T00:15:09.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-24" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5E9D36FA-56A6-4BBB-B0B3-0873DB9716C9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Delete-any-file.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296594", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296594", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.498188", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1634.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1634.json index 28142fd1f78..4d3369c428c 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1634.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-26T17:15:22.083", "lastModified": "2025-03-03T14:15:34.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1638.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1638.json index 6e3ac087259..9474de5f462 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1638.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1638.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:34.167", "lastModified": "2025-03-01T08:15:34.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Alloggio Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity through the alloggio_membership_init_rest_api_facebook_login and alloggio_membership_init_rest_api_google_login functions. This makes it possible for unauthenticated attackers to log in as any user, including administrators, without knowing a password." + }, + { + "lang": "es", + "value": "El complemento Alloggio Membership para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 1.0.2 incluida. Esto se debe a que el complemento no valida correctamente la identidad de un usuario a trav\u00e9s de las funciones alloggio_membership_init_rest_api_facebook_login y alloggio_membership_init_rest_api_google_login. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario, incluidos los administradores, sin conocer una contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1666.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1666.json index 6376553ef15..5820373f850 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1666.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1666.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Cookie banner plugin for WordPress \u2013 Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website." + }, + { + "lang": "es", + "value": "El complemento Cookie banner para WordPress \u2013 Cookiebot CMP de Usercentrics para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n send_uninstall_survey() en todas las versiones hasta la 4.4.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, env\u00eden la encuesta de desinstalaci\u00f3n en nombre de un sitio web." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1671.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1671.json index 89d3925af38..b597277f2fe 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1671.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1671.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T08:15:34.320", "lastModified": "2025-03-01T08:15:34.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Academist Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.6. This is due to the academist_membership_check_facebook_user() function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as any user, including site administrators." + }, + { + "lang": "es", + "value": "El complemento Academist Membership para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.1.6 incluida. Esto se debe a que la funci\u00f3n academist_membership_check_facebook_user() no verifica correctamente la identidad de un usuario antes de autenticarlo. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario, incluidos los administradores del sitio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json index 4fa20b79691..161c4580360 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1672.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Notibar \u2013 Notification Bar for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Notibar \u2013 Notification Bar for WordPress para WordPress es vulnerable a Cross-Site Scripting almacenados a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 2.1.5 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en las p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json index cdf72b824bf..a1122ee8cff 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1675.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1675", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2025-02-25T08:15:30.020", - "lastModified": "2025-02-25T08:15:30.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-28T01:30:32.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:-:*:*:*:*:*:*", + "versionEndIncluding": "4.0.0", + "matchCriteriaId": "F7192B7F-6ED8-4F1B-A69C-BBEB647692C6" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2m84-5hfw-m8v4", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1681.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1681.json index 2d71f34c775..0013d19631d 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1681.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1681.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T00:15:35.950", "lastModified": "2025-02-28T00:15:35.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cardealer theme for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check and missing filename sanitization on the demo theme scheme AJAX functions in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to change or delete arbitrary css and js files." + }, + { + "lang": "es", + "value": "El tema Cardealer para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos y a la p\u00e9rdida de datos debido a la falta de una verificaci\u00f3n de capacidad y de una depuraci\u00f3n de nombres de archivo en las funciones AJAX del esquema del tema de demostraci\u00f3n en versiones hasta la 1.6.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, cambien o eliminen archivos CSS y JS arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1682.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1682.json index 059d33f03b0..393278f948b 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1682.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1682.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T00:15:36.100", "lastModified": "2025-02-28T00:15:36.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cardealer theme for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.4 due to missing capability check on the 'save_settings' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the default user role." + }, + { + "lang": "es", + "value": "El tema Cardealer para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 1.6.4 incluida debido a la falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'save_settings'. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, modifiquen el rol de usuario predeterminado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1686.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1686.json index 7596cc6dc63..0557b197036 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1686.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2025-02-27T05:15:14.143", "lastModified": "2025-02-27T15:15:40.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1687.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1687.json index 057c54a2e3e..ed4c14ffd6d 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1687.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1687.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T00:15:36.240", "lastModified": "2025-02-28T00:15:36.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cardealer theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.4. This is due to missing nonce validation on the 'update_user_profile' function. This makes it possible for unauthenticated attackers to update the user email and password via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El tema Cardealer para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 1.6.4 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n 'update_user_profile'. Esto hace posible que atacantes no autenticados actualicen el correo electr\u00f3nico y la contrase\u00f1a del usuario a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1689.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1689.json index 08f6a09f4a4..109bf76af1f 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1689.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1689.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T07:15:35.400", "lastModified": "2025-02-27T07:15:35.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1690.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1690.json index 0a23992641b..3775099b24e 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1690.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1690.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T09:15:10.697", "lastModified": "2025-02-27T09:15:10.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1691.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1691.json index 29154707df9..f4cf12589e1 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1691.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@mongodb.com", "published": "2025-02-27T13:15:11.253", "lastModified": "2025-02-27T16:15:38.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1692.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1692.json index 192b7775820..06d312324c7 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1692.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1692.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@mongodb.com", "published": "2025-02-27T13:15:11.413", "lastModified": "2025-02-27T13:15:11.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1693.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1693.json index 975c54a3a75..bce41fe3db2 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1693.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1693.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@mongodb.com", "published": "2025-02-27T13:15:11.563", "lastModified": "2025-02-27T13:15:11.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1696.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1696.json index 639681e4454..13cb792b602 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1696.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1696.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in Docker Desktop prior to version 4.39.0 that could lead to the unintentional disclosure of sensitive information via application logs. In affected versions, proxy configuration data\u2014potentially including sensitive details\u2014was written to log files in clear text whenever an HTTP GET request was made through a proxy. An attacker with read access to these logs could obtain the proxy information and leverage it for further attacks or unauthorized access. Starting with version 4.39.0, Docker Desktop no longer logs the proxy string, thereby mitigating this risk." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en Docker Desktop anterior a la versi\u00f3n 4.39.0 que podr\u00eda provocar la divulgaci\u00f3n involuntaria de informaci\u00f3n confidencial a trav\u00e9s de los registros de la aplicaci\u00f3n. En las versiones afectadas, los datos de configuraci\u00f3n del proxy (que podr\u00edan incluir detalles confidenciales) se escrib\u00edan en archivos de registro en texto plano cada vez que se realizaba una solicitud HTTP GET a trav\u00e9s de un proxy. Un atacante con acceso de lectura a estos registros podr\u00eda obtener la informaci\u00f3n del proxy y aprovecharla para realizar m\u00e1s ataques o para obtener acceso no autorizado. A partir de la versi\u00f3n 4.39.0, Docker Desktop ya no registra la cadena de proxy, lo que mitiga este riesgo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1716.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1716.json index a3b7598506a..9d87dc8a59c 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1716.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1716.json @@ -3,7 +3,7 @@ "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", "published": "2025-02-26T15:15:24.653", "lastModified": "2025-03-03T16:15:39.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1717.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1717.json index 618ecee7023..00e9426af19 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1717.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1717.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T08:15:31.130", "lastModified": "2025-02-27T08:15:31.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1723.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1723.json index 2aee1513331..ae2f76bf1c3 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1723.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1723.json @@ -3,12 +3,16 @@ "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2025-03-03T08:15:15.717", "lastModified": "2025-03-03T08:15:15.717", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zohocorp ManageEngine ADSelfService Plus versions 6510 and below are vulnerable to account takeover due to the\u00a0session mishandling. Valid account holders in the setup only have the potential to exploit this bug." + }, + { + "lang": "es", + "value": "Las versiones 6510 y anteriores de Zohocorp ManageEngine ADSelfService Plus son vulnerables a la apropiaci\u00f3n de cuentas debido a la gesti\u00f3n incorrecta de las sesiones. Los titulares de cuentas v\u00e1lidas en la configuraci\u00f3n solo tienen el potencial de explotar este error." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1726.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1726.json index 78ee2b039bc..f9654f6b272 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1726.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2025-02-26T20:15:13.510", "lastModified": "2025-02-26T20:15:13.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1730.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1730.json index 0de7ee596c0..d53841de896 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1730.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1730.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T07:15:11.380", "lastModified": "2025-03-01T07:15:11.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Download Counter plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.0 via the 'simple_download_counter_download_handler'. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including any local file on the server, such as wp-config.php or /etc/passwd." + }, + { + "lang": "es", + "value": "El complemento Simple Download Counter para WordPress es vulnerable a la lectura arbitraria de archivos en todas las versiones hasta la 2.0 incluida a trav\u00e9s del 'simple_download_counter_download_handler'. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, extraigan datos confidenciales, incluido cualquier archivo local en el servidor, como wp-config.php o /etc/passwd." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1738.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1738.json index 234787f0be7..966fc6d2287 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1738.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1738.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-27T13:15:11.720", "lastModified": "2025-02-27T13:15:11.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1739.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1739.json index dd9e86ec9b2..42d510039d1 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1739.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1739.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-27T13:15:11.883", "lastModified": "2025-02-27T13:15:11.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Authentication Bypass vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity. This vulnerability allows an attacker to retrieve administrator's credentials in cleartext by sending a request against the server using curl with random credentials to \"/en/player/activex_pal.asp\" and successfully authenticating the application." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Trivision Camera NC227WF v5.8.0 de TrivisionSecurity. Esta vulnerabilidad permite a un atacante recuperar las credenciales del administrador en texto plano enviando una solicitud al servidor mediante curl con credenciales aleatorias a \"/en/player/activex_pal.asp\" y autenticando la aplicaci\u00f3n con \u00e9xito. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1741.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1741.json index 23acbf8c2a7..aa9ee1f4202 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1741.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1741.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T16:15:38.930", "lastModified": "2025-02-27T16:15:38.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json index 8f83d83f3db..22b9610a6f9 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1742.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T17:15:16.460", "lastModified": "2025-02-27T17:15:16.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1743.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1743.json index ccf17c928b9..6e42f5396a7 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1743.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1743.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T18:15:27.650", "lastModified": "2025-02-27T18:15:27.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1744.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1744.json index d0e93122036..39935b29fed 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1744.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1744.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2025-02-28T04:15:09.603", "lastModified": "2025-02-28T04:15:09.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Write vulnerability in radareorg radare2 allows \n\nheap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en radareorg radare2 permite sobrelectura de b\u00fafer basada en mont\u00f3n o desbordamiento de b\u00fafer. Este problema afecta a radare2: antes de <5.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1745.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1745.json index b42661b0177..f63503cf2dd 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1745.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1745.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-27T18:15:27.923", "lastModified": "2025-02-27T18:15:27.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json index 1a22260b6b6..657b5204697 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-28T14:15:34.943", "lastModified": "2025-02-28T14:15:34.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + }, + { + "lang": "es", + "value": "Vulnerabilidad de tipo Cross-Site Scripting en versiones de OpenCart anteriores a la 4.1.0. Esta vulnerabilidad permite a un atacante ejecutar c\u00f3digo JavaScript en el navegador de la v\u00edctima envi\u00e1ndole una URL maliciosa mediante la b\u00fasqueda en el endpoint /product/search. Esta vulnerabilidad podr\u00eda aprovecharse para robar datos confidenciales del usuario, como cookies de sesi\u00f3n, o para realizar acciones en nombre del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json index 0dfe71d436d..0d78e406c06 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-28T14:15:35.480", "lastModified": "2025-02-28T14:15:35.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/login." + }, + { + "lang": "es", + "value": "Vulnerabilidades de inyecci\u00f3n de HTML en versiones de OpenCart anteriores a la 4.1.0. Estas vulnerabilidades podr\u00edan permitir a un atacante modificar el HTML del navegador de la v\u00edctima enviando una URL maliciosa y modificando el nombre del par\u00e1metro en /account/login." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json index 6bf91b78793..fd2fa974fe9 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-28T14:15:35.617", "lastModified": "2025-02-28T14:15:35.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/register." + }, + { + "lang": "es", + "value": "Vulnerabilidades de inyecci\u00f3n de HTML en versiones de OpenCart anteriores a la 4.1.0. Estas vulnerabilidades podr\u00edan permitir a un atacante modificar el HTML del navegador de la v\u00edctima enviando una URL maliciosa y modificando el nombre del par\u00e1metro en /account/register." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json index 281d3bfc6bb..bd90c589b37 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-28T14:15:35.760", "lastModified": "2025-02-28T14:15:35.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1751.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1751.json index c5264c20bc8..a345a20059a 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1751.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "68e1e1d3-5247-4d65-9f39-ef1a02cf571e", "published": "2025-02-27T12:15:35.030", "lastModified": "2025-02-27T12:15:35.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1755.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1755.json index 46af1c2d52c..e12e4b2de9e 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1755.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1755.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@mongodb.com", "published": "2025-02-27T16:15:39.137", "lastModified": "2025-02-27T16:15:39.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1756.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1756.json index e370cc541aa..032b01cf3b7 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1756.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1756.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@mongodb.com", "published": "2025-02-27T16:15:39.287", "lastModified": "2025-02-27T16:15:39.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json index a1a825060e9..56cf596821d 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T05:15:34.097", "lastModified": "2025-03-06T20:21:36.547", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:portfoliohub:portfoliohub:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:portfoliohub:uber-grid:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.1.7", - "matchCriteriaId": "5F653461-1C83-4AB9-8418-87811AC114AE" + "matchCriteriaId": "3DAFD338-E91D-421B-9719-7EA76B8C28D0" } ] } diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json index 49983fb4ad1..7d77d8bbc04 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to blind SQL Injection via the 'search' parameter in all versions up to, and including, 12.4.05 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento SEO de Squirrly para WordPress es vulnerable a la inyecci\u00f3n SQL a ciegas a trav\u00e9s del par\u00e1metro 'search' en todas las versiones hasta la 12.4.05 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json index f4094986f2f..406619f50be 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-02-28T14:15:35.943", "lastModified": "2025-02-28T14:15:35.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the \u2018query\u2019 parameter in /app-google-custom-search/searchResults. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + }, + { + "lang": "es", + "value": "Vulnerabilidad de tipo Cross-Site Scripting (XSS) en Soteshop, versiones anteriores a la 8.3.4, que podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro 'query' en /app-google-custom-search/searchResults. Esta vulnerabilidad puede aprovecharse para robar datos confidenciales del usuario, como cookies de sesi\u00f3n, o para realizar acciones en nombre del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1780.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1780.json index 7dd5250c53a..530f0063d3a 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1780.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1780.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-03-01T04:15:09.713", "lastModified": "2025-03-01T04:15:09.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wc4bp_delete_page() function in all versions up to, and including, 3.4.25. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins page setting." + }, + { + "lang": "es", + "value": "El complemento BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages para WordPress, es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n wc4bp_delete_page() en todas las versiones hasta la 3.4.25 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n de la p\u00e1gina del complemento." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1786.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1786.json index 3482dabc634..f8891544eec 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1786.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-01T10:15:11.683", "lastModified": "2025-03-03T21:15:16.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en rizinorg rizin hasta la versi\u00f3n 0.7.4. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n msf_stream_directory_free en la librer\u00eda /librz/bin/pdb/pdb.c. La manipulaci\u00f3n del argumento -P provoca un desbordamiento del b\u00fafer. Se requiere acceso local para abordar este ataque. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 0.8.0 puede solucionar este problema. Se recomienda actualizar el componente afectado." + "value": "Se ha encontrado una vulnerabilidad en rizinorg rizin hasta la versi\u00f3n 0.7.4. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n msf_stream_directory_free en la librer\u00eda /librz/bin/pdb/pdb.c. La manipulaci\u00f3n del argumento -P provoca un desbordamiento del b\u00fafer. Se requiere acceso local para abordar este ataque. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La actualizaci\u00f3n a la versi\u00f3n 0.8.0 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1788.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1788.json index 64f87370a3c..47d8f05f0be 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1788.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1788.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-01T13:15:11.797", "lastModified": "2025-03-03T21:15:16.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en rizinorg rizin hasta la versi\u00f3n 0.8.0. Afecta a la funci\u00f3n rz_utf8_encode de la biblioteca /librz/util/utf8.c. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en rizinorg rizin hasta la versi\u00f3n 0.8.0. Afecta a la funci\u00f3n rz_utf8_encode de la biblioteca /librz/util/utf8.c. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en el mont\u00f3n. El ataque debe realizarse de forma local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1791.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1791.json index c2de81e0ee7..a25dabf606e 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1791.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-01T14:15:34.520", "lastModified": "2025-03-03T21:15:16.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Zorlan SkyCaiji 2.9 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fileAction del archivo vendor/skycaiji/app/admin/controller/Tool.php. La manipulaci\u00f3n del argumento save_data provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en Zorlan SkyCaiji 2.9 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fileAction del archivo vendor/skycaiji/app/admin/controller/Tool.php. La manipulaci\u00f3n del argumento save_data provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json index f0743d1ac09..272a1ac7974 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@python.org", "published": "2025-02-28T19:15:36.550", "lastModified": "2025-02-28T21:15:27.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers." + }, + { + "lang": "es", + "value": "Durante el plegado de una lista de direcciones, cuando una coma separadora termina en una l\u00ednea plegada y esa l\u00ednea debe codificarse en Unicode, entonces el separador en s\u00ed tambi\u00e9n se codifica en Unicode. El comportamiento esperado es que la coma separadora siga siendo una coma de plan. Esto puede provocar que algunos servidores de correo interpreten mal el encabezado de la direcci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1797.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1797.json index 560fe5a94bc..48f2f7c1c7e 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1797.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1797.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-01T15:15:11.573", "lastModified": "2025-03-03T21:15:16.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en el sistema de gesti\u00f3n y operaciones de activos Baiyiyun de Hunan Zhonghe Baiyi Information Technology hasta el 20250217. Este problema afecta a algunas funciones desconocidas del archivo /wuser/anyUserBoundHouse.php. La manipulaci\u00f3n del argumento huid conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en el sistema de gesti\u00f3n y operaciones de activos Baiyiyun de Hunan Zhonghe Baiyi Information Technology hasta el 20250217. Este problema afecta a algunas funciones desconocidas del archivo /wuser/anyUserBoundHouse.php. La manipulaci\u00f3n del argumento huid conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1799.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1799.json index 0c2e0a56e23..5ae3e34ef20 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1799.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-01T18:15:34.803", "lastModified": "2025-03-03T21:15:16.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1800.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1800.json index e9450db809b..9f15c2b64ba 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1800.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1800.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en D-Link DAR-7000 3.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n get_ip_addr_details del archivo /view/vpn/sxh_vpn/sxh_vpnlic.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento ethname provoca la inyecci\u00f3n de comandos. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." + "value": "Se ha encontrado una vulnerabilidad en D-Link DAR-7000 3.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n get_ip_addr_details del archivo /view/vpn/sxh_vpn/sxh_vpnlic.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento ethname provoca la inyecci\u00f3n de comandos. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1801.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1801.json index e3d3ede8646..88e2af3bb42 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1801.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1801.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-03T15:15:16.500", "lastModified": "2025-03-03T15:15:16.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Ansible aap-gateway. Concurrent requests handled by the gateway grpc service can result in concurrency issues due to race condition requests against the proxy. This issue potentially allows a less privileged user to obtain the JWT of a greater privileged user, enabling the server to be jeopardized. A user session or confidential data might be vulnerable." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Ansible aap-gateway. Las solicitudes concurrentes gestionadas por el servicio grpc de la puerta de enlace pueden generar problemas de concurrencia debido a solicitudes de condici\u00f3n de ejecuci\u00f3n contra el proxy. Este problema potencialmente permite que un usuario con menos privilegios obtenga el JWT de un usuario con m\u00e1s privilegios, lo que pone en riesgo el servidor. Una sesi\u00f3n de usuario o datos confidenciales podr\u00edan ser vulnerables." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1806.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1806.json index 092bb6fb34d..baaaddce1c9 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1806.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T00:15:33.980", "lastModified": "2025-03-03T21:15:17.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1807.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1807.json index 2c95ea3588c..c17cf53fb64 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1807.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1807.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T00:15:34.160", "lastModified": "2025-03-02T00:15:34.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Eastnets PaymentSafe 2.5.26.0. This affects an unknown part of the file /directRouter.rfc of the component Edit Manual Reply Handler. The manipulation of the argument Title leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en Eastnets PaymentSafe 2.5.26.0. Afecta a una parte desconocida del archivo /directRouter.rfc del componente Edit Manual Reply Handler. La manipulaci\u00f3n del argumento Title provoca un ataque b\u00e1sico de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1808.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1808.json index 9db99828e31..b1f0b10da4c 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1808.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T01:15:10.230", "lastModified": "2025-03-03T21:15:17.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Pixsoft E-Saphira 1.7.24 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /servlet?act=login&tipo=1 del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en Pixsoft E-Saphira 1.7.24 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /servlet?act=login&tipo=1 del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1809.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1809.json index ef40b4ae31d..9031dea810a 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1809.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1809.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T06:15:22.057", "lastModified": "2025-03-03T21:15:17.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Pixsoft Sol hasta la versi\u00f3n 7.6.6c y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /pix_projetos/servlet?act=login&submit=1&evento=0&pixrnd=0125021816444195731041 del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en Pixsoft Sol hasta la versi\u00f3n 7.6.6c y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /pix_projetos/servlet?act=login&submit=1&evento=0&pixrnd=0125021816444195731041 del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1810.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1810.json index 24ca844281c..cef03b2f1e7 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1810.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T07:15:10.160", "lastModified": "2025-03-03T22:15:37.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Pixsoft Vivaz 6.0.11. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 del componente Login Endpoint. La manipulaci\u00f3n del argumento sistema provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en Pixsoft Vivaz 6.0.11. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 del componente Login Endpoint. La manipulaci\u00f3n del argumento sistema provoca cross site scripting. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1811.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1811.json index acfe0e1f0aa..6af650e8b84 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1811.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1811.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T09:15:09.843", "lastModified": "2025-03-03T21:15:17.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en AT Software Solutions ATSVD hasta la versi\u00f3n 3.4.1. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /login.aspx del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 3.4.2 puede solucionar este problema. Se recomienda actualizar el componente afectado." + "value": "Se ha encontrado una vulnerabilidad en AT Software Solutions ATSVD hasta la versi\u00f3n 3.4.1. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /login.aspx del componente Login Endpoint. La manipulaci\u00f3n del argumento txtUsuario provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. La actualizaci\u00f3n a la versi\u00f3n 3.4.2 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json index 0311a1943a7..b390f73609b 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T09:15:10.903", "lastModified": "2025-03-03T21:15:17.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-08. La funci\u00f3n GetUserOrg del archivo com/futvan/z/framework/core/SuperZ.java est\u00e1 afectada. La manipulaci\u00f3n del argumento userId conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-08. La funci\u00f3n GetUserOrg del archivo com/futvan/z/framework/core/SuperZ.java est\u00e1 afectada. La manipulaci\u00f3n del argumento userId conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1813.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1813.json index 4c6648fef40..9eb715de7a7 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1813.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1813.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T10:15:09.947", "lastModified": "2025-03-03T22:15:37.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json index 6322e77b0bb..7bf4c041579 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T11:15:10.133", "lastModified": "2025-03-02T11:15:10.133", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is some unknown functionality of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC6 15.03.05.16. Este problema afecta a algunas funciones desconocidas del archivo /goform/WifiExtraSet. La manipulaci\u00f3n del argumento wpapsk_crypto provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,85 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.298082", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298082", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.506532", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json index 9017efebdac..a21230bf03b 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T12:15:36.507", "lastModified": "2025-03-03T21:15:17.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json index 97c5b3df8c2..bfcec3c5a1c 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T14:15:34.123", "lastModified": "2025-03-03T20:15:44.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en FFmpeg hasta 6e26f57f672b05e7b8b052007a83aef99dc81ccb. Afecta a la funci\u00f3n audio_element_obu del archivo libavformat/iamf_parse.c del componente IAMF File Handler. La manipulaci\u00f3n del argumento num_parameters provoca una fuga de memoria. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El identificador del parche es 0526535cd58444dd264e810b2f3348b4d96cff3b. Se recomienda aplicar un parche para solucionar este problema." + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en FFmpeg hasta 6e26f57f672b05e7b8b052007a83aef99dc81ccb. Afecta a la funci\u00f3n audio_element_obu del archivo libavformat/iamf_parse.c del componente IAMF File Handler. La manipulaci\u00f3n del argumento num_parameters provoca una fuga de memoria. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El identificador del parche es 0526535cd58444dd264e810b2f3348b4d96cff3b. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1817.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1817.json index 253d26d5f89..765990f5f55 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1817.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1817.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T15:15:11.773", "lastModified": "2025-03-03T22:15:37.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1818.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1818.json index 2f353b3cee6..4a5837660c8 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1818.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1818.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T16:15:35.563", "lastModified": "2025-03-03T20:15:44.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json index 93075b8fcae..6299bf55f89 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1819.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T17:15:11.483", "lastModified": "2025-03-02T17:15:11.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC7 1200M 15.03.06.44. La funci\u00f3n TendaTelnet del archivo /goform/telnet est\u00e1 afectada. La manipulaci\u00f3n del argumento lan_ip provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json index f43b1cd8527..605878a7b94 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1820.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T17:15:11.677", "lastModified": "2025-03-03T19:15:33.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en zj1983 zz hasta 2024-8 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n getOaWid del archivo src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. La manipulaci\u00f3n del argumento tableId provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en zj1983 zz hasta 2024-8 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n getOaWid del archivo src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. La manipulaci\u00f3n del argumento tableId provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1821.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1821.json index ba2caa9ec5b..4db07a41160 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1821.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1821.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T19:15:10.547", "lastModified": "2025-03-03T19:15:34.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en zj1983 zz hasta 2024-8 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n getUserOrgForUserId del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java. La manipulaci\u00f3n del argumento userID provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en zj1983 zz hasta 2024-8 y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n getUserOrgForUserId del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java. La manipulaci\u00f3n del argumento userID provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1829.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1829.json index db6a3a9a0ac..c313abb0c76 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1829.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1829.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T19:15:10.723", "lastModified": "2025-03-03T18:15:31.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en TOTOLINK X18 9.1.0cu.2024_B20220329. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setMtknatCfg del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento mtkhnatEnable provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en TOTOLINK X18 9.1.0cu.2024_B20220329. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setMtknatCfg del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento mtkhnatEnable provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1830.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1830.json index e69f3c4becd..64a7bcc483a 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1830.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1830.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T20:15:33.767", "lastModified": "2025-03-03T22:15:37.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1831.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1831.json index 58bc6afccd1..580cc328fd1 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1831.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1831.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T20:15:34.577", "lastModified": "2025-03-03T18:15:32.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n GetDBUser del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java est\u00e1 afectada. La manipulaci\u00f3n del argumento user_id conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n GetDBUser del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java est\u00e1 afectada. La manipulaci\u00f3n del argumento user_id conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1832.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1832.json index 5751db21502..9964ea73013 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1832.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1832.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T21:15:10.110", "lastModified": "2025-03-03T18:15:32.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n getUserList del archivo src/main/java/com/futvan/z/system/zrole/ZroleAction.java se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento roleid provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n getUserList del archivo src/main/java/com/futvan/z/system/zrole/ZroleAction.java se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento roleid provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1833.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1833.json index 46cfc0339fb..7a4c375a0d6 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1833.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1833.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T22:15:34.820", "lastModified": "2025-03-03T18:15:33.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Este problema afecta a la funci\u00f3n sendNotice del archivo src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java del componente HTTP Request Handler. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Este problema afecta a la funci\u00f3n sendNotice del archivo src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java del componente HTTP Request Handler. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1834.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1834.json index 2c8b776a06a..e72057a9860 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1834.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1834.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T22:15:34.997", "lastModified": "2025-03-03T20:15:44.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Afecta a una parte desconocida del archivo /resolve. La manipulaci\u00f3n del archivo de argumentos permite una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Afecta a una parte desconocida del archivo /resolve. La manipulaci\u00f3n del archivo de argumentos permite una carga sin restricciones. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1835.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1835.json index 8944f999a94..d8783850bbf 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1835.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1835.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T23:15:10.477", "lastModified": "2025-03-03T20:15:44.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en osuuu LightPicture 1.2.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n de carga del archivo /app/controller/Api.php. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en osuuu LightPicture 1.2.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n de carga del archivo /app/controller/Api.php. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1836.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1836.json index 3287d62c5a2..048eddc0e6a 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1836.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1836.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-02T23:15:10.993", "lastModified": "2025-03-02T23:15:10.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Incorta 2023.4.3. It has been classified as problematic. Affected is an unknown function of the component Edit Insight Handler. The manipulation of the argument Service Name leads to csv injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Incorta 2023.4.3. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del componente Edit Insight Handler. La manipulaci\u00f3n del argumento Service Name provoca la inyecci\u00f3n de un archivo csv. Es posible lanzar el ataque de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json index 4750c2a2ac4..3c7f5a61051 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1840.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T00:15:42.857", "lastModified": "2025-03-03T20:15:45.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5.6.3.154.205. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /CDGServer3/workflowE/useractivate/updateorg.jsp. La manipulaci\u00f3n del argumento flowId provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5.6.3.154.205. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /CDGServer3/workflowE/useractivate/updateorg.jsp. La manipulaci\u00f3n del argumento flowId provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1841.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1841.json index 329ecd93329..23332c144a8 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1841.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T00:15:43.033", "lastModified": "2025-03-03T20:15:45.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205. Afecta a una parte desconocida del archivo /CDGServer3/logManagement/ClientSortLog.jsp. La manipulaci\u00f3n del argumento startDate/endDate provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205. Afecta a una parte desconocida del archivo /CDGServer3/logManagement/ClientSortLog.jsp. La manipulaci\u00f3n del argumento startDate/endDate provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1842.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1842.json index a15e75b9006..cd6143c0686 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1842.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1842.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T01:15:10.023", "lastModified": "2025-03-03T01:15:10.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in FITSTATS Technologies AthleteMonitoring up to 20250302. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en FITSTATS Technologies AthleteMonitoring hasta 20250302. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /login.php. La manipulaci\u00f3n del argumento username provoca cross site scripting. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1843.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1843.json index 26e3002d3da..1e47b6798db 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1843.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1843.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T01:15:11.127", "lastModified": "2025-03-03T18:15:34.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1844.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1844.json index 2a253f2f339..c2e0c570dbb 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1844.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1844.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T02:15:33.390", "lastModified": "2025-03-03T18:15:34.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Se trata de una funci\u00f3n desconocida del archivo /CDGServer3/logManagement/backupLogDetail.jsp. La manipulaci\u00f3n del argumento logTaskId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Se trata de una funci\u00f3n desconocida del archivo /CDGServer3/logManagement/backupLogDetail.jsp. La manipulaci\u00f3n del argumento logTaskId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1845.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1845.json index f3001661446..fd3a5b12e8a 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1845.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1845.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T02:15:33.563", "lastModified": "2025-03-03T18:15:35.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en ESAFENET DSM 3.1.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n examExportPDF del archivo /admin/plan/examExportPDF. La manipulaci\u00f3n del argumento s provoca la inyecci\u00f3n de comandos. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad en ESAFENET DSM 3.1.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n examExportPDF del archivo /admin/plan/examExportPDF. La manipulaci\u00f3n del argumento s provoca la inyecci\u00f3n de comandos. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json index 1c28bdc012a..51487f21599 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1846.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T03:15:08.777", "lastModified": "2025-03-03T18:15:36.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha detectado una vulnerabilidad en zj1983 zz hasta 2024-8. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n deleteLocalFile del archivo src/main/java/com/futvan/z/system/zfile/ZfileAction.java del componente File Handler. La manipulaci\u00f3n del argumento zids provoca una denegaci\u00f3n de servicio. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha detectado una vulnerabilidad en zj1983 zz hasta 2024-8. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n deleteLocalFile del archivo src/main/java/com/futvan/z/system/zfile/ZfileAction.java del componente File Handler. La manipulaci\u00f3n del argumento zids provoca una denegaci\u00f3n de servicio. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json index 485372a960f..e1f3315379f 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1847.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T03:15:08.983", "lastModified": "2025-03-03T18:15:36.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json index c40176201f3..a7d4b92d8b3 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1848.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T04:15:08.657", "lastModified": "2025-03-03T18:15:36.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Se ve afectada una funci\u00f3n desconocida del archivo /import_data_check. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Se ve afectada una funci\u00f3n desconocida del archivo /import_data_check. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json index 623413979a5..1c94d1e994a 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1849.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T04:15:08.837", "lastModified": "2025-03-03T18:15:36.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /import_data_todb. La manipulaci\u00f3n del argumento url conduce a Server-Side Request Forgery. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /import_data_todb. La manipulaci\u00f3n del argumento url conduce a Server-Side Request Forgery. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json index 9a67f15b11b..550872bad6e 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T05:15:10.587", "lastModified": "2025-03-03T18:15:37.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips College Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /university.php. La manipulaci\u00f3n del argumento book_name provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips College Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /university.php. La manipulaci\u00f3n del argumento book_name provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1851.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1851.json index 977532bfb45..84dd087da40 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1851.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1851.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T05:15:10.867", "lastModified": "2025-03-03T18:15:37.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Hasta la versi\u00f3n 15.03.06.44 se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC7. Afecta a la funci\u00f3n formSetFirewallCfg del archivo /goform/SetFirewallCfg. La manipulaci\u00f3n del argumento firewallEn provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Hasta la versi\u00f3n 15.03.06.44 se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC7. Afecta a la funci\u00f3n formSetFirewallCfg del archivo /goform/SetFirewallCfg. La manipulaci\u00f3n del argumento firewallEn provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1852.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1852.json index 92cdfaba9bd..8e2e6598191 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1852.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T06:15:21.343", "lastModified": "2025-03-03T18:15:37.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1853.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1853.json index 65035932255..d8f140b0877 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1853.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1853.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T06:15:21.697", "lastModified": "2025-03-03T06:15:21.697", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tenda AC8 16.03.34.06 que se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n sub_49E098 del archivo /goform/SetIpMacBind del componente Parameter Handler. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,86 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*", + "matchCriteriaId": "9C1D64DC-1EDC-4F62-8D22-E1890B71843C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C81F1E48-0204-4478-A937-5D40CDD9E5E4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_49E098.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298121", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298121", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.505374", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1854.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1854.json index e7adc064843..a5a152e3b5b 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1854.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1854.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T07:15:35.030", "lastModified": "2025-03-03T07:15:35.030", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/del_member.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Gym Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /dashboard/admin/del_member.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1855.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1855.json index 0624ac92fb6..88e811d168c 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1855.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1855.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T07:15:35.277", "lastModified": "2025-03-03T07:15:35.277", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Online Shopping Portal 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /product-details.php. The manipulation of the argument quality/price/value/name/summary/review leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Online Shopping Portal 2.1. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /product-details.php. La manipulaci\u00f3n del argumento calidad/precio/valor/nombre/resumen/rese\u00f1a provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1856.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1856.json index 99f0936f0f0..4690ef17341 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1856.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1856.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T08:15:16.303", "lastModified": "2025-03-03T08:15:16.303", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /dashboard/admin/gen_invoice.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Codezips Gym Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /dashboard/admin/gen_invoice.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1857.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1857.json index 88f53c54424..2510f8f47c7 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1857.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1857.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T08:15:16.823", "lastModified": "2025-03-03T08:15:16.823", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file /check_availability.php. The manipulation of the argument employeeid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Nipah Virus Testing Management System 1.0. Afecta a una parte desconocida del archivo /check_availability.php. La manipulaci\u00f3n del argumento employeeid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1858.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1858.json index ffd790e332a..99a07a3f2e6 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1858.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1858.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T09:15:38.857", "lastModified": "2025-03-03T09:15:38.857", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Codezips Online Shopping Website 1.0. This vulnerability affects unknown code of the file /success.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Online Shopping Website 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /success.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1859.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1859.json index 06a484742c4..9a4847a63a6 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1859.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1859.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T09:15:39.037", "lastModified": "2025-03-03T09:15:39.037", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul News Portal 4.1. This issue affects some unknown processing of the file /login.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en PHPGurukul News Portal 4.1. Este problema afecta a algunos procesos desconocidos del archivo /login.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C7B550-9F9C-4CCE-A603-99006C7022C9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/panghuanjie/Code-audits/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298127", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298127", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.506350", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1864.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1864.json index 34e3d747a37..f25652354d0 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1864.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1864.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2025-03-03T09:15:39.210", "lastModified": "2025-03-03T09:15:39.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in radareorg radare2 allows Overflow Buffers.This issue affects radare2: before <5.9.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en radareorg radare2 permite b\u00faferes de desbordamiento. Este problema afecta a radare2: antes de <5.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1866.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1866.json index b1e093f4f77..24481bd0897 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1866.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1866.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2025-03-03T09:15:39.370", "lastModified": "2025-03-03T09:15:39.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in warmcat libwebsockets allows Pointer Manipulation, potentially leading to out-of-bounds memory access. This issue affects libwebsockets before 4.3.4 and is present in code built specifically for the Win32 platform.\n\nBy default, the affected code is not executed unless one of the following conditions is met:\n\nLWS_WITHOUT_EXTENSIONS (default ON) is manually set to OFF in CMake.\nLWS_WITH_HTTP_STREAM_COMPRESSION (default OFF) is manually set to ON in CMake.\nDespite these conditions, when triggered in affected configurations, this vulnerability may allow attackers to manipulate pointers, potentially leading to memory corruption or unexpected behavior." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en libwebsockets de warmcat permite la manipulaci\u00f3n de punteros, lo que puede provocar un acceso a la memoria fuera de los l\u00edmites. Este problema afecta a libwebsockets anteriores a la versi\u00f3n 4.3.4 y est\u00e1 presente en el c\u00f3digo creado espec\u00edficamente para la plataforma Win32. De forma predeterminada, el c\u00f3digo afectado no se ejecuta a menos que se cumpla una de las siguientes condiciones: LWS_WITHOUT_EXTENSIONS (predeterminado ON) se configura manualmente en OFF en CMake. LWS_WITH_HTTP_STREAM_COMPRESSION (predeterminado OFF) se configura manualmente en ON en CMake. A pesar de estas condiciones, cuando se activa en las configuraciones afectadas, esta vulnerabilidad puede permitir a los atacantes manipular punteros, lo que puede provocar una corrupci\u00f3n de la memoria o un comportamiento inesperado. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1867.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1867.json index 09b6d375253..39583ca3a51 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1867.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1867.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2025-03-03T09:15:39.520", "lastModified": "2025-03-03T09:15:39.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in ithewei libhv allows HTTP Response Smuggling.This issue affects libhv: through 1.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de interpretaci\u00f3n inconsistente de solicitudes HTTP (contrabando de solicitudes/respuestas HTTP) en ithewei libhv permite el contrabando de respuestas HTTP. Este problema afecta a libhv: hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1868.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1868.json index 56712ab362b..1bd14fe4f22 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1868.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1868.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-03-03T11:15:15.657", "lastModified": "2025-03-03T12:15:34.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized exposure of confidential information affecting Advanced IP Scanner and Advanced Port Scanner. It occurs when these applications initiate a network scan, inadvertently sending the NTLM hash of the user performing the scan. This vulnerability can be exploited by intercepting network traffic to a legitimate server or by setting up a fake server, in both local and remote scenarios. This exposure is relevant for both HTTP/HTTPS and SMB protocols." + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n no autorizada de informaci\u00f3n confidencial que afecta a Advanced IP Scanner y Advanced Port Scanner. Se produce cuando estas aplicaciones inician un escaneo de red, enviando inadvertidamente el hash NTLM del usuario que realiza el escaneo. Esta vulnerabilidad se puede explotar interceptando el tr\u00e1fico de red hacia un servidor leg\u00edtimo o configurando un servidor falso, tanto en escenarios locales como remotos. Esta exposici\u00f3n es relevante tanto para protocolos HTTP/HTTPS como SMB." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json index 7c9aecdc251..ef920aa76a8 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1876.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DAP-1562 1.10. Este problema afecta a la funci\u00f3n http_request_parse del componente HTTP Header Handler. La manipulaci\u00f3n del argumento Authorization provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DAP-1562 1.10. Este problema afecta a la funci\u00f3n http_request_parse del componente HTTP Header Handler. La manipulaci\u00f3n del argumento Authorization provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1877.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1877.json index f553eb548fb..0120b724745 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1877.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1877.json @@ -19,7 +19,7 @@ }, { "lang": "es", - "value": "En D-Link DAP-1562 1.10 se ha detectado una vulnerabilidad clasificada como cr\u00edtica que afecta a la funci\u00f3n pure_auth_check del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento a1 provoca la desreferenciaci\u00f3n de un puntero nulo. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." + "value": "En D-Link DAP-1562 1.10 se ha detectado una vulnerabilidad clasificada como cr\u00edtica que afecta a la funci\u00f3n pure_auth_check del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento a1 provoca la desreferenciaci\u00f3n de un puntero nulo. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1882.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1882.json index 1ced774e6db..61c136de3d6 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1882.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1882.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1882", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T21:15:18.267", - "lastModified": "2025-03-03T21:15:18.267", - "vulnStatus": "Received", + "lastModified": "2025-03-05T14:05:15.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en i-Drive i11 e i12 hasta 20250227. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del componente Device Setting Handler. La manipulaci\u00f3n conduce a un control de acceso inadecuado para la interfaz de registro. El ataque debe realizarse dentro de la red local. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. No fue posible identificar al responsable actual del mantenimiento del producto. Se debe asumir que el producto ha llegado al final de su vida \u00fatil." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,24 +142,104 @@ "value": "CWE-1262" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250227", + "matchCriteriaId": "F190E901-E255-488B-8393-25824B55501C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:i-drive:i11:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1AC63E40-205E-4842-9C3C-227A37310C37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20250227", + "matchCriteriaId": "0F0904B4-A160-4619-B46A-E399C7C0B339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:i-drive:i12:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7D9B7F71-2A76-4A8F-8474-E21D8529E794" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/geo-chen/i-Drive", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298196", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298196", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.510955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1886.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1886.json index a43edc00102..92f0b35fd04 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1886.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1886.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Pass-Back vulnerability in versions prior to 2025.35.000 of Sage 200 Spain. This vulnerability allows an authenticated attacker with administrator privileges to discover stored SMTP credentials." + }, + { + "lang": "es", + "value": "Vulnerabilidad Pass-Back en versiones anteriores a la 2025.35.000 de Sage 200 Espa\u00f1a. Esta vulnerabilidad permite a un atacante autenticado con privilegios de administrador descubrir las credenciales SMTP almacenadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1887.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1887.json index 2fc01829c0b..d43cffeb041 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1887.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SMB forced authentication vulnerability in versions prior to 2025.35.000 of Sage 200 Spain. This vulnerability allows an authenticated attacker with administrator privileges to obtain NTLMv2-SSP Hash by changing any of the paths to a UNC path pointing to a server controlled by the attacker." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autenticaci\u00f3n forzada de SMB en versiones anteriores a la 2025.35.000 de Sage 200 Espa\u00f1a. Esta vulnerabilidad permite a un atacante autenticado con privilegios de administrador obtener el Hash NTLMv2-SSP modificando cualquiera de las rutas por una ruta UNC que apunte a un servidor controlado por el atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1890.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1890.json index 36d1d023cfb..eea5eced631 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1890.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1890.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en shishuocms 1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n handleRequest del archivo src/main/java/com/shishuo/cms/action/manage/ManageUpLoadAction.java. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en shishuocms 1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n handleRequest del archivo src/main/java/com/shishuo/cms/action/manage/ManageUpLoadAction.java. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json index 9246b141c15..61ae9282a20 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en shishuocms 1.1. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /manage/folder/add.json del componente Directory Deletion Page. La manipulaci\u00f3n del argumento folderName provoca cross-site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en shishuocms 1.1. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /manage/folder/add.json del componente Directory Deletion Page. La manipulaci\u00f3n del argumento folderName provoca cross-site scripting. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json index 56d08317843..bf43f92c581 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1893.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Open5GS hasta la versi\u00f3n 2.7.2. Se ha declarado como problem\u00e1tica. La vulnerabilidad afecta a la funci\u00f3n gmm_state_authentication del archivo src/amf/gmm-sm.c del componente UDM Subscriber Data Management. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se llama e31e9965f00d9c744a7f728497cb4f3e97744ee8. Se recomienda aplicar un parche para solucionar este problema." + "value": "Se ha encontrado una vulnerabilidad en Open5GS hasta la versi\u00f3n 2.7.2. Se ha declarado como problem\u00e1tica. La vulnerabilidad afecta a la funci\u00f3n gmm_state_authentication del archivo src/amf/gmm-sm.c del componente UDM Subscriber Data Management. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. El ataque se puede lanzar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se llama e31e9965f00d9c744a7f728497cb4f3e97744ee8. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json index 0c2545311cc..b36ad99f7f9 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1894.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /search-result.php. La manipulaci\u00f3n del argumento searchdata provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /search-result.php. La manipulaci\u00f3n del argumento searchdata provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json index 81e97d2af1e..fcd8ea22900 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1895.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Afecta a una parte desconocida del archivo /goform/setMacFilterCfg. La manipulaci\u00f3n del argumento deviceList provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Afecta a una parte desconocida del archivo /goform/setMacFilterCfg. La manipulaci\u00f3n del argumento deviceList provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1896.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1896.json index 7dc3e7c3b80..a6d9f75d23b 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1896.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1896.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1896", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T02:15:36.340", - "lastModified": "2025-03-04T02:15:36.340", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda TX3 16.03.13.11_multi. This vulnerability affects unknown code of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/SetStaticRouteCfg. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,26 +144,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*", + "matchCriteriaId": "0C30310A-46F8-4A10-8718-B36DE179BA4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E287DCCF-7DF1-4FBE-8A50-A95E272A5B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_2.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298414", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298414", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506602", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1897.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1897.json index 6163d1ebf62..f10cf15a6bb 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1897.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1897.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1897", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T02:15:36.513", - "lastModified": "2025-03-04T02:15:36.513", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Tenda TX3 16.03.13.11_multi. This issue affects some unknown processing of the file /goform/SetNetControlList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Este problema afecta a algunos procesos desconocidos del archivo /goform/SetNetControlList. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,26 +144,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*", + "matchCriteriaId": "0C30310A-46F8-4A10-8718-B36DE179BA4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E287DCCF-7DF1-4FBE-8A50-A95E272A5B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_3.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298415", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298415", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1898.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1898.json index 78d7c674d56..3654dc38228 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1898.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1898.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1898", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T02:15:36.680", - "lastModified": "2025-03-04T02:15:36.680", - "vulnStatus": "Received", + "lastModified": "2025-03-05T16:39:15.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tenda TX3 16.03.13.11_multi. Affected is an unknown function of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda TX3 16.03.13.11_multi. Se trata de una funci\u00f3n desconocida del archivo /goform/openSchedWifi. La manipulaci\u00f3n del argumento schedStartTime/schedEndTime provoca un desbordamiento del b\u00fafer. Es posible lanzar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,26 +144,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*", + "matchCriteriaId": "0C30310A-46F8-4A10-8718-B36DE179BA4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E287DCCF-7DF1-4FBE-8A50-A95E272A5B40" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_4.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298416", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298416", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.506606", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1899.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1899.json index 55e5bcd103d..afc6fc51946 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1899.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1899.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en Tenda TX3 16.03.13.11_multi y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /goform/setPptpUserList. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en Tenda TX3 16.03.13.11_multi y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /goform/setPptpUserList. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento del b\u00fafer. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json index b6d2983f942..d716606c33e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1900.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /add-table.php. La manipulaci\u00f3n del argumento tableno provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /add-table.php. La manipulaci\u00f3n del argumento tableno provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json index 98615b758b3..5cc20969736 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1901.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/check_availability.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/check_availability.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json index 01e14792c75..5ea8108a0bc 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1902.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Student Record System 3.2. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /password-recovery.php. La manipulaci\u00f3n del argumento emailid conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Student Record System 3.2. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /password-recovery.php. La manipulaci\u00f3n del argumento emailid conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json index 60325143783..c1b4bbc7dfd 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1905.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Employee Management System 1.0. Afecta a una parte desconocida del archivo employee.php. La manipulaci\u00f3n del argumento Full Name provoca cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Employee Management System 1.0. Afecta a una parte desconocida del archivo employee.php. La manipulaci\u00f3n del argumento Full Name provoca cross-site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json index 1e4aeb293f1..b7a29e4d9f2 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1906.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T05:15:14.903", "lastModified": "2025-03-04T15:15:24.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/profile.php. La manipulaci\u00f3n del argumento mobilenumber conduce a una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros. " } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,32 +142,79 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/HaroldFinch-L/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.508915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/HaroldFinch-L/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json index 1708373aa37..8a56429bfe5 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open5GS up to 2.7.2. Affected by this vulnerability is the function amf_nsmf_pdusession_handle_update_sm_context of the file src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Open5GS hasta la versi\u00f3n 2.7.2. Esta vulnerabilidad afecta a la funci\u00f3n amf_nsmf_pdusession_handle_update_sm_context del archivo src/amf/nsmf-handler.c del componente AMF. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. El ataque puede iniciarse de forma remota. Esta vulnerabilidad permite que un \u00fanico UE bloquee el AMF, lo que provoca la p\u00e9rdida total de los servicios de movilidad y gesti\u00f3n de sesiones y provoca una interrupci\u00f3n en toda la red. Todos los UE registrados perder\u00e1n la conectividad y se bloquear\u00e1n los nuevos registros hasta que se reinicie el AMF, lo que provocar\u00e1 un alto impacto en la disponibilidad. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json index 917e1075d4b..583af46d489 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Se pudo provocar un use-after-free en el lado del proceso de contenido de una conexi\u00f3n WebTransport, lo que provoc\u00f3 un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json index 01cd89e955e..577d6c680b9 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Un comparador incoherente en xslt/txNodeSorter podr\u00eda haber dado lugar a un acceso fuera de los l\u00edmites potencialmente explotable. Solo afecta a la versi\u00f3n 122 y posteriores. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json index cc20939f821..b7c1656653a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "En las CPU de 64 bits, cuando el JIT compila los valores de retorno de WASM i32, estos pueden tomar bits de la memoria restante. Esto puede provocar que se los trate como un tipo diferente. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json index dd2fd977999..b6ad953fabd 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Se pudo interrumpir el procesamiento de un rescate de RegExp y ejecutar JavaScript adicional, lo que podr\u00eda activar la recolecci\u00f3n de basura cuando el motor no lo esperaba. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json index 242c02d8fa9..b895add173e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Una p\u00e1gina web podr\u00eda enga\u00f1ar a un usuario para que configure ese sitio como el controlador predeterminado para un protocolo de URL personalizado. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json index f897ae64d07..d79b7ac2b43 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1936.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "jar: las URL recuperan el contenido de un archivo local empaquetado en un archivo ZIP. El valor null y todo lo que le sigue se ignoran al recuperar el contenido del archivo, pero la extensi\u00f3n falsa que sigue al valor null se utiliza para determinar el tipo de contenido. Esto podr\u00eda haberse utilizado para ocultar c\u00f3digo en una extensi\u00f3n web camuflada en otra cosa, como una imagen. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json index 924e97152aa..1eff27a1a17 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7 y Thunderbird 128.7. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json index 8eb0fb32015..f3bb923a100 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 135, Thunderbird 135, Firefox ESR 128.7 y Thunderbird 128.7. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json index 01360910979..71c4587a5e4 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136." + }, + { + "lang": "es", + "value": "Una opci\u00f3n de selecci\u00f3n podr\u00eda ocultar parcialmente el mensaje de confirmaci\u00f3n que se muestra antes de iniciar aplicaciones externas. Esto podr\u00eda usarse para enga\u00f1ar a un usuario para que inicie una aplicaci\u00f3n externa inesperadamente. *Este problema solo afecta a las versiones de Firefox para Android.* Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json index 0949399e9fe..e0f3ad75f25 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1941.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136." + }, + { + "lang": "es", + "value": "En determinadas circunstancias, se podr\u00eda haber omitido una configuraci\u00f3n de usuario que indicaba que Focus deb\u00eda requerir autenticaci\u00f3n antes de su uso (distinto de CVE-2025-0245). Esta vulnerabilidad afecta a Firefox < 136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json index a821c083daf..53f78dfd753 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1942.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136 and Thunderbird < 136." + }, + { + "lang": "es", + "value": "Cuando String.toUpperCase() hac\u00eda que una cadena se hiciera m\u00e1s larga, era posible que la memoria no inicializada se incorporara a la cadena de resultado. Esta vulnerabilidad afecta a Firefox < 136 y Thunderbird < 136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1946.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1946.json index b8c99c87dc0..9cc5bff8dc7 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1946.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1946.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in hzmanyun Education and Training System 2.1. It has been rated as critical. Affected by this issue is the function exportPDF of the file /user/exportPDF. The manipulation of the argument id leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en hzmanyun Education and Training System 2.1. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n exportPDF del archivo /user/exportPDF. La manipulaci\u00f3n del argumento id provoca la inyecci\u00f3n de comandos. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1947.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1947.json index 5c6814b6565..1250dbed0c1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1947.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1947.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in hzmanyun Education and Training System 2.1.3. This affects the function scorm of the file UploadImageController.java. The manipulation of the argument param leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en hzmanyun Education and Training System 2.1.3. Afecta a la funci\u00f3n scorm del archivo UploadImageController.java. La manipulaci\u00f3n del argumento param provoca la inyecci\u00f3n de comandos. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1949.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1949.json index 77a270a49ef..602232b980a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1949.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1949.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in ZZCMS 2025. This issue affects some unknown processing of the file /3/ucenter_api/code/register_nodb.php of the component URL Handler. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en ZZCMS 2025. Este problema afecta a algunos procesos desconocidos del archivo /3/ucenter_api/code/register_nodb.php del componente URL Handler. La manipulaci\u00f3n del argumento $_SERVER['PHP_SELF'] provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json index 5018808331c..0d3a4f320dd 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/password-recovery.php. The manipulation of the argument username/mobileno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Restaurant Table Booking System 1.0. Se trata de una funci\u00f3n desconocida del archivo /admin/password-recovery.php. La manipulaci\u00f3n del argumento username/mobileno provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1953.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1953.json index df7dd84772c..11dae16b096 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1953.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1953.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in vLLM AIBrix 0.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file pkg/plugins/gateway/prefixcacheindexer/hash.go of the component Prefix Caching. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.3.0 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en vLLM AIBrix 0.2.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo pkg/plugins/gateway/prefixcacheindexer/hash.go del componente Prefix Caching. La manipulaci\u00f3n conduce a valores insuficientemente aleatorios. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 0.3.0 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1954.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1954.json index 433946fe348..a5ec27e21e6 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1954.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1954.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Human Metapneumovirus Testing Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /login.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1955.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1955.json index afcbec3ff40..9841636b3fc 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1955.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1955.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /Scheduling/scheduling/pages/profile.php. The manipulation of the argument username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Class and Exam Scheduling System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /Scheduling/scheduling/pages/profile.php. La manipulaci\u00f3n del argumento username provoca cross site scripting. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1958.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1958.json index 733b6538285..3b82d6334bf 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1958.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1958.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en aaluoxiang oa_system 1.0. Este problema afecta a algunos procesos desconocidos del archivo src/main/resources/mappers/address-mapper.xml. La manipulaci\u00f3n del argumento outtype conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en aaluoxiang oa_system 1.0. Este problema afecta a algunos procesos desconocidos del archivo src/main/resources/mappers/address-mapper.xml. La manipulaci\u00f3n del argumento outtype conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1961.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1961.json index f8a63c5ce46..02a3b787781 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1961.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1961.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/app/web_crud.php. La manipulaci\u00f3n del cifrado de argumentos conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.1 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/app/web_crud.php. La manipulaci\u00f3n del cifrado de argumentos conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1962.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1962.json index ef726594157..93deb73dfbe 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1962.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1962.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/addroom.php. La manipulaci\u00f3n del argumento roomname provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/addroom.php. La manipulaci\u00f3n del argumento roomname provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json index 5d1d6562762..d2591a250b2 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1963.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /reservation.php. La manipulaci\u00f3n del argumento checkin provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /reservation.php. La manipulaci\u00f3n del argumento checkin provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json index 300a88bee99..de46619b2c7 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1964.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been rated as critical. This issue affects some unknown processing of the file /booknow.php?roomname=Duplex. The manipulation of the argument checkin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en projectworlds Online Hotel Booking 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /booknow.php?roomname=Duplex. La manipulaci\u00f3n del argumento checkin provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json index 054c52974ae..2699ce0bb0f 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Blood Bank Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /user_dashboard/donor.php. La manipulaci\u00f3n del nombre del argumento provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Blood Bank Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /user_dashboard/donor.php. La manipulaci\u00f3n del nombre del argumento provoca cross site scripting. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1969.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1969.json index 0c85f6326b7..8d365d3c7d1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1969.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1969.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper request input validation in Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center allows a user to modify a valid request and spoof an approval in TEAM.\n\nUpgrade TEAM to the latest release v.1.2.2. Follow instructions in updating TEAM documentation for updating process" + }, + { + "lang": "es", + "value": "La validaci\u00f3n incorrecta de la entrada de solicitudes en Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center permite que un usuario modifique una solicitud v\u00e1lida y falsifique una aprobaci\u00f3n en TEAM. Actualice TEAM a la \u00faltima versi\u00f3n v.1.2.2. Siga las instrucciones para actualizar la documentaci\u00f3n de TEAM para el proceso de actualizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20002.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20002.json index e6009fc9043..e9c3da81331 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20002.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20002.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "After attempting to upload a file that does not meet prerequisites, GMOD Apollo will respond with local path information disclosure" + }, + { + "lang": "es", + "value": "Despu\u00e9s de intentar cargar un archivo que no cumple con los requisitos previos, GMOD Apollo responder\u00e1 con la divulgaci\u00f3n de informaci\u00f3n de la ruta local" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20011.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20011.json index 265df3727d0..249eab645cf 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20011.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20011.json @@ -3,12 +3,16 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:12.563", "lastModified": "2025-03-04T04:15:12.563", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberaci\u00f3n de memoria." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "5570397D-1B1E-4BE4-99D5-825B6B0886B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20049.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20049.json index 320f5e03051..856883905af 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20049.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20049.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:16.277", "lastModified": "2025-02-28T17:15:16.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Dario Health portal service application is vulnerable to XSS, which could allow an attacker to obtain sensitive information." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n de servicio del portal Dario Health es vulnerable a XSS, lo que podr\u00eda permitir a un atacante obtener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20060.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20060.json index bf953136f81..59c19a39dd5 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20060.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20060.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:16.440", "lastModified": "2025-02-28T17:15:16.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could expose cross-user personal identifiable information (PII) and personal health information transmitted to the Android device via the Dario Health application database." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda exponer informaci\u00f3n personal identificable (PII) de varios usuarios e informaci\u00f3n de salud personal transmitida al dispositivo Android a trav\u00e9s de la base de datos de la aplicaci\u00f3n Dario Health." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20091.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20091.json index 5d33c7aaaa9..606ce2b39ea 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20091.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20091.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20091", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.253", - "lastModified": "2025-03-04T04:15:13.253", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:41:14.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20111.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20111.json index 24f24f3dcb5..b69fece72e3 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20111.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20111.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.240", "lastModified": "2025-02-26T17:15:22.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20116.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20116.json index f18a80a801b..7e4e2f5dd50 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20116.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.403", "lastModified": "2025-02-26T17:15:22.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20117.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20117.json index fe0d383b75d..144af535579 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20117.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.567", "lastModified": "2025-02-26T17:15:22.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20118.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20118.json index 3336fcfa686..ef3878121a0 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20118.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20118.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.723", "lastModified": "2025-02-26T18:15:14.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20119.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20119.json index 53c3f4e04e3..fd5b4be6bb3 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20119.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.883", "lastModified": "2025-02-26T18:15:14.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20161.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20161.json index 109939f7475..729b535f427 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20161.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:23.053", "lastModified": "2025-02-26T17:15:23.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20206.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20206.json index 9ea72c78644..de389e042df 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20206.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20206.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.\r\n\r\nThis vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el canal de comunicaci\u00f3n entre procesos (IPC) de Cisco Secure Client para Windows podr\u00eda permitir que un atacante local autenticado realice un ataque de secuestro de DLL en un dispositivo afectado si Secure Firewall Posture Engine, anteriormente HostScan, est\u00e1 instalado en Cisco Secure Client. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los recursos que carga la aplicaci\u00f3n en tiempo de ejecuci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un mensaje IPC manipulado a un proceso espec\u00edfico de Cisco Secure Client. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en la m\u00e1quina afectada con privilegios de SYSTEM. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales de usuario v\u00e1lidas en el sistema Windows." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20208.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20208.json index ba2480459f6..bb87d5759bc 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20208.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20208.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. \r\n\r This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco TelePresence Management Suite (TMS) podr\u00eda permitir que un atacante remoto con pocos privilegios realice un ataque de Cross-Site Scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente por parte de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando datos maliciosos en un campo de datos espec\u00edfico de la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de scripts arbitrarios en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json index ad81b3b2683..1e53de14862 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:11.590", "lastModified": "2025-02-13T22:15:11.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20626.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20626.json index 0abc5b66f2e..3f6d4894cec 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20626.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20626.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20626", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.393", - "lastModified": "2025-03-04T04:15:13.393", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:41:14.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json index 89600b6b678..266b2111779 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20647.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.510", "lastModified": "2025-03-03T15:15:16.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json index d0659120b86..1626eb00639 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:09.950", "lastModified": "2025-03-03T19:15:34.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json index a001794d4c1..713fb92ce8f 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20653.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@mediatek.com", "published": "2025-03-03T03:15:10.170", "lastModified": "2025-03-03T03:15:10.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291064; Issue ID: MSV-2046." + }, + { + "lang": "es", + "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, si un atacante tiene acceso f\u00edsico al dispositivo, sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09291064; ID de problema: MSV-2046." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20903.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20903.json index 50169590c65..75307e6ce29 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20903.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20903.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in SecSettingsIntelligence prior to SMR Mar-2025 Release 1 allows local attackers to launch privileged activities. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en SecSettingsIntelligence anterior a SMR Mar-2025 Release 1 permite a los atacantes locales iniciar actividades privilegiadas. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20908.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20908.json index 61ee928956b..89cf35b663d 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20908.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use of insufficiently random values in Auracast prior to SMR Mar-2025 Release 1 allows adjacent attackers to access Auracast broadcasting." + }, + { + "lang": "es", + "value": "El uso de valores insuficientemente aleatorios en Auracast antes de SMR Mar-2025 Release 1 permite que atacantes adyacentes accedan a la transmisi\u00f3n de Auracast." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20909.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20909.json index 9c2eba68345..89d8acc6451 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20909.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20909.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use of implicit intent for sensitive communication in Settings prior to SMR Mar-2025 Release 1 allows local attackers to access sensitive information." + }, + { + "lang": "es", + "value": "El uso de intenci\u00f3n impl\u00edcita para comunicaciones confidenciales en Settings anteriores a la versi\u00f3n 1 de SMR de marzo de 2025 permite que atacantes locales accedan a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20910.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20910.json index 03bc95db3da..ad033532111 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20910.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20910.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect default permission in Galaxy Watch Gallery prior to SMR Mar-2025 Release 1 allows local attackers to access data in Galaxy Watch Gallery." + }, + { + "lang": "es", + "value": "El permiso predeterminado incorrecto en Galaxy Watch Gallery anterior a SMR Mar-2025 Release 1 permite que atacantes locales accedan a datos en Galaxy Watch Gallery." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20911.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20911.json index 240d9c88241..9d72d95b677 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20911.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20911.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in sem_wifi service prior to SMR Mar-2025 Release 1 allows privileged local attackers to update MAC address of Galaxy Watch." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en el servicio sem_wifi anterior a SMR Mar-2025 Release 1 permite que atacantes locales privilegiados actualicen la direcci\u00f3n MAC de Galaxy Watch." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20912.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20912.json index 3ce776e5b69..f47a3de820f 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20912.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20912.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect default permission in DiagMonAgent prior to SMR Mar-2025 Release 1 allows local attackers to access data within Galaxy Watch." + }, + { + "lang": "es", + "value": "El permiso predeterminado incorrecto en DiagMonAgent anterior a SMR Mar-2025 Release 1 permite que atacantes locales accedan a datos dentro de Galaxy Watch." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20913.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20913.json index 1e9312dab07..dab8964b612 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20913.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20913.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of drawing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar binarios de contenido de dibujo en Samsung Notes anteriores a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20914.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20914.json index 1315779ee09..d10c6fc9be0 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20914.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20914.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of hand writing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar c\u00f3digo binario de contenido escrito a mano en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20915.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20915.json index 7c780bb1476..7015cd8df00 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20915.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20915.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of voice content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar c\u00f3digo binario de contenido de voz en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20916.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20916.json index 901e4469a40..8a9280e8b76 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20916.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20916.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in reading string of SPen in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en la cadena de lectura de SPen en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20917.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20917.json index 09369435fed..c1c9184237e 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20917.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20917.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of pdf content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar c\u00f3digo binario de contenido PDF en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20918.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20918.json index 3b7d18e5aaa..777a88830f3 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20918.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20918.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying extra data of base content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar datos adicionales del contenido base en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20919.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20919.json index a37cf110d0c..80abf9a34fb 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20919.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20919.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of video content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar binarios de contenido de video en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20920.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20920.json index 0d91c8d9af2..ce2136d9323 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20920.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20920.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in action link data in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en datos de enlaces de acci\u00f3n en Samsung Notes anteriores a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20921.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20921.json index ba0c58fc283..7882b89574a 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20921.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20921.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of text content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar c\u00f3digo binario de contenido de texto en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20922.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20922.json index 5bdf8b0d076..255709c33ae 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20922.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20922.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in appending text paragraph in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al agregar un p\u00e1rrafo de texto en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a los atacantes leer la memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20923.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20923.json index 40763ce5453..de199bb3b88 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20923.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20923.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in Galaxy Wearable prior to version 2.2.61.24112961 allows local attackers to launch arbitrary activity with Galaxy Wearable privilege." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Galaxy Wearable anterior a la versi\u00f3n 2.2.61.24112961 permite a atacantes locales iniciar actividad arbitraria con el privilegio de Galaxy Wearable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20924.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20924.json index cb8156465ac..2fdd1864236 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20924.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20924.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper access control in Samsung Notes prior to version 4.4.26.71 allows physical attackers to access data across multiple user profiles." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes f\u00edsicos acceder a datos de m\u00faltiples perfiles de usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20925.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20925.json index 1b9dfffd204..d8fc4fcb293 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20925.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20925.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in applying binary of text data in Samsung Notes prior to version 4.4.26.71 allows local attackers to potentially read memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al aplicar datos binarios de texto en Samsung Notes anteriores a la versi\u00f3n 4.4.26.71 permite a atacantes locales potencialmente leer la memoria." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20926.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20926.json index 47ec79f089d..238bdbbb237 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20926.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20926.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper export of Android application components in My Files prior to version 15.0.07.5 in Android 14 allows local attackers to access files with My Files' privilege." + }, + { + "lang": "es", + "value": "La exportaci\u00f3n incorrecta de componentes de aplicaciones de Android en Mis Archivos anteriores a la versi\u00f3n 15.0.07.5 en Android 14 permite a atacantes locales acceder a archivos con el privilegio de Mis Archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20927.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20927.json index b6cb25e0582..02f10ca5c34 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20927.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20927.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in parsing image data in Samsung Notes prior to vaersion 4.4.26.71 allows local attackers to access out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el an\u00e1lisis de datos de im\u00e1genes en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes locales acceder a la memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20928.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20928.json index 6a6c498ff57..ea740ad9735 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20928.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20928.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in parsing wbmp image in Samsung Notes prior to vaersion 4.4.26.71 allows local attackers to access out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el an\u00e1lisis de im\u00e1genes wbmp en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes locales acceder a la memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20929.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20929.json index acb1802aeec..1dbba47bc21 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20929.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20929.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds write in parsing jpeg image in Samsung Notes prior to version 4.4.26.71 allows local attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites al analizar im\u00e1genes jpeg en Samsung Notes anteriores a la versi\u00f3n 4.4.26.71 permite a atacantes locales ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20930.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20930.json index 3e68e182855..08f8cd02354 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20930.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20930.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in parsing jpeg image in Samsung Notes prior to version 4.4.26.71 allows local attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al analizar una imagen jpeg en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes locales leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20931.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20931.json index 8b7fbfa8f5f..5f717b45ffa 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20931.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20931.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds write in parsing bmp image in Samsung Notes prior to version 4.4.26.71 allows local attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites al analizar una imagen bmp en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes locales ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20932.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20932.json index c2956feea3e..77b2d22ba0e 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20932.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20932.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in parsing rle of bmp image in Samsung Notes prior to version 4.4.26.71 allows local attackers to\ud63bread out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el rol de an\u00e1lisis de una imagen bmp en Samsung Notes anterior a la versi\u00f3n 4.4.26.71 permite a atacantes locales leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20933.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20933.json index f7255016e53..d310c7136a6 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20933.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read in parsing bmp image in Samsung Notes prior to version 4.4.26.71 allows local attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el an\u00e1lisis de im\u00e1genes bmp en Samsung Notes anteriores a la versi\u00f3n 4.4.26.71 permite a atacantes locales leer memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json index 3f5216cfd51..7352e8aaace 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission." + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n incorrecta en las b\u00f3vedas PAM en Devolutions Server 2024.3.12 y versiones anteriores permite que un usuario autenticado omita el permiso \"agregar en la ra\u00edz\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json index 4260ad0aea7..323eb81036d 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in MicroDicom DICOM Viewer 2025.1 Build 3321. It has been classified as critical. Affected is an unknown function of the file mDicom.exe. The manipulation leads to memory corruption. The attack needs to be approached locally. It is recommended to upgrade the affected component. The vendor quickly confirmed the existence of the vulnerability and fixed it in the latest beta." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en MicroDicom DICOM Viewer 2025.1 Build 3321. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo mDicom.exe. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque debe abordarse localmente. Se recomienda actualizar el componente afectado. El proveedor confirm\u00f3 r\u00e1pidamente la existencia de la vulnerabilidad y la corrigi\u00f3 en la \u00faltima versi\u00f3n beta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json index d6d4c0862ce..adc55f115ba 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform up to 20250224. It has been rated as critical. Affected by this issue is some unknown functionality of the file /security/addUser.jsp. The manipulation of the argument groupId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Seeyon Zhiyuan Interconnect FE Collaborative Office Platform hasta 20250224. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /security/addUser.jsp. La manipulaci\u00f3n del argumento groupId conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json index 7741bf2dcd1..f47e27a5314 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ChestnutCMS hasta la versi\u00f3n 1.5.2. Afecta a la funci\u00f3n uploadFile del archivo /dev-api/cms/file/upload. La manipulaci\u00f3n del argumento file provoca una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json index 0496e474df9..40654fd109f 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en ChestnutCMS 1.5.2. Esta vulnerabilidad afecta a la funci\u00f3n renameFile del archivo /cms/file/rename. La manipulaci\u00f3n del argumento rename provoca un path traversal. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json index f42966faed4..417c99b205b 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php?cid=1. The manipulation of the argument classname/capacity leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Pre-School Enrollment System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/edit-class.php?cid=1. La manipulaci\u00f3n del argumento classname/capacity conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json index df9ea387c33..a427fa22535 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in s-a-zhd Ecommerce-Website-using-PHP 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /customer_register.php. The manipulation of the argument name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en sa-zhd Ecommerce-Website-using-PHP 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /customer_register.php. La manipulaci\u00f3n del nombre del argumento provoca una carga sin restricciones. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2036.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2036.json index 394b02c7cf0..d47b1ae10d8 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2036.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in s-a-zhd Ecommerce-Website-using-PHP 1.0. It has been classified as critical. This affects an unknown part of the file details.php. The manipulation of the argument pro_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en sa-zhd Ecommerce-Website-using-PHP 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo details.php. La manipulaci\u00f3n del argumento pro_id provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2037.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2037.json index a8c2de4516c..31108267fd0 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2037.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2037.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /user_dashboard/delete_requester.php. The manipulation of the argument requester_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /user_dashboard/delete_requester.php. La manipulaci\u00f3n del argumento requester_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2038.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2038.json index 5f0854eca05..f1770027d14 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2038.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2038.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /upload/. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /upload/. La manipulaci\u00f3n conduce a la exposici\u00f3n de informaci\u00f3n a trav\u00e9s de la lista de directorios. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2039.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2039.json index 921b4bf8a29..12a4e65d573 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2039.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Blood Bank Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/delete_members.php. La manipulaci\u00f3n del argumento member_id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2040.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2040.json index 25f9190f053..a2278d7508c 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2040.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in zhijiantianya ruoyi-vue-pro 2.4.1. Affected by this vulnerability is an unknown functionality of the file /admin-api/bpm/model/deploy. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zhijiantianya ruoyi-vue-pro 2.4.1. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin-api/bpm/model/deploy. La manipulaci\u00f3n conduce a la neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un motor de plantillas. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2041.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2041.json index f5093b3eed6..ef52e33d5b8 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2041.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in s-a-zhd Ecommerce-Website-using-PHP 1.0. Affected by this issue is some unknown functionality of the file /shop.php. The manipulation of the argument p_cat leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en sa-zhd Ecommerce-Website-using-PHP 1.0. Este problema afecta a algunas funciones desconocidas del archivo /shop.php. La manipulaci\u00f3n del argumento p_cat provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2042.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2042.json index 3dc44c10e3f..74dafaa1fec 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2042.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in huang-yk student-manage 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en huang-yk student-manage 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede iniciar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2043.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2043.json index 4d2b479001b..de26bd092bf 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2043.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in LinZhaoguan pb-cms 1.0.0 and classified as critical. This issue affects some unknown processing of the file /admin#themes of the component Add New Topic Handler. The manipulation of the argument Topic Key leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en LinZhaoguan pb-cms 1.0.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin#themes del componente Add New Topic Handler. La manipulaci\u00f3n del argumento Topic Key provoca la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2044.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2044.json index 5a72fd5b678..a1d824b0550 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2044.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2044.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/delete_bloodGroup.php. The manipulation of the argument blood_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/delete_bloodGroup.php. La manipulaci\u00f3n del argumento blood_id conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json index b7030df7418..adc85633f68 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access to potentially sensitive project analytics data." + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n incorrecta en GitLab EE que afecta a todas las versiones desde la 17.7 anterior a la 17.7.6, la 17.8 anterior a la 17.8.4 y la 17.9 anterior a la 17.9.1 permite a los usuarios con permisos limitados acceder a datos de an\u00e1lisis de proyectos potencialmente confidenciales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json index 83e416ed0b1..5944ab5a8e1 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through through NULL pointer dereference.. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante la desreferencia del puntero NULL. Esta vulnerabilidad puede explotarse solo en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21089.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21089.json index 8b4b225f4f1..b9448815f72 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21089.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21089.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21089", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.680", - "lastModified": "2025-03-04T04:15:13.680", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:41:14.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21092.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21092.json index b0e602455bb..131fffdfab3 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21092.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GMOD Apollo does not have sufficient logical or access checks when updating a user's information. This could result in an attacker being able to escalate privileges for themselves or others." + }, + { + "lang": "es", + "value": "GMOD Apollo no cuenta con suficientes controles l\u00f3gicos o de acceso al actualizar la informaci\u00f3n de un usuario. Esto podr\u00eda dar lugar a que un atacante pudiera escalar privilegios para s\u00ed mismo o para otros." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json index af78f29507f..b87ddc8a293 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path traversal may lead to arbitrary file download. The score without \nleast privilege principle violation is as calculated below. In \ncombination with other issues it may facilitate further compromise of \nthe device. Remediation in Version 6.8.0, release date: 01-Mar-25." + }, + { + "lang": "es", + "value": "El path traversal puede provocar la descarga de archivos arbitrarios. La puntuaci\u00f3n sin violaci\u00f3n del principio de privilegio m\u00ednimo se calcula a continuaci\u00f3n. En combinaci\u00f3n con otros problemas, puede facilitar una mayor vulnerabilidad del dispositivo. Soluci\u00f3n en la versi\u00f3n 6.8.0, fecha de lanzamiento: 01-Mar-25." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21097.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21097.json index 91c1fc9e7da..e63a48524a8 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21097.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21097.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21097", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.813", - "lastModified": "2025-03-04T04:15:13.813", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de la desreferencia del puntero NULL." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21098.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21098.json index 7ad62914665..6a1bb6555a0 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21098.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21098.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21098", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:13.953", - "lastModified": "2025-03-04T04:15:13.953", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through\u00a0out-of-bounds read bypass permission check." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local cause fugas de informaci\u00f3n al omitir la verificaci\u00f3n de permisos de lectura fuera de los l\u00edmites." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,44 @@ "value": "CWE-922" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json index 3995f7a2632..30385b360e2 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21156", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.787", - "lastModified": "2025-02-11T18:15:27.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T22:54:41.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.2", + "matchCriteriaId": "3E7F3C36-2873-4BE0-95AE-5132F88F7DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:incopy:20.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DCC66068-50EA-40CA-B662-E28E627DC87B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/incopy/apsb25-10.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json index 3e37d84f344..db55cd45a37 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21159", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.977", - "lastModified": "2025-02-11T18:15:27.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T23:05:19.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.4", + "matchCriteriaId": "E6B47872-5257-4E90-BA8C-98DEECE7BE2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.2.1", + "matchCriteriaId": "839C7A9E-CFC7-4D9B-9ADE-2A0C2E8FFC7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-11.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json index a94d57b940a..4af2631c277 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21160", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.163", - "lastModified": "2025-02-11T18:15:28.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T23:10:32.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.4", + "matchCriteriaId": "E6B47872-5257-4E90-BA8C-98DEECE7BE2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.2.1", + "matchCriteriaId": "839C7A9E-CFC7-4D9B-9ADE-2A0C2E8FFC7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-11.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json index d6e63fa66e6..58a1a571396 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21161", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.347", - "lastModified": "2025-02-11T18:15:28.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T23:12:47.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_designer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1", + "matchCriteriaId": "4BD23767-B701-4C27-BF0C-71BA595EB422" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-12.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json index 1d70cdc0607..d3b005c41c0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21163", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.747", - "lastModified": "2025-02-11T18:15:28.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T23:11:21.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,75 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.4", + "matchCriteriaId": "E6B47872-5257-4E90-BA8C-98DEECE7BE2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.2.1", + "matchCriteriaId": "839C7A9E-CFC7-4D9B-9ADE-2A0C2E8FFC7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-11.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json index 8fd35b8c0d2..0c40a4d4875 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json index daa7b52652b..d5b67a72fe9 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json index 0ea27e2f581..08c88d84920 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json index a4991716f2b..a2e9a818a23 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json index 27cbd397972..9ac5aba5784 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json index b2a604807c0..29ff3ceb39f 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21198.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json index 5f42e7d1354..dad099b6783 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json index 1cd9d93656e..691e8621da1 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21395.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21404.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21404.json index f173efcafbc..418a218f1ae 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21404.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21404.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21424.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21424.json index a7e11637220..87e12ca9e78 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21424.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21424.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:15.810", "lastModified": "2025-03-03T11:15:15.810", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while calling the NPU driver APIs concurrently." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al llamar a las API del controlador NPU simult\u00e1neamente." } ], "metrics": { @@ -47,10 +51,6469 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1C0227CD-1414-4E2D-9F2A-B47E5D24CF8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63C2ACAC-BCDC-4453-99C4-56868172ACB0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D06AAD09-7CBF-4761-A258-EE5B34B7B27C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "244760FB-DB14-47B0-B301-0891F3ED3CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "17738B45-947D-4C4F-820C-11C8314338A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D777F3D4-0707-472E-A768-A00E7AD9D2BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC2E75B-5067-4C10-B66D-71763F744C22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D415D6A4-5586-4A9F-8F9C-BFA733A4A3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5467FEC-5CF7-492A-B792-A7DE345427ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCD5A75-497D-4D26-BF35-AF04743FA138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5009631F-3632-4AF8-AC1B-A0570778B6D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_439:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D9037D-B828-4FA1-B082-52617396550D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF33DF89-CD83-4003-B3E2-F399A61B71AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B938218-3ECD-4342-BF1E-709BDE16015C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6976CA-9019-4B8A-84B1-58F73A0E2673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "618CBEBD-0B1D-4A98-B4E6-1CFC10707A8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FDD354-0044-4BD2-B1B9-B89BE040070D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FCCD21-39FC-4B68-89E0-B3A9F4B1A932" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCF8439-B259-43FE-B797-57C2D62A35E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "150C4223-4560-49A6-9080-AA73A739AB9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCFF2B-1713-46E2-AA4A-419FB63ED8A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A91DE4C3-96DD-4DEB-B258-515E83028F1E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CB628D4-566E-454D-B2B9-04A5533C6737" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0571FA3B-F1E1-4154-94A3-8F0F31C702AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7A5B684-09BB-4DD0-9F16-D3761EA37D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "32FD60FF-1974-44AC-A0C9-6B8776A18386" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C1A76A-AD97-4A08-B45A-F9994D5455DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C019467-2193-4A7B-9CAA-4F44D19EB058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DF0CA5-9874-4C25-8357-7E5D9AABACD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3850D5D-7AA3-4DC3-84FC-E6F31C6ABA21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8D5607-F0BC-46C9-A94F-1D28EE5A3F0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8942236-F6DC-4769-89A7-7001093BC234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4659B0-547B-4492-9338-90B45B0462FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D579F9FE-7B00-4B19-A9A5-4A2AE9B101D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9D188A-2029-431E-A225-302C7795B891" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "741B4512-2150-4E92-A12F-A3CFBF5717D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB958799-6C95-4066-A564-2440B94EA064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "61260043-6FB2-49CD-B8F5-AC896D95276E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D07B173E-FDAE-4640-B567-2156EFA15A1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:*:*:*:*:*:*:*:*", + "matchCriteriaId": "95C5F72E-5F31-4D7C-8ED3-A19B7BF43B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D144B580-1D35-45C5-BC23-0DF4BC466D9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "909A12CE-67B6-4C98-8562-26EEC578C2E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCD3FF6-484D-4D51-B281-DA9AAFBCBD0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00663346-5CF1-4901-9AA9-39B4E6B71778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A342D02-01FD-4497-ADB2-2E7F6F9CF3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB441C-DCC6-4AF9-B3E6-6DE6305D3AAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "57ABC4DE-7213-4C0A-ACE2-803F667E78B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "481E3382-E1DB-45A6-9FF7-B86712DFBF0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1B8798-4A1F-4FEA-AE81-6C1F299A08F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D264E36-5E39-4ABD-B05D-153C852CE40B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A829FBCE-2F22-4D03-92FA-B6F3FFE30777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB2936E-F3AF-4623-B32B-3D50285AC6D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5501670-56E2-48B6-ACFC-67F908D5ECCA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D284823-94B0-4DEA-8473-19FE88DC67B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06165461-2AA0-4306-8F72-C8F6A9D5113A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+:*:*:*:*:*:*:*:*", + "matchCriteriaId": "083BEE0F-BE6D-4CE7-A0A3-79CDAAE24EB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47D193F3-8369-4253-B46A-07DC2D4CC19D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D30E2C95-7B82-42C9-B1D2-0E9379321C7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84BE3209-9A2D-4D14-A6D3-EA5178A36E63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D277C7D-A04F-4DD2-B0A9-5CFC2F3AAEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D349CCF3-0F16-4464-B1A0-091FB2F4A5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD477FCB-4FDE-43AD-8CA9-E64D8C95F8E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "15919125-D919-438B-A95D-9E398E7011A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF17BE73-08FC-46C8-8C20-5A72E97AD077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B31855B3-E8D9-412D-AB79-E568E462DE84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9C56B06-3D58-4720-835F-103C404D109E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DFDFD257-3F86-40F4-8B9F-C42CAAD09553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "763EEF62-9EC9-4BF6-8F2D-D603A24AA0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "205D5B11-AEA6-4AA9-81D4-A87CB390FBC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDDA8319-911D-4689-A28B-AD70EBB23BB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "561382A5-CAAE-44D6-9ECD-A086F1CF44C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8E976A6-4785-4F88-9035-0F6F0509A642" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81FFF0F5-85BD-42CC-9725-A43BD3EF6268" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "723EAD03-6C32-4B1C-95C1-6FDA94F08151" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2825BB85-7AA1-45E4-95C3-92D405C977AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A62E8B-549B-4A89-BDCD-EAEF7083B7F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4220BE43-073D-4E0C-A572-0D300E3D85E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9FFECE-96F6-4230-A91F-8266AC13EEC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA96DEE-5234-4B16-ADB4-FF21B0FE578D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EA1B4C-510A-4D92-9BEC-6FAAD8EA227B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:*:*:*:*:*:*:*:*", + "matchCriteriaId": "77E784C6-1579-407F-B9D8-3DCDC83A97B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F85D0833-4F0F-489E-A47D-020D82D5E78F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22BAC46-9C86-4346-BA5C-B090ABDFF86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:*:*:*:*:*:*:*:*", + "matchCriteriaId": "678C51B2-953B-4693-A2AD-9B26B0678EC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "85345B3F-1AD7-4647-9FDA-2DC6BA612FD7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B27389EE-3335-4C72-92AE-8399345FBD8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A81C45-B22A-4B56-BC8E-6ED38186A178" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69547D69-1A27-4094-BAB6-191E6D319F83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A2671726-93CB-40D8-B2B8-F6FD011DB95F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "521067A5-E74A-43E6-8321-527C7716FE75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F7BAB034-67C5-45B8-B6E3-60C54C355F36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "26D532E2-FF3F-4115-B8F6-DE6C87207A9E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D4562404-F3CD-45B8-8CB4-2528AE1B9CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2551312-D07A-49D2-BA91-5176AAF6BD86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:*:*:*:*:*:*:*:*", + "matchCriteriaId": "62CBDF54-2DE7-423F-9974-7741D1361AC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9165360C-256C-48CB-8239-DA589F33B140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:*:*:*:*:*:*:*:*", + "matchCriteriaId": "982C1E0F-E564-4234-8997-E294706E3E9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CDF028-7E2D-431F-B489-7EDBA7C1A541" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:*:*:*:*:*:*:*:*", + "matchCriteriaId": "52E496AD-3A70-434D-954F-D39EA9DE0B83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9337CEB3-91E9-42D2-A6B0-79EEB159C221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB3542E-4800-4DD0-B114-98F5DFB5B704" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD712DD-C731-45B4-84AF-5C21BE6299B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19379AEB-8F1C-43E8-8489-BFAAC63DBC71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F929DF34-D0FF-4A77-91A9-7ED45EA1F303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A314357F-9D15-4645-ABC5-5AA641C37B3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3667862-8469-4B33-9B2D-939EA07497E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:215:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B1743434-977D-458A-8BEA-132E6C41AD6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B65F9151-BFDB-40B2-9167-99CCC3E038A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F674AEE0-9AF8-4BA9-A6CF-BBDBCDEB696C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D193E214-8DE0-4334-95D5-512123C0D879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "805FF69D-E338-44AE-8B7A-75113272BFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23586F55-C82A-4B4C-892A-EDAEE9ECE93D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa2150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2169920C-C658-46EF-93A8-957F3306F11C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82ABE90C-B964-4EB3-AE2B-BB71D0D0F0CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "54F08AEB-AF90-4C8C-8691-5C2E800D9E66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "51F9A779-2DFF-46A8-BFC4-C6A2F3A9C624" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1E9B113-B1D6-4DC8-B1A0-7FD883EFF76B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "06FF6F86-28E4-45B6-871B-A5DDB331F3E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB70F81-3A5B-4839-8746-E60ABFA73F08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92DBF43F-06EB-4E92-80AC-B5A002B7B322" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A32638A-D67C-4A43-9C5A-24ED0C632F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21705.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21705.json index e0da285ea33..e2e3abff1bc 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21705.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.137", "lastModified": "2025-02-27T02:15:14.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21706.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21706.json index bb61a11115f..a242741b7de 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21706.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21706.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.237", "lastModified": "2025-02-27T02:15:14.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21708.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21708.json index d9832fb6354..2964eaaf970 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21708.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21708.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.447", "lastModified": "2025-02-27T02:15:14.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21709.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21709.json index 0406d977c41..5ddf8febc75 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21709.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21709.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.560", "lastModified": "2025-02-27T02:15:14.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21710.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21710.json index 464ad09a7df..a1223207746 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21710.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21710.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.657", "lastModified": "2025-02-27T02:15:14.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21714.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21714.json index 83329a14f1d..91b9477e7f2 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21714.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.050", "lastModified": "2025-02-27T19:15:49.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21715.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21715.json index efbbd71e2f3..682891ee448 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21715.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21715.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.167", "lastModified": "2025-02-27T18:15:28.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21717.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21717.json index 033a5488095..f07d964aad0 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21717.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21717.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.373", "lastModified": "2025-02-27T02:15:15.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21719.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21719.json index 25b74dcd13a..032704bfe53 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21719.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21719.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.580", "lastModified": "2025-02-27T02:15:15.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21720.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21720.json index 42f20e8fbc1..dee977c1425 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21720.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21720.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.683", "lastModified": "2025-02-27T02:15:15.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21721.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21721.json index 3884e7c9f63..70b9f629519 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21721.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21721.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.787", "lastModified": "2025-02-27T13:15:12.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21722.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21722.json index 914a5897710..f484051c7d7 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21722.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21722.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:15.883", "lastModified": "2025-02-27T19:15:49.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21724.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21724.json index b3caa8522c7..7bfb0efab3a 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21724.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21724.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.113", "lastModified": "2025-02-27T02:15:16.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21725.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21725.json index d78d0863753..dcc99f31ac0 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21725.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21725.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.220", "lastModified": "2025-02-27T02:15:16.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21726.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21726.json index 9d30bd59d6e..7d6c5609bea 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21726.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.323", "lastModified": "2025-02-27T18:15:28.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21727.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21727.json index 15de4ba6c41..ae11ce9e7db 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21727.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21727.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.423", "lastModified": "2025-02-27T18:15:28.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21728.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21728.json index bb4aa36a9ba..4c6f6c14445 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21728.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21728.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.530", "lastModified": "2025-02-27T02:15:16.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21729.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21729.json index 9354464b44b..7036e5549ad 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21729.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21729.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.637", "lastModified": "2025-02-27T19:15:49.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21730.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21730.json index 5c652b1c6de..b80c5c39be0 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21730.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.733", "lastModified": "2025-02-27T02:15:16.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21731.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21731.json index 4290f49fa99..eec9dc31160 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21731.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21731.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:16.833", "lastModified": "2025-02-27T18:15:28.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21732.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21732.json index 587db215ab6..de00bd52c5a 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21732.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21732.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:13.820", "lastModified": "2025-02-27T03:15:13.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21733.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21733.json index 5007b6b06a3..f17937d47e1 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21733.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21733.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:13.923", "lastModified": "2025-02-27T03:15:13.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21734.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21734.json index ec7c5d9e5b0..d16bae947f3 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21734.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21734.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:14.030", "lastModified": "2025-02-27T03:15:14.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21738.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21738.json index a80316731ee..4c71ef57b5d 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21738.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21738.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:14.427", "lastModified": "2025-02-27T03:15:14.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21739.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21739.json index b8336a83558..965a9c3bff9 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21739.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21739.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:14.530", "lastModified": "2025-02-27T19:15:50.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21746.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21746.json index a3b8ddec743..69867786aeb 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21746.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21746.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.243", "lastModified": "2025-02-27T13:15:12.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21747.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21747.json index a7d0e50e659..e9b6454176c 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21747.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21747.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.337", "lastModified": "2025-02-27T03:15:15.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json index f9eb36ac601..17b1e240c08 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21749.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.543", "lastModified": "2025-02-27T03:15:15.543", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,122 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: rose: bloquear el socket en rose_bind() syzbot inform\u00f3 un bloqueo suave en rose_loopback_timer(), con una reproducci\u00f3n que llama a bind() desde m\u00faltiples subprocesos. rose_bind() debe bloquear el socket para evitar este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "7CFA9ED9-656E-463E-A661-B2C4369D63EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.78", + "matchCriteriaId": "0C58261F-EDFB-4A12-8CCD-F12101482030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.14", + "matchCriteriaId": "033BB7EE-C9A2-45EA-BAC9-87BB9D951BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.3", + "matchCriteriaId": "0E92CEE3-1FC3-4AFC-A513-DEDBA7414F00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4c04b0ab3a647e76d0e752b013de8e404abafc63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/667f61b3498df751c8b3f0be1637e7226cbe3ed0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/970cd2ed26cdab2b0f15b6d90d7eaa36538244a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1300691aed9ee852b0a9192e29e2bdc2411a7e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0384efd45f615603e6869205b72040c209e69cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21750.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21750.json index b2c068831b1..71a6faaead1 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21750.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21750.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.647", "lastModified": "2025-02-27T03:15:15.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21751.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21751.json index a860b90f655..58497cc34f2 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21751.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.760", "lastModified": "2025-02-27T19:15:50.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21752.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21752.json index 73a9e9ec92b..8d2f58e764f 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21752.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21752.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.853", "lastModified": "2025-02-27T03:15:15.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21753.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21753.json index d3c61a1cb92..04bd49311c2 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21753.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21753.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:15.950", "lastModified": "2025-02-27T19:15:50.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21754.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21754.json index 529a54c7757..0fbf7f2f150 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21754.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21754.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.050", "lastModified": "2025-02-27T03:15:16.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json index 18c8d38a4e8..ecbbdeec7f7 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.250", "lastModified": "2025-02-27T19:15:50.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21757.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21757.json index 884805640a0..5f687645557 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21757.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21757.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.353", "lastModified": "2025-02-27T03:15:16.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21758.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21758.json index 7ca43adc842..ea005cc2a37 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21758.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21758.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.450", "lastModified": "2025-02-27T03:15:16.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21759.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21759.json index 946092a969e..8252ba76dbb 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21759.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21759.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.550", "lastModified": "2025-02-27T18:15:28.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21760.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21760.json index 1da5cfa4419..3b3fb7260b9 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21760.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21760.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.653", "lastModified": "2025-02-27T18:15:29.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21761.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21761.json index ea41e1a72d0..4624fb532d6 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21761.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21761.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.757", "lastModified": "2025-02-27T18:15:29.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21762.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21762.json index 39efb26108e..438c647f590 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21762.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21762.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.857", "lastModified": "2025-02-27T18:15:29.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21763.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21763.json index 1a68467bff5..7dcec1d915e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21763.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21763.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.960", "lastModified": "2025-02-27T18:15:29.673", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21764.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21764.json index 0d0bf7ccfb5..d4b9c331591 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21764.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21764.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.063", "lastModified": "2025-02-27T18:15:29.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21765.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21765.json index b7cb0f671fc..4f3f2e3e921 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21765.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21765.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.173", "lastModified": "2025-02-27T03:15:17.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21766.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21766.json index ebceadf77d3..8b6da9aed50 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21766.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21766.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.273", "lastModified": "2025-02-27T03:15:17.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21767.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21767.json index ea49d58ed7a..2bf976827e6 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21767.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21767.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.383", "lastModified": "2025-02-27T03:15:17.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21768.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21768.json index 89d67e33830..8fadbc07e3e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21768.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21768.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.480", "lastModified": "2025-02-27T03:15:17.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21771.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21771.json index 4392c5966f8..b2f8fa57720 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21771.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21771.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.767", "lastModified": "2025-02-27T03:15:17.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21772.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21772.json index 44d0191e4af..d13ccd36cca 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21772.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21772.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:17.867", "lastModified": "2025-02-27T03:15:17.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21777.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21777.json index 5b145ac15c2..ce11fffa862 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21777.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21777.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:18.377", "lastModified": "2025-02-27T03:15:18.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21778.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21778.json index 80520432f1c..0bd3675d709 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21778.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21778.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:18.533", "lastModified": "2025-02-27T03:15:18.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21779.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21779.json index 6c39d2e2373..65607a1e757 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21779.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21779.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:18.690", "lastModified": "2025-02-27T03:15:18.690", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,132 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Rechazar las hiperllamadas SEND_IPI de Hyper-V si la API local no est\u00e1 en el kernel Publicitar soporte para las hiperllamadas SEND_IPI y SEND_IPI_EX de Hyper-V si y solo si la API local es emulada/virtualizada por KVM, y rechazar expl\u00edcitamente dichas hiperllamadas si la API local es emulada en el espacio de usuario, es decir, no confiar en el espacio de usuario para optar por KVM_CAP_HYPERV_ENFORCE_CPUID. Rechazar SEND_IPI y SEND_IPI_EX corrige una desreferencia de puntero NULL si las iluminaciones de Hyper-V se exponen al invitado sin una APIC local en el n\u00facleo: dump_stack+0xbe/0xfd __kasan_report.cold+0x34/0x84 kasan_report+0x3a/0x50 __apic_accept_irq+0x3a/0x5c0 kvm_hv_send_ipi.isra.0+0x34e/0x820 kvm_hv_hypercall+0x8d9/0x9d0 kvm_emulate_hypercall+0x506/0x7e0 __vmx_handle_exit+0x283/0xb60 vmx_handle_exit+0x1d/0xd0 vcpu_enter_guest+0x16b0/0x24c0 vcpu_run+0xc0/0x550 kvm_arch_vcpu_ioctl_run+0x170/0x6d0 kvm_vcpu_ioctl+0x413/0xb20 __se_sys_ioctl+0x111/0x160 do_syscal1_64+0x30/0x40 entry_SYSCALL_64_after_hwframe+0x67/0xd1 Tenga en cuenta que comprobar la vCPU de env\u00edo es suficiente, ya que el irqchip_mode por VM no se puede modificar despu\u00e9s de crear las vCPU, es decir, si una vCPU tiene una APIC local en el n\u00facleo, entonces todas las vCPU tienen una APIC local en el n\u00facleo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "66824E11-1AC0-4B97-810E-0A96CEB5FA93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5393cf22312418262679eaadb130d608c75fe690", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/874ff13c73c45ecb38cb82191e8c1d523f0dc81b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a8de7f100bb5989d9c3627d3a223ee1c863f3b69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/aca8be4403fb90db7adaf63830e27ebe787a76e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ca29f58ca374c40a0e69c5306fc5c940a0069074", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json index 822d78bfd70..218a1d387c5 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21780.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:18.827", "lastModified": "2025-02-27T03:15:18.827", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evitar el desbordamiento de b\u00fafer adjunto en smu_sys_set_pp_table() Si un usuario malintencionado proporciona una pptable peque\u00f1a a trav\u00e9s de sysfs y luego una pptable m\u00e1s grande, puede provocar un ataque de desbordamiento de b\u00fafer en la funci\u00f3n smu_sys_set_pp_table()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "18BF0B0B-D95C-472C-A99F-DE209F253F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1abb2648698bf10783d2236a6b4a7ca5e8021699", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/231075c5a8ea54f34b7c4794687baa980814e6de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2498d2db1d35e88a2060ea191ae75dce853dd084", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/3484ea33157bc7334f57e64826ec5a4bf992151a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e43a8b9c4d700ffec819c5043a48769b3e7d9cab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21781.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21781.json index 3af92326664..a891e1927f9 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21781.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:18.947", "lastModified": "2025-02-27T03:15:18.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json index 0490e098009..8ce8648f57e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.050", "lastModified": "2025-02-27T03:15:19.050", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,121 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: orangefs: corregir un oob en orangefs_debug_write Recib\u00ed un informe de syzbot: slab-out-of-bounds Lectura en orangefs_debug_write... varias personas sugirieron soluciones, prob\u00e9 la sugerencia de Al Viro e hice este parche." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "18BF0B0B-D95C-472C-A99F-DE209F253F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c5244299241cf49d8ae7b5054e299cc8faa4e09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/1da2697307dad281dd690a19441b5ca4af92d786", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/2b84a231910cef2e0a16d29294afabfb69112087", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/897f496b946fdcfab5983c983e4b513ab6682364", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/f7c848431632598ff9bce57a659db6af60d75b39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json index e8b07c69919..91549a4ec3b 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21783.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.150", "lastModified": "2025-02-27T03:15:19.150", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpiolib: Se corrige el fallo en caso de error en gpiochip_get_ngpios(). Gpiochip_get_ngpios() utiliza macros chip_*() para imprimir mensajes. Sin embargo, estas macros dependen de que gpiodev se inicialice y configure, lo que no sucede cuando se llama a trav\u00e9s de bgpio_init(). En tal caso, la impresi\u00f3n de mensajes se bloquear\u00e1 en caso de desreferencia de puntero NULL. Reemplace las macros chip_*() por las respectivas dev_*() para evitar dicho bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B40677D4-05AD-42C9-A2E5-0F8B7459F03C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/189fb76215e479c10731baabb50f1a352d2078f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4d9b2b62e1136d10f661ec4c0c268140b6f74f4f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/7b4aebeecbbd5b5fe73e35fad3f62ed21aa7ef44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a7052afa9eae2239e25943baa8817a6a56e8aa68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21784.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21784.json index 7cf181f5dac..0dbef4ecb66 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21784.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21784.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.247", "lastModified": "2025-02-27T03:15:19.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json index baf9d438008..bf24ab2f8ea 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21785.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.350", "lastModified": "2025-02-27T03:15:19.350", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,132 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: cacheinfo: evitar escritura fuera de los l\u00edmites en la matriz cacheinfo El bucle que detecta/completa la informaci\u00f3n de cach\u00e9 ya tiene una comprobaci\u00f3n de los l\u00edmites en el tama\u00f1o de la matriz, pero no tiene en cuenta los niveles de cach\u00e9 con cach\u00e9 de datos/instrucciones independiente. Solucione esto incrementando el \u00edndice de cualquier hoja completada (en lugar de cualquier nivel completo)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "E70FC3CF-C125-4C00-A68C-245EA48FB580" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21786.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21786.json index 05be27054ad..79c782b81a5 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21786.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.450", "lastModified": "2025-02-27T19:15:50.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json index 6b501f79a70..1c31e9c0876 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.553", "lastModified": "2025-02-27T03:15:19.553", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,132 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: equipo: mejor validaci\u00f3n de TEAM_OPTION_TYPE_STRING syzbot inform\u00f3 lo siguiente: [1] Aseg\u00farese de que los datos proporcionados por el usuario contengan un byte nulo. [1] ERROR: KMSAN: valor no inicializado en string_nocheck lib/vsprintf.c:633 [en l\u00ednea] ERROR: KMSAN: valor no inicializado en string+0x3ec/0x5f0 lib/vsprintf.c:714 string_nocheck lib/vsprintf.c:633 [inline] string+0x3ec/0x5f0 lib/vsprintf.c:714 vsnprintf+0xa5d/0x1960 lib/vsprintf.c:2843 __request_module+0x252/0x9f0 kernel/module/kmod.c:149 team_mode_get drivers/net/team/team_core.c:480 [inline] team_change_mode drivers/net/team/team_core.c:607 [inline] team_mode_option_set+0x437/0x970 drivers/net/team/team_core.c:1401 team_option_set drivers/net/team/team_core.c:375 [inline] team_nl_options_set_doit+0x1339/0x1f90 drivers/net/team/team_core.c:2662 genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline] genl_rcv_msg+0x1214/0x12c0 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2543 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline] netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1348 netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1892 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:733 ____sys_sendmsg+0x877/0xb60 net/socket.c:2573 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2627 __sys_sendmsg net/socket.c:2659 [inline] __do_sys_sendmsg net/socket.c:2664 [inline] __se_sys_sendmsg net/socket.c:2662 [inline] __x64_sys_sendmsg+0x212/0x3c0 net/socket.c:2662 x64_sys_call+0x2ed6/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "E9C14B40-B889-4BBF-A766-22C54E3B7BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4236bf4716589558cc0f3c3612642b2c2141b04e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/4512482e4805dd30bc77dec511f2a2edba5cb868", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5bef3ac184b5626ea62385d6b82a1992b89d7940", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/8401cade1918281177974b32c925afdce750d292", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d071a91fa614ecdf760c29f61f6a7bfb7df796d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json index 20411387232..81ce09d4da6 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21788.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.663", "lastModified": "2025-02-27T03:15:19.663", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: ti: am65-cpsw: corrige la fuga de memoria en ciertos casos de XDP Si el programa XDP no da como resultado XDP_PASS, filtramos la memoria asignada por am65_cpsw_build_skb(). No tiene sentido asignar memoria SKB antes de ejecutar el programa XDP, ya que estar\u00edamos desperdiciando ciclos de CPU para casos distintos a XDP_PASS. Mueva la asignaci\u00f3n de SKB despu\u00e9s de evaluar el resultado del programa XDP. Esto corrige la fuga de memoria. Se observa una mejora en el rendimiento de la prueba XDP_DROP. Prueba XDP_DROP: Antes: 460256 rx/s 0 err/s Despu\u00e9s: 784130 rx/s 0 err/s" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "FB84018C-08CC-4578-B5A7-296AAE265678" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1bba1d042107167164a0ae3a843fdf650ab005d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5db843258de1e4e6b1ef1cbd1797923c9e3de548", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/dc11f049612b9d926aca2e55f8dc9d82850d0da3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json index 5d9a1a20f7e..18c1df69380 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21789.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.763", "lastModified": "2025-02-27T03:15:19.763", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: csum: Fix OoB access in IP checksum code for negative lengths (LoongArch: csum: corregir el acceso OoB en el c\u00f3digo de suma de comprobaci\u00f3n de IP para longitudes negativas). el commit 69e3a6aa6be2 (\"LoongArch: a\u00f1adir optimizaci\u00f3n de suma de comprobaci\u00f3n para sistemas de 64 bits\") provocar\u00eda un desplazamiento indefinido y una lectura fuera de los l\u00edmites. el commit 8bd795fedb84 (\"arm64: csum: corregir el acceso OoB en el c\u00f3digo de suma de comprobaci\u00f3n de IP para longitudes negativas\") corrige el mismo problema en ARM64." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "AF2C1DB1-DF96-4ED9-BEE9-807807D25645" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6287f1a8c16138c2ec750953e35039634018c84a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/964a8895704a22efc06a2a3276b624a5ae985a06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/9f15a8df542c0f08732a67d1a14ee7c22948fb97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/d6508ffff32b44b6d0de06704034e4eef1c307a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json index 37b7dc8efe3..72f49aacf3e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21790.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.870", "lastModified": "2025-02-27T03:15:19.870", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,132 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vxlan: comprobar el valor de retorno de vxlan_vnigroup_init() vxlan_init() debe comprobar el \u00e9xito de vxlan_vnigroup_init() de lo contrario se produce un bloqueo m\u00e1s tarde, detectado por syzbot. Oops: fallo de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc000000002c: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref en rango [0x000000000000160-0x0000000000000167] CPU: 0 UID: 0 PID: 7313 Comm: syz-executor147 No contaminado 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:vxlan_vnigroup_uninit+0x89/0x500 drivers/net/vxlan/vxlan_vnifilter.c:912 C\u00f3digo: 00 48 8b 44 24 08 4c 8b b0 98 41 00 00 49 8d 86 60 01 00 00 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 04 00 00 49 8b 86 60 01 00 00 48 ba 00 00 00 RSP: 0018:ffffc9000cc1eea8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff8672effb RDX: 000000000000002c RSI: ffffffff8672ecb9 RDI: ffff8880461b4f18 RBP: ffff8880461b4ef4 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000020000 R13: ffff8880461b0d80 R14: 0000000000000000 R15: dffffc0000000000 FS: 00007fecfa95d6c0(0000) GS:ffff88806a600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fecfa95cfb8 CR3: 000000004472c000 CR4: 0000000000352ef0 DR0: 00000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: vxlan_uninit+0x1ab/0x200 drivers/net/vxlan/vxlan_core.c:2942 unregister_netdevice_many_notify+0x12d6/0x1f30 net/core/dev.c:11824 unregister_netdevice_many net/core/dev.c:11866 [en l\u00ednea] unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11736 register_netdevice+0x1829/0x1eb0 net/core/dev.c:10901 __vxlan_dev_create+0x7c6/0xa30 drivers/net/vxlan/vxlan_core.c:3981 vxlan_newlink+0xd1/0x130 drivers/net/vxlan/vxlan_core.c:4407 rtnl_newlink_create net/core/rtnetlink.c:3795 [en l\u00ednea] __rtnl_newlink net/core/rtnetlink.c:3906 [en l\u00ednea]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "F97600FD-25BD-4A8A-A64D-C51ED328C14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3215f5aafc49aaa993991633833854694e73b439", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/5805402dcc56241987bca674a1b4da79a249bab7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/79aea5e55156c87dc570e43fcd8bba01b9d6ab3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/a303649b99b64858d62ce7428125d8e71675d2b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/e860f847787fbbf0d8dacd638c019c7c3d4a9bd3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21791.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21791.json index 185b17cdc04..53e928ca3f7 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21791.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:19.970", "lastModified": "2025-02-27T18:15:30.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json index fcae2e7d545..262aec919a4 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21792.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:20.080", "lastModified": "2025-02-27T03:15:20.080", - "vulnStatus": "Received", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,167 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt Si un dispositivo AX25 est\u00e1 enlazado a un socket configurando la opci\u00f3n de socket SO_BINDTODEVICE, se producir\u00e1 una p\u00e9rdida de refcount en ax25_release(). el commit 9fd75b66b8f6 (\"ax25: Fix refcount leaks caused by ax25_cb_del()\") a\u00f1adi\u00f3 una disminuci\u00f3n de los refcounts del dispositivo en ax25_release(). Para que funcione correctamente, los refcounts ya deben estar incrementados cuando el dispositivo est\u00e1 enlazado al socket. Un dispositivo AX25 puede estar enlazado a un socket llamando a ax25_bind() o configurando la opci\u00f3n de socket SO_BINDTODEVICE. En ambos casos, los refcounts deben incrementarse, pero de hecho solo se hace en ax25_bind(). Este error conduce al siguiente problema informado por Syzkaller: ================================================================= refcount_t: el decremento lleg\u00f3 a 0; p\u00e9rdida de memoria. ADVERTENCIA: CPU: 1 PID: 5932 en lib/refcount.c:31 refcount_warn_saturate+0x1ed/0x210 lib/refcount.c:31 M\u00f3dulos vinculados: CPU: 1 UID: 0 PID: 5932 Comm: syz-executor424 No contaminado 6.13.0-rc4-syzkaller-00110-g4099a71718b0 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:refcount_warn_saturate+0x1ed/0x210 lib/refcount.c:31 Seguimiento de llamadas: __refcount_dec include/linux/refcount.h:336 [en l\u00ednea] refcount_dec include/linux/refcount.h:351 [en l\u00ednea] ref_tracker_free+0x710/0x820 lib/ref_tracker.c:236 netdev_tracker_free include/linux/netdevice.h:4156 [en l\u00ednea] netdev_put include/linux/netdevice.h:4173 [en l\u00ednea] netdev_put include/linux/netdevice.h:4169 [en l\u00ednea] ax25_release+0x33f/0xa10 net/ax25/af_ax25.c:1069 __sock_release+0xb0/0x270 net/socket.c:640 sock_close+0x1c/0x30 net/socket.c:1408 ... do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... ================================================================== Corrija la implementaci\u00f3n de ax25_setsockopt() agregando un incremento de recuentos de referencias para el nuevo dispositivo vinculado y una disminuci\u00f3n de recuentos de referencias para el antiguo dispositivo no vinculado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.277", + "versionEndExcluding": "4.15", + "matchCriteriaId": "26F3B000-E328-48CE-9B1E-68E0DFD0A909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.240", + "versionEndExcluding": "4.20", + "matchCriteriaId": "36C10971-E218-4588-B691-A4A3534A3B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.190", + "versionEndExcluding": "5.5", + "matchCriteriaId": "38031C07-F0BC-442A-A08F-FB9B732F2CA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.112", + "versionEndExcluding": "5.11", + "matchCriteriaId": "E1C7F59E-6FCD-4163-9D36-1585FB5A71E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.35", + "versionEndExcluding": "5.16", + "matchCriteriaId": "5DFF4167-1962-4F68-81DD-C3D56FE88E76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17.2", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "EB2089C3-1FFD-4729-9C94-A45890155918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.79", + "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.16", + "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.4", + "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/470bda72fda0fcf54300466d70ce2de62f7835d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/90056ece99966182dc0e367f3fd2afab46ada847", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/94a0de224ed52eb2ecd4f4cb1b937b674c9fb955", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/b58f7ca86a7b8e480c06e30c5163c5d2f4e24023", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] }, { "url": "https://git.kernel.org/stable/c/bca0902e61731a75fc4860c8720168d9f1bae3b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21795.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21795.json index bd4481330a4..b0b171c0a31 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21795.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:20.390", "lastModified": "2025-02-27T03:15:20.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21796.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21796.json index ae30e1cb6e7..e0a062d2210 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21796.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:20.497", "lastModified": "2025-02-27T18:15:30.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21797.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21797.json index ce69f5bb5a5..20691d20774 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21797.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21797.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:20.607", "lastModified": "2025-02-27T19:15:50.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21799.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21799.json index 71cd8394a56..f4fa1297638 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21799.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21799.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.563", "lastModified": "2025-02-27T20:16:02.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21800.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21800.json index 485e03e017b..f3c7d5f11bf 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21800.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21800.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.660", "lastModified": "2025-02-27T20:16:02.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21801.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21801.json index 7c71c25c61c..06267561d7b 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21801.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21801.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.753", "lastModified": "2025-02-27T20:16:02.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21802.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21802.json index 06543605b6f..2f92ebb9398 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21802.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21802.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.847", "lastModified": "2025-02-27T20:16:02.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21803.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21803.json index e6375cf9da0..52d0fc94ec2 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21803.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21803.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:02.937", "lastModified": "2025-02-27T20:16:02.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21804.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21804.json index e08173773e5..f45c0924cbe 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21804.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21804.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.030", "lastModified": "2025-02-27T20:16:03.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21805.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21805.json index 22de45ba490..4385b999f76 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21805.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21805.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.127", "lastModified": "2025-02-27T20:16:03.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21806.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21806.json index b75eee248ff..b030bc7b484 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21806.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.220", "lastModified": "2025-02-27T20:16:03.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21807.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21807.json index a40ca377808..df35069a43d 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21807.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21807.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.317", "lastModified": "2025-02-27T20:16:03.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21808.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21808.json index caa9b8fbebd..9931754d9cb 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21808.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.410", "lastModified": "2025-02-27T20:16:03.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21810.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21810.json index 4d229f13a6d..8b6ac70a719 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21810.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.587", "lastModified": "2025-02-27T20:16:03.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21813.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21813.json index 777141cbe25..ea1d1c6d19f 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21813.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21813.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:03.883", "lastModified": "2025-02-27T20:16:03.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21815.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21815.json index d4b11b4fd58..0549e1d00c8 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21815.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.063", "lastModified": "2025-02-27T20:16:04.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21816.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21816.json index dca1d203f37..ce4df5d122a 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21816.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.150", "lastModified": "2025-02-27T20:16:04.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21817.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21817.json index 4ec910566b6..d3823c8a344 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21817.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21817.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.243", "lastModified": "2025-02-27T20:16:04.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21819.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21819.json index 87a157491dc..50b31248d04 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21819.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.430", "lastModified": "2025-02-27T20:16:04.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21821.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21821.json index 3f562091e39..73d31add5b3 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21821.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21821.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.613", "lastModified": "2025-02-27T20:16:04.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21822.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21822.json index 03ceaad586a..414b6f807f6 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21822.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21822.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.707", "lastModified": "2025-02-27T20:16:04.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21823.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21823.json index 5f169be4471..745e683c124 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21823.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21823.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T20:16:04.793", "lastModified": "2025-02-27T20:16:04.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json index 69a8f8de1f3..a3e97b81c70 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: reject mismatching sum of field_len with set key length\n\nThe field length description provides the length of each separated key\nfield in the concatenation, each field gets rounded up to 32-bits to\ncalculate the pipapo rule width from pipapo_init(). The set key length\nprovides the total size of the key aligned to 32-bits.\n\nRegister-based arithmetics still allows for combining mismatching set\nkey length and field length description, eg. set key length 10 and field\ndescription [ 5, 4 ] leading to pipapo width of 12." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: rechaza la suma no coincidente de field_len con la longitud de la clave establecida La descripci\u00f3n de la longitud del campo proporciona la longitud de cada campo de clave separado en la concatenaci\u00f3n, cada campo se redondea a 32 bits para calcular el ancho de la regla pipapo desde pipapo_init(). La longitud de la clave establecida proporciona el tama\u00f1o total de la clave alineada a 32 bits. La aritm\u00e9tica basada en registros a\u00fan permite combinar la longitud de la clave establecida y la descripci\u00f3n de la longitud del campo no coincidentes, p. ej., la longitud de la clave establecida 10 y la descripci\u00f3n del campo [ 5, 4 ], lo que lleva a un ancho de pipapo de 12." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json index 6b2d7fd0a8a..6559e855900 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface()\n\nThe documentation for usb_driver_claim_interface() says that \"the\ndevice lock\" is needed when the function is called from places other\nthan probe(). This appears to be the lock for the USB interface\ndevice. The Mediatek btusb code gets called via this path:\n\n Workqueue: hci0 hci_power_on [bluetooth]\n Call trace:\n usb_driver_claim_interface\n btusb_mtk_claim_iso_intf\n btusb_mtk_setup\n hci_dev_open_sync\n hci_power_on\n process_scheduled_works\n worker_thread\n kthread\n\nWith the above call trace the device lock hasn't been claimed. Claim\nit.\n\nWithout this fix, we'd sometimes see the error \"Failed to claim iso\ninterface\". Sometimes we'd even see worse errors, like a NULL pointer\ndereference (where `intf->dev.driver` was NULL) with a trace like:\n\n Call trace:\n usb_suspend_both\n usb_runtime_suspend\n __rpm_callback\n rpm_suspend\n pm_runtime_work\n process_scheduled_works\n\nBoth errors appear to be fixed with the proper locking." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface() The documentation for usb_driver_claim_interface() says that \"the device lock\" is needed when the function is called from places other than probe(). This appears to be the lock for the USB interface device. The Mediatek btusb code gets called via this path: Workqueue: hci0 hci_power_on [bluetooth] Call trace: usb_driver_claim_interface btusb_mtk_claim_iso_intf btusb_mtk_setup hci_dev_open_sync hci_power_on process_scheduled_works worker_thread kthread With the above call trace the device lock hasn't been claimed. Claim it. Without this fix, we'd sometimes see the error \"Failed to claim iso interface\". Sometimes we'd even see worse errors, like a NULL pointer dereference (where `intf->dev.driver` was NULL) with a trace like: Call trace: usb_suspend_both usb_runtime_suspend __rpm_callback rpm_suspend pm_runtime_work process_scheduled_works Ambos errores parecen solucionarse con el bloqueo adecuado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json index 3f8d9b622bc..18d45a187ab 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't flush non-uploaded STAs\n\nIf STA state is pre-moved to AUTHORIZED (such as in IBSS\nscenarios) and insertion fails, the station is freed.\nIn this case, the driver never knew about the station,\nso trying to flush it is unexpected and may crash.\n\nCheck if the sta was uploaded to the driver before and\nfix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: no vac\u00ede las STA no cargadas Si el estado de la STA se mueve previamente a AUTORIZADO (como en los escenarios de IBSS) y la inserci\u00f3n falla, la estaci\u00f3n se libera. En este caso, el controlador nunca supo de la estaci\u00f3n, por lo que intentar vaciarla es inesperado y puede bloquearse. Verifique si la estaci\u00f3n se carg\u00f3 al controlador antes y solucione este problema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json index 8773f566620..a4991c9552d 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\"\n\nThe Call Trace is as below:\n\"\n \n ? show_regs.cold+0x1a/0x1f\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? __warn+0x84/0xd0\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? report_bug+0x105/0x180\n ? handle_bug+0x46/0x80\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? __rxe_cleanup+0x124/0x170 [rdma_rxe]\n rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe]\n ib_destroy_qp_user+0x118/0x190 [ib_core]\n rdma_destroy_qp.cold+0x43/0x5e [rdma_cm]\n rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core]\n rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server]\n process_one_work+0x21d/0x3f0\n worker_thread+0x4a/0x3c0\n ? process_one_work+0x3f0/0x3f0\n kthread+0xf0/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30\n \n\"\nWhen too many rdma resources are allocated, rxe needs more time to\nhandle these rdma resources. Sometimes with the current timeout, rxe\ncan not release the rdma resources correctly.\n\nCompared with other rdma drivers, a bigger timeout is used." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/rxe: Se corrige la advertencia \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\" El seguimiento de llamadas es el siguiente: \" ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+0x84/0xd0 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? report_bug+0x105/0x180 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x19/0x70 ? asm_exc_invalid_op+0x1b/0x20 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __rxe_cleanup+0x124/0x170 [rdma_rxe] rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe] ib_destroy_qp_user+0x118/0x190 [ib_core] rdma_destroy_qp.cold+0x43/0x5e [rdma_cm] rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core] rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server] process_one_work+0x21d/0x3f0 worker_thread+0x4a/0x3c0 ? process_one_work+0x3f0/0x3f0 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 \"Cuando se asignan demasiados recursos rdma, rxe necesita m\u00e1s tiempo para gestionar estos recursos rdma. A veces, con el tiempo de espera actual, rxe no puede liberar los recursos rdma correctamente. En comparaci\u00f3n con otros controladores rdma, se utiliza un tiempo de espera mayor." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json index abd2b612bab..d3cb8661b21 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Handle weird files\n\nA corrupted filesystem (e.g. bcachefs) might return weird files.\nInstead of throwing a warning and allowing access to such file, treat\nthem as regular files." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: landlock: manejar archivos extra\u00f1os Un sistema de archivos da\u00f1ado (por ejemplo, bcachefs) podr\u00eda devolver archivos extra\u00f1os. En lugar de lanzar una advertencia y permitir el acceso a dichos archivos, tr\u00e1telos como archivos normales." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json index f9ee617fa89..411bf2d663b 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1\n\ncommit 9d26d3a8f1b0 (\"PCI: Put PCIe ports into D3 during suspend\") sets the\npolicy that all PCIe ports are allowed to use D3. When the system is\nsuspended if the port is not power manageable by the platform and won't be\nused for wakeup via a PME this sets up the policy for these ports to go\ninto D3hot.\n\nThis policy generally makes sense from an OSPM perspective but it leads to\nproblems with wakeup from suspend on the TUXEDO Sirius 16 Gen 1 with a\nspecific old BIOS. This manifests as a system hang.\n\nOn the affected Device + BIOS combination, add a quirk for the root port of\nthe problematic controller to ensure that these root ports are not put into\nD3hot at suspend.\n\nThis patch is based on\n\n https://lore.kernel.org/linux-pci/20230708214457.1229-2-mario.limonciello@amd.com\n\nbut with the added condition both in the documentation and in the code to\napply only to the TUXEDO Sirius 16 Gen 1 with a specific old BIOS and only\nthe affected root ports." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: evitar poner algunos puertos ra\u00edz en D3 en TUXEDO Sirius Gen1 commit 9d26d3a8f1b0 (\"PCI: poner puertos PCIe en D3 durante la suspensi\u00f3n\") establece la pol\u00edtica de que todos los puertos PCIe pueden usar D3. Cuando el sistema est\u00e1 suspendido, si la plataforma no puede administrar la energ\u00eda del puerto y no se usar\u00e1 para la activaci\u00f3n a trav\u00e9s de un PME, esto configura la pol\u00edtica para que estos puertos entren en D3hot. Esta pol\u00edtica generalmente tiene sentido desde una perspectiva OSPM, pero genera problemas con la activaci\u00f3n desde la suspensi\u00f3n en TUXEDO Sirius 16 Gen 1 con un BIOS antiguo espec\u00edfico. Esto se manifiesta como un bloqueo del sistema. En la combinaci\u00f3n de dispositivo + BIOS afectada, agregue una peculiaridad para el puerto ra\u00edz del controlador problem\u00e1tico para garantizar que estos puertos ra\u00edz no se coloquen en D3hot en la suspensi\u00f3n. Este parche est\u00e1 basado en https://lore.kernel.org/linux-pci/20230708214457.1229-2-mario.limonciello@amd.com pero con la condici\u00f3n adicional tanto en la documentaci\u00f3n como en el c\u00f3digo de aplicarse solo a TUXEDO Sirius 16 Gen 1 con un BIOS antiguo espec\u00edfico y solo los puertos ra\u00edz afectados." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json index 965a0ae64b9..bfc30bb30fa 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don't revert iter for -EIOCBQUEUED\n\nblkdev_read_iter() has a few odd checks, like gating the position and\ncount adjustment on whether or not the result is bigger-than-or-equal to\nzero (where bigger than makes more sense), and not checking the return\nvalue of blkdev_direct_IO() before doing an iov_iter_revert(). The\nlatter can lead to attempting to revert with a negative value, which\nwhen passed to iov_iter_revert() as an unsigned value will lead to\nthrowing a WARN_ON() because unroll is bigger than MAX_RW_COUNT.\n\nBe sane and don't revert for -EIOCBQUEUED, like what is done in other\nspots." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: no revertir iter para -EIOCBQUEUED blkdev_read_iter() tiene algunas comprobaciones extra\u00f1as, como bloquear el ajuste de posici\u00f3n y conteo en funci\u00f3n de si el resultado es o no mayor o igual a cero (donde mayor que tiene m\u00e1s sentido), y no verificar el valor de retorno de blkdev_direct_IO() antes de hacer un iov_iter_revert(). Esto \u00faltimo puede llevar a intentar revertir con un valor negativo, que cuando se pasa a iov_iter_revert() como un valor sin signo conducir\u00e1 a lanzar un WARN_ON() porque unroll es mayor que MAX_RW_COUNT. Sea sensato y no revierta para -EIOCBQUEUED, como lo que se hace en otros lugares." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json index cd8ada9a51e..f94edd6639e 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid use of NULL after WARN_ON_ONCE\n\nThere is a WARN_ON_ONCE to catch an unlikely situation when\ndomain_remove_dev_pasid can't find the `pasid`. In case it nevertheless\nhappens we must avoid using a NULL pointer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: evitar el uso de NULL despu\u00e9s de WARN_ON_ONCE Existe un WARN_ON_ONCE para detectar una situaci\u00f3n poco probable en la que domain_remove_dev_pasid no puede encontrar el `pasid`. En caso de que ocurra, debemos evitar el uso de un puntero NULL." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json index 6e2a7fa804b..c32c7c47d5f 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nseccomp: passthrough uretprobe systemcall without filtering\n\nWhen attaching uretprobes to processes running inside docker, the attached\nprocess is segfaulted when encountering the retprobe.\n\nThe reason is that now that uretprobe is a system call the default seccomp\nfilters in docker block it as they only allow a specific set of known\nsyscalls. This is true for other userspace applications which use seccomp\nto control their syscall surface.\n\nSince uretprobe is a \"kernel implementation detail\" system call which is\nnot used by userspace application code directly, it is impractical and\nthere's very little point in forcing all userspace applications to\nexplicitly allow it in order to avoid crashing tracked processes.\n\nPass this systemcall through seccomp without depending on configuration.\n\nNote: uretprobe is currently only x86_64 and isn't expected to ever be\nsupported in i386.\n\n[kees: minimized changes for easier backporting, tweaked commit log]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: seccomp: pasar a trav\u00e9s de la llamada al sistema uretprobe sin filtrar Al adjuntar uretprobes a procesos que se ejecutan dentro de docker, el proceso adjunto sufre un error de segmentaci\u00f3n al encontrar retprobe. La raz\u00f3n es que ahora que uretprobe es una llamada al sistema, los filtros seccomp predeterminados en docker lo bloquean ya que solo permiten un conjunto espec\u00edfico de llamadas al sistema conocidas. Esto es cierto para otras aplicaciones de espacio de usuario que usan seccomp para controlar su superficie de llamada al sistema. Dado que uretprobe es una llamada al sistema de \"detalle de implementaci\u00f3n del kernel\" que no es utilizada directamente por el c\u00f3digo de la aplicaci\u00f3n de espacio de usuario, no es pr\u00e1ctica y no tiene mucho sentido forzar a todas las aplicaciones de espacio de usuario a permitirla expl\u00edcitamente para evitar que se bloqueen los procesos rastreados. Pase esta llamada al sistema a trav\u00e9s de seccomp sin depender de la configuraci\u00f3n. Nota: uretprobe actualmente solo es x86_64 y no se espera que sea compatible con i386. [kees: se minimizaron los cambios para facilitar la adaptaci\u00f3n, se modific\u00f3 el registro de confirmaciones]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21835.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21835.json index f76b6d269a1..fd8d18cf190 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21835.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21835.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_midi: fix MIDI Streaming descriptor lengths\n\nWhile the MIDI jacks are configured correctly, and the MIDIStreaming\nendpoint descriptors are filled with the correct information,\nbNumEmbMIDIJack and bLength are set incorrectly in these descriptors.\n\nThis does not matter when the numbers of in and out ports are equal, but\nwhen they differ the host will receive broken descriptors with\nuninitialized stack memory leaking into the descriptor for whichever\nvalue is smaller.\n\nThe precise meaning of \"in\" and \"out\" in the port counts is not clearly\ndefined and can be confusing. But elsewhere the driver consistently\nuses this to match the USB meaning of IN and OUT viewed from the host,\nso that \"in\" ports send data to the host and \"out\" ports receive data\nfrom it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths Mientras que los conectores MIDI est\u00e1n configurados correctamente, y los descriptores de endpoint MIDIStreaming est\u00e1n llenos con la informaci\u00f3n correcta, bNumEmbMIDIJack y bLength est\u00e1n configurados incorrectamente en estos descriptores. Esto no importa cuando los n\u00fameros de puertos de entrada y salida son iguales, pero cuando difieren, el host recibir\u00e1 descriptores rotos con memoria de pila no inicializada que se filtra en el descriptor para el valor que sea menor. El significado preciso de \"entrada\" y \"salida\" en los recuentos de puertos no est\u00e1 claramente definido y puede ser confuso. Pero en otros lugares, el controlador usa esto constantemente para que coincida con el significado USB de IN y OUT visto desde el host, de modo que los puertos \"de entrada\" env\u00edan datos al host y los puertos \"de salida\" reciben datos de \u00e9l." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21836.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21836.json index 851a22adaeb..908643af563 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21836.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21836.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: reallocate buf lists on upgrade\n\nIORING_REGISTER_PBUF_RING can reuse an old struct io_buffer_list if it\nwas created for legacy selected buffer and has been emptied. It violates\nthe requirement that most of the field should stay stable after publish.\nAlways reallocate it instead." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/kbuf: reasignar listas de b\u00faferes en la actualizaci\u00f3n IORING_REGISTER_PBUF_RING puede reutilizar una estructura io_buffer_list antigua si se cre\u00f3 para un b\u00fafer seleccionado heredado y se vaci\u00f3. Viola el requisito de que la mayor parte del campo debe permanecer estable despu\u00e9s de la publicaci\u00f3n. Siempre reasignarlo en su lugar." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21837.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21837.json index 08835d3f41f..27decfe7d08 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21837.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21837.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/uring_cmd: unconditionally copy SQEs at prep time\n\nThis isn't generally necessary, but conditions have been observed where\nSQE data is accessed from the original SQE after prep has been done and\noutside of the initial issue. Opcode prep handlers must ensure that any\nSQE related data is stable beyond the prep phase, but uring_cmd is a bit\nspecial in how it handles the SQE which makes it susceptible to reading\nstale data. If the application has reused the SQE before the original\ncompletes, then that can lead to data corruption.\n\nDown the line we can relax this again once uring_cmd has been sanitized\na bit, and avoid unnecessarily copying the SQE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/uring_cmd: copiar SQE incondicionalmente en el momento de la preparaci\u00f3n Esto no suele ser necesario, pero se han observado condiciones en las que se accede a los datos de SQE desde el SQE original despu\u00e9s de que se haya realizado la preparaci\u00f3n y fuera del problema inicial. Los controladores de preparaci\u00f3n del c\u00f3digo de operaci\u00f3n deben garantizar que todos los datos relacionados con SQE sean estables m\u00e1s all\u00e1 de la fase de preparaci\u00f3n, pero uring_cmd es un poco especial en la forma en que gestiona el SQE, lo que lo hace susceptible a leer datos obsoletos. Si la aplicaci\u00f3n ha reutilizado el SQE antes de que se complete el original, eso puede provocar la corrupci\u00f3n de los datos. M\u00e1s adelante podemos relajar esto nuevamente una vez que uring_cmd se haya depurado un poco y evitar copiar innecesariamente el SQE." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21839.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21839.json index af053525987..4bd97749137 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21839.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21839.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop\n\nMove the conditional loading of hardware DR6 with the guest's DR6 value\nout of the core .vcpu_run() loop to fix a bug where KVM can load hardware\nwith a stale vcpu->arch.dr6.\n\nWhen the guest accesses a DR and host userspace isn't debugging the guest,\nKVM disables DR interception and loads the guest's values into hardware on\nVM-Enter and saves them on VM-Exit. This allows the guest to access DRs\nat will, e.g. so that a sequence of DR accesses to configure a breakpoint\nonly generates one VM-Exit.\n\nFor DR0-DR3, the logic/behavior is identical between VMX and SVM, and also\nidentical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)\nand KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading\nDR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.\n\nBut for DR6, the guest's value doesn't need to be loaded into hardware for\nKVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas\nVMX requires software to manually load the guest value, and so loading the\nguest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done\n_inside_ the core run loop.\n\nUnfortunately, saving the guest values on VM-Exit is initiated by common\nx86, again outside of the core run loop. If the guest modifies DR6 (in\nhardware, when DR interception is disabled), and then the next VM-Exit is\na fastpath VM-Exit, KVM will reload hardware DR6 with vcpu->arch.dr6 and\nclobber the guest's actual value.\n\nThe bug shows up primarily with nested VMX because KVM handles the VMX\npreemption timer in the fastpath, and the window between hardware DR6\nbeing modified (in guest context) and DR6 being read by guest software is\norders of magnitude larger in a nested setup. E.g. in non-nested, the\nVMX preemption timer would need to fire precisely between #DB injection\nand the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the\nwindow where hardware DR6 is \"dirty\" extends all the way from L1 writing\nDR6 to VMRESUME (in L1).\n\n L1's view:\n ==========\n \n CPU 0/KVM-7289 [023] d.... 2925.640961: kvm_entry: vcpu 0\n A: L1 Writes DR6\n CPU 0/KVM-7289 [023] d.... 2925.640963: : Set DRs, DR6 = 0xffff0ff1\n\n B: CPU 0/KVM-7289 [023] d.... 2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec\n\n D: L1 reads DR6, arch.dr6 = 0\n CPU 0/KVM-7289 [023] d.... 2925.640969: : Sync DRs, DR6 = 0xffff0ff0\n\n CPU 0/KVM-7289 [023] d.... 2925.640976: kvm_entry: vcpu 0\n L2 reads DR6, L1 disables DR interception\n CPU 0/KVM-7289 [023] d.... 2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216\n CPU 0/KVM-7289 [023] d.... 2925.640983: kvm_entry: vcpu 0\n\n CPU 0/KVM-7289 [023] d.... 2925.640983: : Set DRs, DR6 = 0xffff0ff0\n\n L2 detects failure\n CPU 0/KVM-7289 [023] d.... 2925.640987: kvm_exit: vcpu 0 reason HLT\n L1 reads DR6 (confirms failure)\n CPU 0/KVM-7289 [023] d.... 2925.640990: : Sync DRs, DR6 = 0xffff0ff0\n\n L0's view:\n ==========\n L2 reads DR6, arch.dr6 = 0\n CPU 23/KVM-5046 [001] d.... 3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n CPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n\n L2 => L1 nested VM-Exit\n CPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216\n\n CPU 23/KVM-5046 [001] d.... 3410.005610: kvm_entry: vcpu 23\n CPU 23/KVM-5046 [001] d.... 3410.005611: kvm_exit: vcpu 23 reason VMREAD\n CPU 23/KVM-5046 [001] d.... 3410.005611: kvm_entry: vcpu 23\n CPU 23/KVM-5046 [001] d.... 3410.\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Cargar DR6 con valor de invitado solo antes de ingresar al bucle .vcpu_run() Mueva la carga condicional de DR6 de hardware con el valor DR6 del invitado fuera del bucle .vcpu_run() del n\u00facleo para corregir un error en el que KVM puede cargar hardware con un vcpu->arch.dr6 obsoleto. Cuando el invitado accede a un DR y el espacio de usuario del host no est\u00e1 depurando el invitado, KVM deshabilita la intercepci\u00f3n de DR y carga los valores del invitado en el hardware en VM-Enter y los guarda en VM-Exit. Esto permite que el invitado acceda a los DR a voluntad, por ejemplo, para que una secuencia de accesos a DR para configurar un punto de interrupci\u00f3n solo genere una VM-Exit. Para DR0-DR3, la l\u00f3gica/comportamiento es id\u00e9ntico entre VMX y SVM, y tambi\u00e9n id\u00e9ntico entre KVM_DEBUGREG_BP_ENABLED (depuraci\u00f3n del invitado en el espacio de usuario) y KVM_DEBUGREG_WONT_EXIT (invitado que utiliza DR), y por lo tanto KVM gestiona la carga de DR0-DR3 en c\u00f3digo com\u00fan, _fuera_ del bucle kvm_x86_ops.vcpu_run() central. Pero para DR6, el valor del invitado no necesita cargarse en el hardware para KVM_DEBUGREG_BP_ENABLED, y SVM proporciona un campo VMCB dedicado, mientras que VMX requiere software para cargar manualmente el valor del invitado, y por lo tanto, la carga del valor del invitado en DR6 es gestionada por {svm,vmx}_vcpu_run(), es decir, se realiza _dentro_ del bucle de ejecuci\u00f3n central. Desafortunadamente, guardar los valores del invitado en VM-Exit lo inicia el x86 com\u00fan, nuevamente fuera del bucle de ejecuci\u00f3n central. Si el invitado modifica DR6 (en hardware, cuando la intercepci\u00f3n de DR est\u00e1 deshabilitada), y luego la siguiente salida de VM es una salida de VM de ruta r\u00e1pida, KVM volver\u00e1 a cargar el DR6 de hardware con vcpu->arch.dr6 y destruir\u00e1 el valor real del invitado. El error aparece principalmente con VMX anidado porque KVM maneja el temporizador de preempci\u00f3n de VMX en la ruta r\u00e1pida, y la ventana entre la modificaci\u00f3n del DR6 de hardware (en el contexto del invitado) y la lectura del DR6 por parte del software del invitado es \u00f3rdenes de magnitud m\u00e1s grande en una configuraci\u00f3n anidada. Por ejemplo, en una configuraci\u00f3n no anidada, el temporizador de preempci\u00f3n de VMX deber\u00eda activarse precisamente entre la inyecci\u00f3n de #DB y la lectura de DR6 por parte del controlador #DB, mientras que con una configuraci\u00f3n KVM sobre KVM, la ventana donde el DR6 de hardware est\u00e1 \"sucio\" se extiende desde L1 escribiendo DR6 a VMRESUME (en L1). Vista de L1: ========== CPU 0/KVM-7289 [023] d.... 2925.640961: kvm_entry: vcpu 0 A: L1 escribe DR6 CPU 0/KVM-7289 [023] d.... 2925.640963: : Establecer DR, DR6 = 0xffff0ff1 B: CPU 0/KVM-7289 [023] d.... 2925.640967: kvm_exit: vcpu 0 motivo EXTERNAL_INTERRUPT intr_info 0x800000ec D: L1 lee DR6, arch.dr6 = 0 CPU 0/KVM-7289 [023] d.... 2925.640969: : Sincronizar DR, DR6 = 0xffff0ff0 CPU 0/KVM-7289 [023] d.... 2925.640976: kvm_entry: vcpu 0 L2 lee DR6, L1 deshabilita la intercepci\u00f3n de DR CPU 0/KVM-7289 [023] d.... 2925.640980: kvm_exit: vcpu 0 motivo DR_ACCESS info1 0x0000000000000216 CPU 0/KVM-7289 [023] d.... 2925.640983: kvm_entry: vcpu 0 CPU 0/KVM-7289 [023] d.... 2925.640983: : Establecer DRs, DR6 = 0xffff0ff0 L2 detecta falla CPU 0/KVM-7289 [023] d.... 2925.640987: kvm_exit: vcpu 0 motivo HLT L1 lee DR6 (confirma falla) CPU 0/KVM-7289 [023] d.... 2925.640990: : Sincronizar DRs, DR6 = 0xffff0ff0 Vista de L0: ========== L2 lee DR6, arch.dr6 = 0 CPU 23/KVM-5046 [001] d.... 3410.005610: kvm_exit: vcpu 23 motivo DR_ACCESS info1 0x0000000000000216 CPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit: vcpu 23 motivo DR_ACCESS info1 0x0000000000000216 L2 => L1 anidada VM-Salir CPU 23/KVM-5046 [001] ..... 3410.005610: kvm_nested_vmexit_inject: motivo: DR_ACCESS ext_inf1: 0x000000000000216 CPU 23/KVM-5046 [001] d.... 3410.005610: kvm_entry: vcpu 23 CPU 23/KVM-5046 [001] d.... 3410.005611: ---truncado---" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21840.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21840.json index 44a70f23edf..3ff2ad27eb3 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21840.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21840.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/netlink: Prevent userspace segmentation fault by adjusting UAPI header\n\nThe intel-lpmd tool [1], which uses the THERMAL_GENL_ATTR_CPU_CAPABILITY\nattribute to receive HFI events from kernel space, encounters a\nsegmentation fault after commit 1773572863c4 (\"thermal: netlink: Add the\ncommands and the events for the thresholds\").\n\nThe issue arises because the THERMAL_GENL_ATTR_CPU_CAPABILITY raw value\nwas changed while intel_lpmd still uses the old value.\n\nAlthough intel_lpmd can be updated to check the THERMAL_GENL_VERSION and\nuse the appropriate THERMAL_GENL_ATTR_CPU_CAPABILITY value, the commit\nitself is questionable.\n\nThe commit introduced a new element in the middle of enum thermal_genl_attr,\nwhich affects many existing attributes and introduces potential risks\nand unnecessary maintenance burdens for userspace thermal netlink event\nusers.\n\nSolve the issue by moving the newly introduced\nTHERMAL_GENL_ATTR_TZ_PREV_TEMP attribute to the end of the\nenum thermal_genl_attr. This ensures that all existing thermal generic\nnetlink attributes remain unaffected.\n\n[ rjw: Subject edits ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: thermal/netlink: Prevenir un error de segmentaci\u00f3n del espacio de usuario ajustando el encabezado UAPI La herramienta intel-lpmd [1], que utiliza el atributo THERMAL_GENL_ATTR_CPU_CAPABILITY para recibir eventos HFI desde el espacio del kernel, encuentra un error de segmentaci\u00f3n despu\u00e9s de el commit 1773572863c4 (\"thermal: netlink: Agregar los comandos y los eventos para los umbrales\"). El problema surge porque se cambi\u00f3 el valor sin procesar de THERMAL_GENL_ATTR_CPU_CAPABILITY mientras que intel_lpmd todav\u00eda usa el valor anterior. Aunque intel_lpmd se puede actualizar para verificar THERMAL_GENL_VERSION y usar el valor THERMAL_GENL_ATTR_CPU_CAPABILITY apropiado, el commit en s\u00ed es cuestionable. El commit introdujo un nuevo elemento en el medio de la enumeraci\u00f3n thermal_genl_attr, que afecta a muchos atributos existentes e introduce riesgos potenciales y cargas de mantenimiento innecesarias para los usuarios del evento de enlace de red t\u00e9rmico del espacio de usuario. Resuelva el problema moviendo el atributo THERMAL_GENL_ATTR_TZ_PREV_TEMP recientemente introducido al final de la enumeraci\u00f3n thermal_genl_attr. Esto garantiza que todos los atributos de enlace de red gen\u00e9ricos t\u00e9rmicos existentes permanezcan inalterados. [ rjw: Ediciones del sujeto ]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21841.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21841.json index 7738092b9fc..f4a71ade91e 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21841.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21841.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq/amd-pstate: Fix cpufreq_policy ref counting\n\namd_pstate_update_limits() takes a cpufreq_policy reference but doesn't\ndecrement the refcount in one of the exit paths, fix that." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq/amd-pstate: Se corrige el recuento de referencias de cpufreq_policy. amd_pstate_update_limits() toma una referencia cpufreq_policy pero no disminuye el recuento de referencias en una de las rutas de salida. Corrija eso." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21842.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21842.json index 15945625659..5e9b8cfc74c 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21842.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21842.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: properly free gang_ctx_bo when failed to init user queue\n\nThe destructor of a gtt bo is declared as\nvoid amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);\nWhich takes void** as the second parameter.\n\nGCC allows passing void* to the function because void* can be implicitly\ncasted to any other types, so it can pass compiling.\n\nHowever, passing this void* parameter into the function's\nexecution process(which expects void** and dereferencing void**)\nwill result in errors." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: amdkfd: libera correctamente gang_ctx_bo cuando no se puede inicializar la cola de usuarios El destructor de un bo gtt se declara como void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); que toma void** como segundo par\u00e1metro. GCC permite pasar void* a la funci\u00f3n porque void* se puede convertir impl\u00edcitamente a cualquier otro tipo, por lo que puede pasar la compilaci\u00f3n. Sin embargo, pasar este par\u00e1metro void* al proceso de ejecuci\u00f3n de la funci\u00f3n (que espera void** y desreferenciar void**) dar\u00e1 como resultado errores." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21843.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21843.json index 9860f1a4876..6ef1a5f5947 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21843.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21843.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: avoid garbage value in panthor_ioctl_dev_query()\n\n'priorities_info' is uninitialized, and the uninitialized value is copied\nto user object when calling PANTHOR_UOBJ_SET(). Using memset to initialize\n'priorities_info' to avoid this garbage value problem." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/panthor: evitar que el valor basura en panthor_ioctl_dev_query() 'priorities_info' no est\u00e9 inicializado y que el valor no inicializado se copie al objeto de usuario al llamar a PANTHOR_UOBJ_SET(). Se utiliza memset para inicializar 'priorities_info' para evitar este problema de valor basura." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22211.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22211.json index 8d34319454a..f3ba350e535 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22211.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-02-25T22:15:15.200", "lastModified": "2025-03-03T16:15:39.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json index cf5a7ce1aa0..bf7f76bac48 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22212.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el componente ConvertForms versiones 1.0.0-1.0.0 - 4.4.9 para Joomla permite a atacantes autenticados (administrador) ejecutar comandos SQL arbitrarios en el \u00e1rea de administraci\u00f3n de env\u00edos en el backend." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json index 6faae8bf7d0..4296942a072 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22224.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.687", "lastModified": "2025-03-05T02:00:02.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host." + }, + { + "lang": "es", + "value": "VMware ESXi y Workstation contienen una vulnerabilidad TOCTOU (Time-of-Check Time-of-Use) que provoca una escritura fuera de los l\u00edmites. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, @@ -40,6 +64,16 @@ "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +85,317 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", + "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", + "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", + "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", + "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", + "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", + "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", + "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", + "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", + "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", + "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", + "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", + "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", + "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", + "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", + "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", + "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*", + "matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*", + "matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*", + "matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", + "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", + "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", + "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", + "matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*", + "matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6.3", + "matchCriteriaId": "3124246D-3287-4657-B40D-E7B80A44E7D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json index 72459b41090..c328df30796 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.840", "lastModified": "2025-03-05T02:00:02.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi contains an arbitrary write\u00a0vulnerability.\u00a0A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox." + }, + { + "lang": "es", + "value": "VMware ESXi contiene una vulnerabilidad de escritura arbitraria. Un actor malintencionado con privilegios dentro del proceso VMX puede activar una escritura arbitraria en el kernel que provoque un escape del entorno aislado." } ], "metrics": { @@ -40,6 +44,16 @@ "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware ESXi Arbitrary Write Vulnerability", "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +65,310 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", + "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", + "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", + "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", + "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", + "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", + "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", + "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", + "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", + "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", + "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", + "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", + "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", + "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", + "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", + "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", + "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*", + "matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*", + "matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*", + "matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", + "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", + "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", + "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", + "matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*", + "matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json index 95556eced65..8ada3abbc22 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22226.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@vmware.com", "published": "2025-03-04T12:15:33.973", "lastModified": "2025-03-05T02:00:02.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain\u00a0an information disclosure vulnerability due to an out-of-bounds read in HGFS.\u00a0A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process." + }, + { + "lang": "es", + "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a una lectura fuera de los l\u00edmites en HGFS. Un actor malintencionado con privilegios administrativos en una m\u00e1quina virtual podr\u00eda aprovechar este problema para filtrar memoria del proceso vmx." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 } ] }, @@ -40,6 +64,16 @@ "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +85,324 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", + "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", + "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", + "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", + "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", + "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", + "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", + "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", + "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", + "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", + "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", + "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", + "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", + "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", + "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", + "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", + "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*", + "matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*", + "matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*", + "matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", + "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", + "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", + "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", + "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", + "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", + "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", + "matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", + "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", + "matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*", + "matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*", + "matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*", + "matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*", + "matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.6.3", + "matchCriteriaId": "0F76F8A7-6184-4A39-9FA5-2337CC9D4CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6.3", + "matchCriteriaId": "3124246D-3287-4657-B40D-E7B80A44E7D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22280.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22280.json index c671b3db3a5..f6720767e3b 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22280.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-27T14:15:36.033", "lastModified": "2025-02-27T14:15:36.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22443.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22443.json index a1315804423..ded40336df6 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22443.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22443.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22443", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.097", - "lastModified": "2025-03-04T04:15:14.097", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22447.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22447.json index f346ac27c35..88ee28b729c 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22447.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22447.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect access permission of a specific service issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege." + }, + { + "lang": "es", + "value": "Existe un problema de permiso de acceso incorrecto a un servicio espec\u00edfico en versiones de RemoteView Agent (para Windows) anteriores a v8.1.5.2. Si se aprovecha esta vulnerabilidad, un usuario no administrativo en la PC remota puede ejecutar un comando arbitrario del sistema operativo con privilegios de LocalSystem." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22491.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22491.json index 0be919913e6..5681945eda0 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22491.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "CybersecurityCOE@eaton.com", "published": "2025-02-28T09:15:12.540", "lastModified": "2025-02-28T09:15:12.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The user input was not sanitized on Reporting Hierarchy Management page of Foreseer Reporting Software (FRS) application which could lead into execution of arbitrary JavaScript in a browser context\nfor all the interacting users. This security issue has been patched in the latest version 1.5.100 of the FRS." + }, + { + "lang": "es", + "value": "La entrada del usuario no se limpi\u00f3 en la p\u00e1gina de administraci\u00f3n de jerarqu\u00eda de informes de la aplicaci\u00f3n Foreseer Reporting Software (FRS), lo que podr\u00eda provocar la ejecuci\u00f3n de JavaScript arbitrario en un contexto de navegador para todos los usuarios que interactuaban. Este problema de seguridad se ha corregido en la \u00faltima versi\u00f3n 1.5.100 de FRS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22492.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22492.json index da00f5ab3e4..afa6b484539 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22492.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22492.json @@ -3,12 +3,16 @@ "sourceIdentifier": "CybersecurityCOE@eaton.com", "published": "2025-02-28T09:15:12.680", "lastModified": "2025-02-28T09:15:12.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The connection string visible to users with access to FRSCore database on Foreseer Reporting Software (FRS) VM, this\nstring can be used for gaining administrative access to the 4crXref database. This vulnerability has been resolved in the latest version 1.5.100 of FRS." + }, + { + "lang": "es", + "value": "La cadena de conexi\u00f3n visible para los usuarios con acceso a la base de datos FRSCore en la m\u00e1quina virtual Foreseer Reporting Software (FRS) se puede utilizar para obtener acceso administrativo a la base de datos 4crXref. Esta vulnerabilidad se ha resuelto en la \u00faltima versi\u00f3n 1.5.100 de FRS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22493.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22493.json index 1177c4fb345..a88d4917188 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22493.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22493.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Secure flag not set and SameSIte was set to Lax in the Foreseer Reporting Software (FRS). Absence of this secure flag could lead into the session cookie being transmitted over unencrypted HTTP connections. This security issue has been resolved in the latest version of FRS v1.5.100." + }, + { + "lang": "es", + "value": "No se ha establecido el indicador de seguridad y SameSIte se ha establecido en Lax en el software de informes Foreseer (FRS). La ausencia de este indicador de seguridad podr\u00eda provocar que la cookie de sesi\u00f3n se transmita a trav\u00e9s de conexiones HTTP no cifradas. Este problema de seguridad se ha resuelto en la \u00faltima versi\u00f3n de FRS v1.5.100." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22623.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22623.json index ab0b4285093..d642f191b63 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22623.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22623.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Ad Inserter - Ad Manager and AdSense Ads 2.8.0 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/includes/dst/dst.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Ad Inserter - Ad Manager y AdSense Ads 2.8.0 eran vulnerables. La aplicaci\u00f3n web genera contenido web de forma din\u00e1mica sin validar la fuente de los datos potencialmente no confiables en myapp/includes/dst/dst.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22624.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22624.json index 9e17cb7da63..816cf7a3d69 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22624.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2025-02-27T19:15:50.940", "lastModified": "2025-02-27T19:15:50.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22835.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22835.json index 253e2c13942..d5cc94c2e3b 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22835.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22835.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22835", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:14.250", - "lastModified": "2025-03-04T04:15:14.250", - "vulnStatus": "Received", + "lastModified": "2025-03-04T17:22:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -47,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "6B5AAC0F-329C-4C58-AEFB-D46487A45037" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json index c486a6b589f..40fefd95c63 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22837.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through NULL pointer dereference." + }, + { + "lang": "es", + "value": "Un atacante local podr\u00eda provocar una denegaci\u00f3n de servicio en OpenHarmony v5.0.2 y anteriores desreferenciando un puntero nulo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json index 38b75ecb090..95114bca40a 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22841.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json index 2b3876dae8d..2cf29c32b4f 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22847.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "Las versiones OpenHarmony v5.0.2 y anteriores permiten a un atacante local provocar una denegaci\u00f3n de servicio a trav\u00e9s de una lectura fuera de l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json index 68d5b52f07c..d3aa599b09c 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22868.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@golang.org", "published": "2025-02-26T08:14:24.897", "lastModified": "2025-02-26T15:15:24.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json index 2d02e40826b..b5676ace589 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22869.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@golang.org", "published": "2025-02-26T08:14:24.997", "lastModified": "2025-02-26T15:15:25.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22881.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22881.json index 43a6f8789c0..2b3c645131e 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22881.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22881.json @@ -3,7 +3,7 @@ "sourceIdentifier": "759f5e80-c8e1-4224-bead-956d7b33c98b", "published": "2025-02-26T08:14:25.137", "lastModified": "2025-02-26T08:14:25.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json index 2cd8f035666..c45a52b0d8d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22897.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de b\u00fafer." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22952.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22952.json index 73318ef36b7..f12ccde702c 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22952.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T20:16:04.983", "lastModified": "2025-03-03T16:15:40.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23115.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23115.json index 61e03a4b5a1..3174ded3e32 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23115.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23115.json @@ -3,12 +3,16 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-03-01T03:15:23.263", "lastModified": "2025-03-01T03:15:23.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Use After Free vulnerability on UniFi Protect Cameras could allow a Remote Code Execution (RCE) by a malicious actor with access to UniFi Protect Cameras management network." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Use After Free en las c\u00e1maras UniFi Protect podr\u00eda permitir una ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de un actor malicioso con acceso a la red de administraci\u00f3n de las c\u00e1maras UniFi Protect." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json index 4141fc38abb..abc76f439b0 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-28T03:15:10.807", "lastModified": "2025-02-28T03:15:10.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD could allow an authenticated user to cause a denial of service due to the improper handling of invalid headers sent to the queue." + }, + { + "lang": "es", + "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD podr\u00edan permitir que un usuario autenticado provoque una denegaci\u00f3n de servicio debido a la gesti\u00f3n inadecuada de encabezados no v\u00e1lidos enviados a la cola." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json index eb20e6a3dfe..9c58e838bfe 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23234.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite que un atacante local provoque DOS a trav\u00e9s de un desbordamiento de b\u00fafer." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json index dcd770ec0c9..d806b73ee5e 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23240.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "OpenHarmony v5.0.2 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n arbitraria de c\u00f3digo en aplicaciones preinstaladas a trav\u00e9s de una escritura fuera de l\u00edmites. Esta vulnerabilidad s\u00f3lo puede ser explotada en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json index 895cec9aafe..c9c98128415 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23368.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en la integraci\u00f3n de Wildfly Elytron. El componente no implementa medidas suficientes para evitar m\u00faltiples intentos fallidos de autenticaci\u00f3n en un corto per\u00edodo de tiempo, lo que lo hace m\u00e1s susceptible a ataques de fuerza bruta a trav\u00e9s de la interfaz de l\u00ednea de comandos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23405.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23405.json index 6ab2dbd3aa0..6b012562af3 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23405.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23405.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:16.637", "lastModified": "2025-02-28T17:15:16.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthenticated log effects metrics gathering incident response efforts and potentially exposes risk of injection attacks (ex log injection)." + }, + { + "lang": "es", + "value": "Los registros no autenticados afectan las m\u00e9tricas de recopilaci\u00f3n de esfuerzos de respuesta a incidentes y potencialmente exponen el riesgo de ataques de inyecci\u00f3n (por ejemplo, inyecci\u00f3n de registros)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json index b0df412dd87..afd996c2d78 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23409.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "OpenHarmony v5.0.2 y anteriores permiten a un atacante local la ejecuci\u00f3n arbitraria de c\u00f3digo en aplicaciones preinstaladas a trav\u00e9s de un uso de memoria despu\u00e9s de liberarla. Esta vulnerabilidad s\u00f3lo puede ser explotada en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23410.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23410.json index dfd565f0b40..f24c050929d 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23410.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23410.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When uploading organism or sequence data via the web interface, \n GMOD Apollo\n\n will unzip and inspect the files and will not check for path\n traversal in supported archive types." + }, + { + "lang": "es", + "value": "Al cargar datos de organismos o secuencias a trav\u00e9s de la interfaz web, GMOD Apollo descomprimir\u00e1 e inspeccionar\u00e1 los archivos y no verificar\u00e1 el recorrido de rutas en los tipos de archivos compatibles." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json index 98930839a93..b7afc802fc4 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23414.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json index 6be505f5fa8..eb9c1e72056 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23416.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path traversal may lead to arbitrary file deletion. The score without \nleast privilege principle violation is as calculated below. In \ncombination with other issues it may facilitate further compromise of \nthe device. Remediation in Version 6.8.0, release date: 01-Mar-25." + }, + { + "lang": "es", + "value": "El path traversal puede provocar la eliminaci\u00f3n arbitraria de archivos. La puntuaci\u00f3n sin violaci\u00f3n del principio de privilegio m\u00ednimo se calcula a continuaci\u00f3n. En combinaci\u00f3n con otros problemas, puede facilitar una mayor vulneraci\u00f3n del dispositivo. Soluci\u00f3n en la versi\u00f3n 6.8.0, fecha de publicaci\u00f3n: 01-Mar-25." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json index ef5f6f4bbd9..b79c0076bcd 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23418.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de una lectura fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json index ec4a6f6b206..558acb13e65 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23420.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json index 32bb0e0693f..9c35cb840ad 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:12.073", "lastModified": "2025-02-13T22:15:12.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23425.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23425.json index 41e2156ebd0..1a57160f5b3 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23425.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23425.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:34.600", "lastModified": "2025-03-03T14:15:34.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in marekki Marekkis Watermark allows Reflected XSS. This issue affects Marekkis Watermark: from n/a through 0.9.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Marekki Marekkis Watermark permite XSS reflejado. Este problema afecta a Marekkis Watermark: desde n/a hasta 0.9.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23433.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23433.json index ef47c23dc92..394ca017ab0 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23433.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23433.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:34.750", "lastModified": "2025-03-03T14:15:34.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jnwry vcOS allows Reflected XSS. This issue affects vcOS: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en jnwry vcOS permite XSS reflejado. Este problema afecta a vcOS: desde n/a hasta 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23437.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23437.json index d170e2390c6..9a683b21202 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23437.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:34.890", "lastModified": "2025-03-03T14:15:34.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ntp-header-images allows Reflected XSS. This issue affects ntp-header-images: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ntp-header-images permite XSS reflejado. Este problema afecta a ntp-header-images: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23439.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23439.json index fee0c059776..bccc0919240 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23439.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23439.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.047", "lastModified": "2025-03-03T14:15:35.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in willshouse TinyMCE Extended Config allows Reflected XSS. This issue affects TinyMCE Extended Config: from n/a through 0.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Willshouse TinyMCE Extended Config permite XSS reflejado. Este problema afecta a TinyMCE Extended Config: desde n/a hasta 0.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23440.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23440.json index af781b759bc..9f9b1703be5 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23440.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23440.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.217", "lastModified": "2025-03-03T14:15:35.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in radicaldesigns radSLIDE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects radSLIDE: from n/a through 2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en radicaldesigns radSLIDE permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a radSLIDE: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23441.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23441.json index a1f99b4f26e..a43009f8585 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23441.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23441.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.360", "lastModified": "2025-03-03T14:15:35.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Attach Gallery Posts allows Reflected XSS. This issue affects Attach Gallery Posts: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Attach Gallery Posts permite XSS reflejado. Este problema afecta a las publicaciones de la galer\u00eda Adjuntar: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23446.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23446.json index 1521bfc5d5f..dfa01007e07 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23446.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23446.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.500", "lastModified": "2025-03-03T14:15:35.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound WP SpaceContent allows Stored XSS. This issue affects WP SpaceContent: from n/a through 0.4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Request Forgery (CSRF) en NotFound WP SpaceContent permite XSS almacenado. Este problema afecta a WP SpaceContent: desde n/a hasta 0.4.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23447.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23447.json index 205db933229..542707aed3a 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23447.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23447.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.637", "lastModified": "2025-03-03T14:15:35.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Smooth Dynamic Slider allows Reflected XSS. This issue affects Smooth Dynamic Slider: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Smooth Dynamic Slider permite XSS reflejado. Este problema afecta a Smooth Dynamic Slider: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23450.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23450.json index e75089ce706..2cd690717d4 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23450.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23450.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.780", "lastModified": "2025-03-03T14:15:35.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in agenwebsite AW WooCommerce Kode Pembayaran allows Reflected XSS. This issue affects AW WooCommerce Kode Pembayaran: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en agenwebsite AW WooCommerce Kode Pembayaran permite XSS reflejado. Este problema afecta a AW WooCommerce Kode Pembayaran: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23451.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23451.json index afcfc02fa5c..7db31686fb7 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23451.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23451.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:35.920", "lastModified": "2025-03-03T14:15:35.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Awesome Twitter Feeds allows Reflected XSS. This issue affects Awesome Twitter Feeds: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Awesome Twitter Feeds permite XSS reflejado. Este problema afecta a Awesome Twitter Feeds: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23464.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23464.json index 4e9cb6129c6..ba3dc221c69 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23464.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23464.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.070", "lastModified": "2025-03-03T14:15:36.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Twitter News Feed allows Reflected XSS. This issue affects Twitter News Feed: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Twitter News Feed permite XSS reflejado. Este problema afecta al canal de noticias de Twitter: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23465.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23465.json index 2dfcabdd808..5220d203599 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23465.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23465.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.213", "lastModified": "2025-03-03T14:15:36.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Vampire Character Manager allows Reflected XSS. This issue affects Vampire Character Manager: from n/a through 2.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Vampire Character Manager permite XSS reflejado. Este problema afecta a Vampire Character Manager: desde n/a hasta 2.13." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23468.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23468.json index 6d0a040d611..492affb958d 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23468.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23468.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.357", "lastModified": "2025-03-03T14:15:36.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Essay Wizard (wpCRES) allows Reflected XSS. This issue affects Essay Wizard (wpCRES): from n/a through 1.0.6.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Essay Wizard (wpCRES) permite XSS reflejado. Este problema afecta a Essay Wizard (wpCRES): desde n/a hasta 1.0.6.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23472.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23472.json index 5149c36c4df..199bccdaa96 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23472.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23472.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.497", "lastModified": "2025-03-03T14:15:36.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Flexo Slider allows Reflected XSS. This issue affects Flexo Slider: from n/a through 1.0013." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Flexo Slider permite XSS reflejado. Este problema afecta a Flexo Slider: desde n/a hasta 1.0013." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23473.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23473.json index e2a9936d920..3ae6ea82387 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23473.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23473.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.633", "lastModified": "2025-03-03T14:15:36.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Killer Theme Options allows Reflected XSS. This issue affects Killer Theme Options: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Killer Theme Options permite XSS reflejado. Este problema afecta a Killer Theme Options: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23478.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23478.json index 907e2de7d4f..e3b6a0bfe3b 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23478.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23478.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.777", "lastModified": "2025-03-03T14:15:36.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Photo Video Store allows Reflected XSS. This issue affects Photo Video Store: from n/a through 21.07." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Photo Video Store permite XSS reflejado. Este problema afecta a Photo Video Store: desde n/a hasta 21.07." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23479.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23479.json index fa3bd28fe24..5d4f39aea5e 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23479.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23479.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:36.920", "lastModified": "2025-03-03T14:15:36.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound melascrivi allows Reflected XSS. This issue affects melascrivi: from n/a through 1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound melascrivi permite XSS reflejado. Este problema afecta a melascrivi: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23480.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23480.json index 6165fc06922..0e91e7481f4 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23480.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.060", "lastModified": "2025-03-03T14:15:37.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RSVP ME allows Stored XSS. This issue affects RSVP ME: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound RSVP ME permite XSS almacenado. Este problema afecta a RSVP ME: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23481.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23481.json index 3419814e3ad..a62f00abf3e 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23481.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23481.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.207", "lastModified": "2025-03-03T14:15:37.207", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ni WooCommerce Sales Report Email allows Reflected XSS. This issue affects Ni WooCommerce Sales Report Email: from n/a through 3.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Ni WooCommerce Sales Report Email permite XSS reflejado. Este problema afecta a Ni WooCommerce Sales Report Email: desde n/a hasta 3.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23482.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23482.json index 5cf1e07bed5..73951ab063f 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23482.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23482.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.367", "lastModified": "2025-03-03T14:15:37.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound azurecurve Floating Featured Image allows Reflected XSS. This issue affects azurecurve Floating Featured Image: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound azurecurve Floating Featured Image permite XSS reflejado. Este problema afecta a azurecurve Floating Featured Image: desde n/a hasta 2.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23484.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23484.json index 74b3cb8e3c3..9dfe2eb8ca0 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23484.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23484.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.507", "lastModified": "2025-03-03T14:15:37.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Predict When allows Reflected XSS. This issue affects Predict When: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Predict When permite XSS reflejado. Este problema afecta a Predict When: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23485.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23485.json index 775d024e016..df50f29832d 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23485.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23485.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.647", "lastModified": "2025-03-03T14:15:37.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in richestsoft RS Survey allows Reflected XSS. This issue affects RS Survey: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en richestsoft RS Survey que permite XSS reflejado. Este problema afecta a RS Survey: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23487.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23487.json index 52e3714701a..8a3db35c926 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23487.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23487.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.787", "lastModified": "2025-03-03T14:15:37.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Gallery allows Reflected XSS. This issue affects Easy Gallery: from n/a through 1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Easy Gallery que permite XSS reflejado. Este problema afecta a Easy Gallery: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23488.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23488.json index 4349c4498f0..19e00afc5fa 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23488.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23488.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:37.930", "lastModified": "2025-03-03T14:15:37.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound rng-refresh allows Reflected XSS. This issue affects rng-refresh: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound rng-refresh permite XSS reflejado. Este problema afecta a rng-refresh: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23490.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23490.json index f2d765a6aa2..bd5ea1c9fca 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23490.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23490.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.077", "lastModified": "2025-03-03T14:15:38.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Browser-Update-Notify allows Reflected XSS. This issue affects Browser-Update-Notify: from n/a through 0.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Browser-Update-Notify permite XSS reflejado. Este problema afecta a Browser-Update-Notify: desde n/a hasta 0.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23493.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23493.json index 9a895f34d65..f7f907e4a58 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23493.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23493.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.213", "lastModified": "2025-03-03T14:15:38.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Google Transliteration allows Reflected XSS. This issue affects Google Transliteration: from n/a through 1.7.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Google Transliteration permite XSS reflejado. Este problema afecta a Google Transliteration: desde n/a hasta 1.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23494.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23494.json index 68d177da771..05eab53ef21 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23494.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23494.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.353", "lastModified": "2025-03-03T14:15:38.353", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Quizzin allows Reflected XSS. This issue affects Quizzin: from n/a through 1.01.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Quizzin permite XSS reflejado. Este problema afecta a Quizzin: desde n/a hasta 1.01.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23496.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23496.json index 9cefaba07de..42712004bef 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23496.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23496.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.497", "lastModified": "2025-03-03T14:15:38.497", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP FPO allows Reflected XSS. This issue affects WP FPO: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP FPO permite XSS reflejado. Este problema afecta a WP FPO: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23502.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23502.json index d26e2504bdf..af8c6423b21 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23502.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.633", "lastModified": "2025-03-03T14:15:38.633", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound Curated Search allows Stored XSS. This issue affects Curated Search: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Request Forgery (CSRF) en NotFound Curated Search permite XSS almacenado. Este problema afecta a Curated Search: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23505.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23505.json index 6e3b2509a34..32c73ef6191 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23505.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23505.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.777", "lastModified": "2025-03-03T14:15:38.777", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pit Login Welcome allows Reflected XSS. This issue affects Pit Login Welcome: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Pit Login Welcome permite XSS reflejado. Este problema afecta a Pit Login Welcome: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23515.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23515.json index cfc69ad1246..ff51ad7807e 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23515.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23515.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:38.920", "lastModified": "2025-03-03T14:15:38.920", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in tsecher ts-tree allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ts-tree: from n/a through 0.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en ts-tree de tsecher permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a ts-tree desde n/a hasta 0.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23516.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23516.json index f13a097a157..3a38917c534 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23516.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23516.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.057", "lastModified": "2025-03-03T14:15:39.057", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Sale with Razorpay allows Reflected XSS. This issue affects Sale with Razorpay: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Sale con Razorpay permite XSS reflejado. Este problema afecta a Sale con Razorpay: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23517.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23517.json index 629bed12f7b..4f7bc989163 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23517.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23517.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.200", "lastModified": "2025-03-03T14:15:39.200", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Google Map on Post/Page allows Reflected XSS. This issue affects Google Map on Post/Page: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Google Map on Post/Page que permite XSS reflejado. Este problema afecta a Google Map en publicaciones o p\u00e1ginas: desde n/d hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23518.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23518.json index 45e10cb83f0..2f429b515a5 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23518.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.347", "lastModified": "2025-03-03T14:15:39.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound GoogleMapper allows Reflected XSS. This issue affects GoogleMapper: from n/a through 2.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound GoogleMapper permite XSS reflejado. Este problema afecta a GoogleMapper: desde n/a hasta 2.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23519.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23519.json index 5d2e2caa78a..5c1d14cd327 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23519.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23519.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.487", "lastModified": "2025-03-03T14:15:39.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound G Web Pro Store Locator allows Reflected XSS. This issue affects G Web Pro Store Locator: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound G Web Pro Store Locator permite XSS reflejado. Este problema afecta a G Web Pro Store Locator: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23520.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23520.json index be17c1d507c..33b103afe69 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23520.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23520.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.630", "lastModified": "2025-03-03T14:15:39.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SecureSubmit Heartland Management Terminal allows Reflected XSS. This issue affects Heartland Management Terminal: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SecureSubmit Heartland Management Terminal permite XSS reflejado. Este problema afecta a Heartland Management Terminal: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23521.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23521.json index a0ddb8281b9..6386b8944c6 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23521.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23521.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.767", "lastModified": "2025-03-03T14:15:39.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Goodlayers Blocks allows Reflected XSS. This issue affects Goodlayers Blocks: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Goodlayers Blocks permite XSS reflejado. Este problema afecta a Goodlayers Blocks: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23524.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23524.json index 109fdb134f3..0f60a7d9d5b 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23524.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23524.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:39.900", "lastModified": "2025-03-03T14:15:39.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ClickBank Storefront allows Reflected XSS. This issue affects ClickBank Storefront: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ClickBank Storefront permite XSS reflejado. Este problema afecta a ClickBank Storefront: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23526.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23526.json index 5711a2d0634..bd6a4ff1db3 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23526.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23526.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.043", "lastModified": "2025-03-03T14:15:40.043", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Swift Calendar Online Appointment Scheduling allows Reflected XSS. This issue affects Swift Calendar Online Appointment Scheduling: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Swift Calendar Online Appointment Scheduling permite XSS reflejado. Este problema afecta a Swift Calendar Online Appointment Scheduling: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23536.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23536.json index 45887a1f4eb..5a4d061a52b 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23536.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23536.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.187", "lastModified": "2025-03-03T14:15:40.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Track Page Scroll allows Reflected XSS. This issue affects Track Page Scroll: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Track Page Scroll permite XSS reflejado. Este problema afecta a Track Page Scroll: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23538.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23538.json index 2c692b51659..3b78a41b3e2 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23538.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23538.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.327", "lastModified": "2025-03-03T14:15:40.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Contest allows Reflected XSS. This issue affects WP Contest: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Contest permite XSS reflejado. Este problema afecta a WP Contest: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23539.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23539.json index 706b0530e3a..5baa6c8514c 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23539.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23539.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.470", "lastModified": "2025-03-03T14:15:40.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Awesome Hooks allows Reflected XSS. This issue affects Awesome Hooks: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Awesome Hooks permite XSS reflejado. Este problema afecta a Awesome Hooks: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23549.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23549.json index f5fa0150b07..b9393188fc5 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23549.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23549.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.613", "lastModified": "2025-03-03T14:15:40.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Maniac SEO allows Reflected XSS. This issue affects Maniac SEO: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Maniac SEO permite XSS reflejado. Este problema afecta a Maniac SEO: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23552.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23552.json index ca29e2d8fc0..fdc363b5a03 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23552.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23552.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.760", "lastModified": "2025-03-03T14:15:40.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Texteller allows Reflected XSS. This issue affects Texteller: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Texteller permite XSS reflejado. Este problema afecta a Texteller: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23553.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23553.json index c3190ab3986..52855cc5f1b 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23553.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23553.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:40.900", "lastModified": "2025-03-03T14:15:40.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Cramer Userbase Access Control allows Reflected XSS. This issue affects Userbase Access Control: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en David Cramer Userbase Access Control que permite XSS reflejado. Este problema afecta al control de acceso a la base de usuarios: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23555.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23555.json index 61231add668..e1afc1c7107 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23555.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23555.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:41.040", "lastModified": "2025-03-03T14:15:41.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ui Slider Filter By Price allows Reflected XSS. This issue affects Ui Slider Filter By Price: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Ui Slider Filter By Price permite XSS reflejado. Este problema afecta a Ui Slider Filter By Price: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23556.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23556.json index 56d87b1297f..4d6f28dfc74 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23556.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23556.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:41.180", "lastModified": "2025-03-03T14:15:41.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Push Envoy Notifications allows Reflected XSS. This issue affects Push Envoy Notifications: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Push Envoy Notifications permite XSS reflejado. Este problema afecta a Push Envoy Notifications: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23563.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23563.json index c0576fbdbb0..cc258076fab 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23563.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23563.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:41.330", "lastModified": "2025-03-03T14:15:41.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Explore pages allows Reflected XSS. This issue affects Explore pages: from n/a through 1.01." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Explore pages permite XSS reflejado. Este problema afecta a las p\u00e1ginas de Explore: desde n/a hasta 1.01." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23564.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23564.json index 1b3404d1f03..c4bd2e0cab4 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23564.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23564.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:41.470", "lastModified": "2025-03-03T14:15:41.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mohsenshahbazi WP FixTag allows Reflected XSS. This issue affects WP FixTag: from n/a through v2.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP FixTag de mohsenshahbazi que permite XSS reflejado. Este problema afecta a WP FixTag: desde n/a hasta v2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23565.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23565.json index 4bf4f28a52e..e6d78cc1769 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23565.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23565.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:41.617", "lastModified": "2025-03-03T14:15:41.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Wibstats allows Reflected XSS. This issue affects Wibstats: from n/a through 0.5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Wibstats NotFound permite XSS reflejado. Este problema afecta a Wibstats: desde n/a hasta 0.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23570.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23570.json index efaeb18fbfe..8f2c29f5295 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23570.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23570.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:42.437", "lastModified": "2025-03-03T14:15:42.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Social Links allows Reflected XSS. This issue affects WP Social Links: from n/a through 0.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Social Links permite XSS reflejado. Este problema afecta a WP Social Links: desde n/a hasta 0.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23575.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23575.json index a6b69b36975..61a067f2eaa 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23575.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23575.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:42.583", "lastModified": "2025-03-03T14:15:42.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DX Sales CRM allows Reflected XSS. This issue affects DX Sales CRM: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DX Sales CRM permite XSS reflejado. Este problema afecta a DX Sales CRM: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23576.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23576.json index eb33b0fe097..244174b1222 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23576.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23576.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:42.723", "lastModified": "2025-03-03T14:15:42.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Intro.JS allows Reflected XSS. This issue affects WP Intro.JS: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Intro.JS permite XSS reflejado. Este problema afecta a WP Intro.JS: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23579.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23579.json index 201c3a20230..3c3ecab947c 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23579.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23579.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:42.870", "lastModified": "2025-03-03T14:15:42.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DZS Ajaxer Lite allows Stored XSS. This issue affects DZS Ajaxer Lite: from n/a through 1.04." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DZS Ajaxer Lite permite XSS almacenado. Este problema afecta a DZS Ajaxer Lite: desde n/a hasta 1.04." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23584.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23584.json index 7c94a20a48f..d91f4d5acef 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23584.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23584.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.010", "lastModified": "2025-03-03T14:15:43.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pin Locations on Map allows Reflected XSS. This issue affects Pin Locations on Map: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Pin Locations on Map permite XSS reflejado. Este problema afecta a las ubicaciones de pin en el mapa: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23585.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23585.json index 6072ecc7919..e6daeae1ba6 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23585.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23585.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.153", "lastModified": "2025-03-03T14:15:43.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CantonBolo Goo.gl Url Shorter allows Reflected XSS. This issue affects Goo.gl Url Shorter: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CantonBolo Goo.gl Url Shorter permite XSS reflejado. Este problema afecta a Goo.gl Url Shorter: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23586.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23586.json index 192758e4355..1572231f208 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23586.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23586.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.293", "lastModified": "2025-03-03T14:15:43.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Post Category Notifications allows Reflected XSS. This issue affects WP Post Category Notifications: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Post Category Notifications permite XSS reflejado. Este problema afecta a WP Post Category Notifications: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23587.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23587.json index ef2d0532b33..a511184fcde 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23587.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23587.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.437", "lastModified": "2025-03-03T14:15:43.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound all-in-one-box-login allows Reflected XSS. This issue affects all-in-one-box-login: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound all-in-one-box-login permite XSS reflejado. Este problema afecta a all-in-one-box-login: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23595.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23595.json index 2db5f1ff4e5..77e74d102fe 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23595.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23595.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.580", "lastModified": "2025-03-03T14:15:43.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Page Health-O-Meter allows Reflected XSS. This issue affects Page Health-O-Meter: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Page Health-O-Meter permite XSS reflejado. Este problema afecta a Page Health-O-Meter: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23600.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23600.json index 375bd9620ed..5030b724ec6 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23600.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23600.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.717", "lastModified": "2025-03-03T14:15:43.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pinal.shah Send to a Friend Addon allows Reflected XSS. This issue affects Send to a Friend Addon: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en pinal.shah Send to a Friend Addon que permite XSS reflejado. Este problema afecta al complemento Send to a Friend desde la versi\u00f3n n/a hasta la 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23613.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23613.json index 258f66fdd6e..8e452569a39 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23613.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23613.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.860", "lastModified": "2025-03-03T14:15:43.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in NotFound WP Journal allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Journal: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en NotFound WP Journal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Journal desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23615.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23615.json index 867542978b1..6e7897d8624 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23615.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23615.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:43.997", "lastModified": "2025-03-03T14:15:43.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in NotFound Interactive Page Hierarchy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Interactive Page Hierarchy: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en NotFound Interactive Page Hierarchy permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la jerarqu\u00eda de p\u00e1ginas interactivas desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23616.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23616.json index 53186dddc79..96f8e63c1f9 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23616.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23616.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.140", "lastModified": "2025-03-03T14:15:44.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Canalplan allows Reflected XSS. This issue affects Canalplan: from n/a through 5.31." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Canalplan permite XSS reflejado. Este problema afecta a Canalplan: desde n/a hasta 5.31." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23619.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23619.json index 8878900a456..7e2d43fa97c 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23619.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23619.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.280", "lastModified": "2025-03-03T14:15:44.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Catch Duplicate Switcher allows Reflected XSS. This issue affects Catch Duplicate Switcher: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Catch Duplicate Switcher permite XSS reflejado. Este problema afecta a Catch Duplicate Switcher: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23635.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23635.json index a6f66ae5172..cc2a5fd43da 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23635.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23635.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.413", "lastModified": "2025-03-03T14:15:44.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mobde3net ePermissions allows Reflected XSS. This issue affects ePermissions: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en mobde3net ePermissions permite XSS reflejado. Este problema afecta a ePermissions: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23637.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23637.json index 2638c2f74f7..174a10f3c94 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23637.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23637.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.553", "lastModified": "2025-03-03T14:15:44.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound \u65b0\u6dd8\u5ba2WordPress\u63d2\u4ef6 allows Reflected XSS. This issue affects \u65b0\u6dd8\u5ba2WordPress\u63d2\u4ef6: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en NotFound ???WordPress?? permite XSS Reflejado. Este problema afecta a ???WordPress??: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23663.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23663.json index 09cc48baba2..fd23e44992e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23663.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23663.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.693", "lastModified": "2025-03-03T14:15:44.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adrian Vaquez Contexto allows Reflected XSS. This issue affects Contexto: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Adrian Vaquez Contexto que permite XSS reflejado. Este problema afecta a Contexto: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23668.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23668.json index 8dd22375f2c..53dad2b6fe2 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23668.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23668.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.833", "lastModified": "2025-03-03T14:15:44.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ChatGPT Open AI Images & Content for WooCommerce allows Reflected XSS. This issue affects ChatGPT Open AI Images & Content for WooCommerce: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ChatGPT Open AI Images & Content for WooCommerce permite XSS reflejado. Este problema afecta a ChatGPT Open AI Images & Content for WooCommerce: desde n/a hasta 2.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23670.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23670.json index 0c547d65140..97e7c42ad0a 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23670.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23670.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:44.970", "lastModified": "2025-03-03T14:15:44.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound 4 author cheer up donate allows Reflected XSS. This issue affects 4 author cheer up donate: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound 4 author cheer up donate permite XSS reflejado. Este problema afecta a 4 author cheer up donate: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23687.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23687.json index bc41063bd10..3e14263b2d2 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23687.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-27T17:15:16.623", "lastModified": "2025-02-27T17:15:16.623", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23688.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23688.json index ebbbf69877f..4fb93fb04c3 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23688.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23688.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.110", "lastModified": "2025-03-03T14:15:45.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Cobwebo URL Plugin allows Reflected XSS. This issue affects Cobwebo URL Plugin: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Cobwebo URL Plugin que permite XSS reflejado. Este problema afecta al complemento de URL de Cobwebo: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23716.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23716.json index 01f9464cbc1..f45f619a76e 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23716.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23716.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.270", "lastModified": "2025-03-03T14:15:45.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Login Watchdog allows Stored XSS. This issue affects Login Watchdog: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Login Watchdog permite XSS almacenado. Este problema afecta a Login Watchdog: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23718.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23718.json index cea1ce58674..6d96dbc9031 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23718.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23718.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.440", "lastModified": "2025-03-03T14:15:45.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mancx AskMe Widget allows Reflected XSS. This issue affects Mancx AskMe Widget: from n/a through 0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mancx AskMe Widget permite XSS reflejado. Este problema afecta a Mancx AskMe Widget: desde n/a hasta 0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23721.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23721.json index bfbcb522bd1..dafeafd83f9 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23721.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23721.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.580", "lastModified": "2025-03-03T14:15:45.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mobigate allows Reflected XSS. This issue affects Mobigate: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mobigate que permite XSS reflejado. Este problema afecta a Mobigate: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23726.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23726.json index 9eb3778e949..ebc155c82c5 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23726.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23726.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.723", "lastModified": "2025-03-03T14:15:45.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ComparePress allows Reflected XSS. This issue affects ComparePress: from n/a through 2.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ComparePress permite XSS reflejado. Este problema afecta a ComparePress: desde n/a hasta 2.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23731.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23731.json index b90198726c0..2071edf612c 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23731.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23731.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:45.863", "lastModified": "2025-03-03T14:15:45.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in infosoftplugin Tax Report for WooCommerce allows Reflected XSS. This issue affects Tax Report for WooCommerce: from n/a through 2.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en infosoftplugin Tax Report for WooCommerce que permite XSS reflejado. Este problema afecta a Tax Report for WooCommerce: desde n/a hasta 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23736.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23736.json index 0637d506f15..234c1753cba 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23736.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23736.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.003", "lastModified": "2025-03-03T14:15:46.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Form To JSON allows Reflected XSS. This issue affects Form To JSON: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Form To JSON permite XSS reflejado. Este problema afecta a Form To JSON: desde n/a hasta 1.0. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23738.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23738.json index 86dc1d1a069..975adb690fe 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23738.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23738.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.157", "lastModified": "2025-03-03T14:15:46.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ps Ads Pro allows Reflected XSS. This issue affects Ps Ads Pro: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Ps Ads Pro permite XSS reflejado. Este problema afecta a Ps Ads Pro: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23739.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23739.json index f247a6dcfb0..c66747bcbc1 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23739.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23739.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.300", "lastModified": "2025-03-03T14:15:46.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Ultimate Reviews FREE allows Reflected XSS. This issue affects WP Ultimate Reviews FREE: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Ultimate Reviews FREE permite XSS reflejado. Este problema afecta a WP Ultimate Reviews FREE: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23740.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23740.json index b5fb3d836d9..0ca789c9950 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23740.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23740.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.443", "lastModified": "2025-03-03T14:15:46.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy School Registration allows Reflected XSS. This issue affects Easy School Registration: from n/a through 3.9.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Easy School Registration permite XSS reflejado. Este problema afecta a Easy School Registration: desde n/a hasta 3.9.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23741.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23741.json index 9d1c7d04048..1daba14c296 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23741.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23741.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.580", "lastModified": "2025-03-03T14:15:46.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Notifications Center allows Reflected XSS. This issue affects Notifications Center: from n/a through 1.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Notifications Center permite XSS reflejado. Este problema afecta a Notifications Center: desde n/a hasta 1.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23753.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23753.json index 9511b65567f..cfb75e6774e 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23753.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23753.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.720", "lastModified": "2025-03-03T14:15:46.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DN Sitemap Control allows Reflected XSS. This issue affects DN Sitemap Control: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DN Sitemap Control permite XSS reflejado. Este problema afecta a DN Sitemap Control: desde n/a hasta 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23762.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23762.json index d95125fe93e..fda5c303551 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23762.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:46.860", "lastModified": "2025-03-03T14:15:46.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DsgnWrks Twitter Importer allows Reflected XSS. This issue affects DsgnWrks Twitter Importer: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DsgnWrks Twitter Importer permite XSS reflejado. Este problema afecta a DsgnWrks Twitter Importer: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23763.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23763.json index 2a377c75d1d..68a8d88a960 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23763.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23763.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.000", "lastModified": "2025-03-03T14:15:47.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Alex Volkov WAH Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WAH Forms: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Alex Volkov WAH Forms permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los formularios WAH desde la versi\u00f3n n/a hasta la 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23813.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23813.json index 1c212d6cf97..d408bff496e 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23813.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23813.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.140", "lastModified": "2025-03-03T14:15:47.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Guten Free Options allows Reflected XSS. This issue affects Guten Free Options: from n/a through 0.9.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Guten Free Options permite XSS reflejado. Este problema afecta a Guten Free Options: desde n/a hasta 0.9.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23814.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23814.json index 289ddd7ba86..fe5351f0ac7 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23814.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23814.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.280", "lastModified": "2025-03-03T14:15:47.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CRUDLab Like Box allows Reflected XSS. This issue affects CRUDLab Like Box: from n/a through 2.0.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound CRUDLab Like Box permite XSS reflejado. Este problema afecta a CRUDLab Like Box: desde n/a hasta 2.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23829.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23829.json index 2f37b4f3690..6544aba2bdd 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23829.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23829.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.417", "lastModified": "2025-03-03T14:15:47.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Woo Update Variations In Cart allows Stored XSS. This issue affects Woo Update Variations In Cart: from n/a through 0.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Woo Update Variations In Cart permite XSS almacenado. Este problema afecta a Woo Update Variations In Cart: desde n/a hasta 0.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23843.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23843.json index f1b266367f9..53f228ca7ee 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23843.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23843.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.583", "lastModified": "2025-03-03T14:15:47.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wphrmanager WP-HR Manager: The Human Resources Plugin for WordPress allows Reflected XSS. This issue affects WP-HR Manager: The Human Resources Plugin for WordPress: from n/a through 3.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wphrmanager WP-HR Manager: The Human Resources Plugin for WordPress permite XSS reflejado. Este problema afecta a WP-HR Manager: The Human Resources Plugin for WordPress: desde n/a hasta 3.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23847.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23847.json index 6e3f54f15cf..24d7f0a8968 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23847.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23847.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.730", "lastModified": "2025-03-03T14:15:47.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Site Launcher allows Reflected XSS. This issue affects Site Launcher: from n/a through 0.9.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Site Launcher permite XSS reflejado. Este problema afecta a Site Launcher: desde n/a hasta 0.9.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23850.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23850.json index 1e89d3c71c0..b007affff05 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23850.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23850.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:47.870", "lastModified": "2025-03-03T14:15:47.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mojo Under Construction allows Reflected XSS. This issue affects Mojo Under Construction: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mojo Under Construction permite XSS reflejado. Este problema afecta a Mojo Under Construction: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23852.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23852.json index a5218b061e0..83fa60d3a9c 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23852.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23852.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.013", "lastModified": "2025-03-03T14:15:48.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound First Comment Redirect allows Reflected XSS. This issue affects First Comment Redirect: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound First Comment Redirect permite XSS reflejado. Este problema afecta a First Comment Redirect: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23879.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23879.json index 1b4e366f5c0..44d602a377b 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23879.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23879.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.157", "lastModified": "2025-03-03T14:15:48.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PillarDev Easy Automatic Newsletter Lite allows Reflected XSS. This issue affects Easy Automatic Newsletter Lite: from n/a through 3.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PillarDev Easy Automatic Newsletter Lite permite XSS reflejado. Este problema afecta a Easy Automatic Newsletter Lite: desde n/a hasta 3.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23881.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23881.json index 17eedc5ce16..8b009d10a80 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23881.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23881.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.290", "lastModified": "2025-03-03T14:15:48.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LJ Custom Menu Links allows Reflected XSS. This issue affects LJ Custom Menu Links: from n/a through 2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound LJ Custom Menu Links permite XSS reflejado. Este problema afecta a los enlaces de men\u00fa personalizados de LJ: desde n/a hasta 2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23883.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23883.json index ea196fe91e0..dfa5c27a9ce 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23883.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23883.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.430", "lastModified": "2025-03-03T14:15:48.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Stray Random Quotes allows Reflected XSS. This issue affects Stray Random Quotes: from n/a through 1.9.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Stray Random Quotes permite XSS reflejado. Este problema afecta a Stray Random Quotes: desde n/a hasta 1.9.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23903.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23903.json index 784c77eb149..3a8c5689332 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23903.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23903.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.573", "lastModified": "2025-03-03T14:15:48.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Local Shipping Labels for WooCommerce allows Reflected XSS. This issue affects Local Shipping Labels for WooCommerce: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Local Shipping Labels for WooCommerce permite XSS reflejado. Este problema afecta a Local Shipping Labels for WooCommerce: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23904.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23904.json index 385b12e8d44..9e202dfc5f7 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23904.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23904.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.720", "lastModified": "2025-03-03T14:15:48.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rebrand Fluent Forms allows Reflected XSS. This issue affects Rebrand Fluent Forms: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Rebrand Fluent Forms permite XSS reflejado. Este problema afecta a Rebrand Fluent Forms: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23945.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23945.json index 6948d2437d3..bdc8eaaf2c1 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23945.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23945.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:48.863", "lastModified": "2025-03-03T14:15:48.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Popliup allows PHP Local File Inclusion. This issue affects Popliup: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad Control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en NotFound Popliup permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Popliup: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23956.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23956.json index 92ab068131b..3182d7297f7 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23956.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23956.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.010", "lastModified": "2025-03-03T14:15:49.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Easy Post Mailer allows Reflected XSS. This issue affects WP Easy Post Mailer: from n/a through 0.64." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Easy Post Mailer que permite XSS reflejado. Este problema afecta a WP Easy Post Mailer: desde n/a hasta 0.64." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24023.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24023.json index 1923a4f56c2..8df1f4e2314 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24023.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24023.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24023", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:41.820", - "lastModified": "2025-03-03T16:15:41.820", - "vulnStatus": "Received", + "lastModified": "2025-03-07T19:37:57.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilder allows unauthenticated users to enumerate existing usernames by timing the response time from the server when brute forcing requests to login. This vulnerability is fixed in 4.5.3." + }, + { + "lang": "es", + "value": "Flask-AppBuilder es un framework de desarrollo de aplicaciones. Antes de la versi\u00f3n 4.5.3, Flask-AppBuilder permite a los usuarios no autenticados enumerar nombres de usuario existentes cronometrando el tiempo de respuesta del servidor cuando se fuerzan solicitudes de inicio de sesi\u00f3n. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 4.5.3." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,12 +69,43 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dpgaspar:flask-appbuilder:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.5.3", + "matchCriteriaId": "BF28CA72-015B-43B1-A97C-02EA08C00137" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-p8q5-cvwx-wvwp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json index a2754594975..3f4e26a3f19 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.267", "lastModified": "2025-02-18T20:15:29.027", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json index 7753a725308..6e41bc4748d 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.350", "lastModified": "2025-02-18T20:15:29.167", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json index 2507af20f9a..0ac7863bff6 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.807", "lastModified": "2025-02-18T20:15:29.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json index 6390a85575f..56d1973682e 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24103", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.900", - "lastModified": "2025-02-18T20:15:29.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json index 3e664182614..01c5465f665 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24106", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.070", - "lastModified": "2025-02-18T20:15:29.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. El an\u00e1lisis de un archivo puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json index 3a056863b64..30783aa8422 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24108.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24108", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.263", - "lastModified": "2025-02-18T20:15:29.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de acceso con restricciones de la sandbox adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n puede acceder a datos de usuario protegidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json index 0299f428b6d..ad7fbcd4010 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24109", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.347", - "lastModified": "2025-02-18T20:15:29.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json index f1f4b461ba1..1be7f9d855f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24115", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.713", - "lastModified": "2025-02-18T20:15:29.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer archivos fuera de su sandbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json index 47bc9b41bb4..d316d68ef56 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24118", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.033", - "lastModified": "2025-02-18T20:15:29.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,97 @@ "value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar una terminaci\u00f3n inesperada de sistema o escribir en la memoria del n\u00facleo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "6049E692-EB64-4E7D-A1AC-CEBA288B7A55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json index 115bb5b90fc..03b5cd78e82 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24122", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.323", - "lastModified": "2025-02-18T20:15:29.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json index edc9fc8a55f..577006a4562 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24123", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.413", - "lastModified": "2025-02-18T20:15:30.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,175 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.3", + "matchCriteriaId": "AD29C5E9-9427-4C41-873F-C29493B892E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3", + "matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json index e76967dc36f..5baef40c99f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24124.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24124", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.510", - "lastModified": "2025-02-18T20:15:30.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,175 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.3", + "matchCriteriaId": "AD29C5E9-9427-4C41-873F-C29493B892E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3", + "matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json index 30bf944414b..631b0202fe9 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24126", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.603", - "lastModified": "2025-02-18T19:15:27.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,130 @@ "value": "Se solucion\u00f3 un problema de validaci\u00f3n de entrada. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Un atacante en la red local podr\u00eda provocar la finalizaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3", + "matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json index 913905a6ded..f160dbdc77e 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24130", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.977", - "lastModified": "2025-02-18T19:15:27.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json index bdef012fea6..f0e3a47b64d 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24134", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.153", - "lastModified": "2025-02-18T20:15:30.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con controles de privacidad mejorados. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json index 2410c5b140e..b028fa72385 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24135", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.247", - "lastModified": "2025-02-18T20:15:30.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:38.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Este problema se solucion\u00f3 con una validaci\u00f3n de mensajes mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json index 1fdca7b8624..9846ae6538f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.077", "lastModified": "2025-02-18T20:15:30.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json index 856aaea8bc4..6a793d853b1 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24159", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.897", - "lastModified": "2025-02-18T20:15:31.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T22:45:11.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,160 @@ "value": "Se solucion\u00f3 un problema de validaci\u00f3n con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios de kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.3", + "matchCriteriaId": "AD29C5E9-9427-4C41-873F-C29493B892E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "6049E692-EB64-4E7D-A1AC-CEBA288B7A55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3", + "matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json index fa446029fd9..ec632fbeacc 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24200", "sourceIdentifier": "product-security@apple.com", "published": "2025-02-10T19:15:40.107", - "lastModified": "2025-02-18T18:15:33.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T19:48:51.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json index 97c7ddb1122..531d84dd609 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24301.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante el use after free. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json index 17bbddcb554..012b5ae8647 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios." + }, + { + "lang": "es", + "value": "En OpenHarmony v5.0.2 y versiones anteriores, se permite a un atacante local ejecutar c\u00f3digo arbitrario en aplicaciones preinstaladas mediante escritura fuera de los l\u00edmites. Esta vulnerabilidad solo se puede explotar en escenarios restringidos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24316.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24316.json index d14c3a395d2..e76ba641a34 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24316.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24316.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:16.790", "lastModified": "2025-02-28T17:15:16.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Dario Health Internet-based server infrastructure is vulnerable due to exposure of development environment details, which could lead to unsafe functionality." + }, + { + "lang": "es", + "value": "La infraestructura del servidor basado en Internet de Dario Health es vulnerable debido a la exposici\u00f3n de detalles del entorno de desarrollo, lo que podr\u00eda generar una funcionalidad insegura." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24318.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24318.json index 40f4245b469..80076638a8e 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24318.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24318.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:16.937", "lastModified": "2025-02-28T17:15:16.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cookie policy is observable via built-in browser tools. In the presence of XSS, this could lead to full session compromise." + }, + { + "lang": "es", + "value": "La pol\u00edtica de cookies se puede observar a trav\u00e9s de las herramientas integradas del navegador. En presencia de XSS, esto podr\u00eda provocar la vulneraci\u00f3n total de la sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json index ea11446f714..0e39bfc79d2 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.300", "lastModified": "2025-02-27T21:15:37.383", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json index c77a2b3c66a..a94b6f09530 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24407.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24407", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.497", - "lastModified": "2025-02-27T21:15:37.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -51,10 +71,101 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json index 9081068af76..d3d8bc673c6 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24408.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24408", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.677", - "lastModified": "2025-02-27T21:15:37.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,515 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json index f4d7ccf7d91..b83b8453484 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24409.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24409", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.860", - "lastModified": "2025-02-27T21:15:37.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,12 +69,515 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json index 572def7d03d..3b9df4f771b 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24410.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24410", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.057", - "lastModified": "2025-02-27T21:15:38.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json index e954f516efc..785e8879dac 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24411.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24411", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.243", - "lastModified": "2025-02-27T21:15:38.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,515 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json index f93958c4fc7..7873879e253 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24412.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24412", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.433", - "lastModified": "2025-02-27T21:15:38.317", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json index 3b4a6257a4e..e624ae7ee5c 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24413.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24413", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.623", - "lastModified": "2025-02-27T21:15:38.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json index bf83a3760f1..19c7f93eeb5 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24414.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24414", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.803", - "lastModified": "2025-02-27T21:15:38.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json index 494049db975..0519c759471 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24415.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24415", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:42.983", - "lastModified": "2025-02-27T21:15:38.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json index d67c7cc488b..6081c92d7ee 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24416.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24416", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.160", - "lastModified": "2025-02-27T21:15:38.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json index 5fa2f9895ce..0d821b26009 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24417.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24417", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.347", - "lastModified": "2025-02-27T21:15:39.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json index 5cdaed1357b..3a8418a18b8 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24418.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24418", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.527", - "lastModified": "2025-02-27T21:15:39.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,113 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json index 1ab602a9d93..a652041af62 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24419.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24419", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.713", - "lastModified": "2025-02-27T21:15:39.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,10 +71,101 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json index db8058e0cff..69ae8075c8f 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24420.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24420", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:43.893", - "lastModified": "2025-02-27T21:15:39.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,10 +71,101 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json index 53bf6df9706..4541bde8c53 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24421.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24421", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.077", - "lastModified": "2025-02-27T21:15:39.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,10 +71,503 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json index 31c9e25681f..20fd3bbb9fa 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24422.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24422", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.270", - "lastModified": "2025-02-27T21:15:39.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,113 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json index eb73f407f7e..e50774363ba 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24423.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24423", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.457", - "lastModified": "2025-02-27T21:15:39.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,113 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json index 8cb74a19e0a..9d844df5829 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24424.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24424", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.660", - "lastModified": "2025-02-27T21:15:40.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,113 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json index 1b47789ca6e..3bf6e62098d 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24425.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24425", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:44.857", - "lastModified": "2025-02-27T21:15:40.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,515 @@ "value": "CWE-840" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json index 880a1146dda..831398a840f 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24426.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24426", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.030", - "lastModified": "2025-02-27T21:15:40.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,113 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json index fe5086b71a6..d0e81c30ebc 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24427.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24427", "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:45.223", - "lastModified": "2025-02-27T21:15:40.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-03T15:52:41.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,12 +69,515 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6D05A958-9749-486A-A149-C21647CDCADF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json index ead33f5ae86..7251796564b 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24434.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json index d42f788ce83..a073efdc745 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24435.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json index c50f412e75d..dbd6f67080b 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24438.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json index 9adf2843068..30ad8893fde 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24494.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path traversal may allow remote code execution using privileged account \n(requires device admin account, cannot be performed by a regular user). \nIn combination with the 'Upload' functionality this could be used to \nexecute an arbitrary script or possibly an uploaded binary. Remediation \nin Version 6.7.0, release date: 20-Oct-24." + }, + { + "lang": "es", + "value": "El path traversal puede permitir la ejecuci\u00f3n remota de c\u00f3digo mediante una cuenta privilegiada (requiere una cuenta de administrador del dispositivo, no puede ser realizada por un usuario normal). En combinaci\u00f3n con la funci\u00f3n \"Cargar\", esto podr\u00eda usarse para ejecutar un script arbitrario o posiblemente un binario cargado. Soluci\u00f3n en la versi\u00f3n 6.7.0, fecha de lanzamiento: 20 de octubre de 2024." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json index 20b6c611fb5..8126799156c 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24521.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "External XML entity injection allows arbitrary download of files. The \nscore without least privilege principle violation is as calculated \nbelow. In combination with other issues it may facilitate further \ncompromise of the device. Remediation in Version 6.8.0, release date: \n01-Mar-25." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de entidades XML externas permite la descarga arbitraria de archivos. La puntuaci\u00f3n sin violaci\u00f3n del principio de privilegio m\u00ednimo se calcula a continuaci\u00f3n. En combinaci\u00f3n con otros problemas, puede facilitar una mayor vulnerabilidad del dispositivo. Soluci\u00f3n en la versi\u00f3n 6.8.0, fecha de lanzamiento: 01-Mar-25." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json index a37ff7a5eae..36d5ee6a137 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:36.160", "lastModified": "2025-01-24T18:15:36.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json index d3aa45c1d85..15244038db9 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T09:15:39.660", "lastModified": "2025-03-03T09:15:39.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in SEO Squirrly SEO Plugin by Squirrly SEO.This issue affects SEO Plugin by Squirrly SEO: from n/a through 12.4.05." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en SEO Squirrly SEO Plugin by Squirrly SEO. Este problema afecta al complemento SEO de Squirrly SEO: desde n/a hasta la versi\u00f3n 12.4.05." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24694.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24694.json index fd17cc519a2..16157279ba7 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24694.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24694.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.157", "lastModified": "2025-03-03T14:15:49.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Email Registration Blacklist and Whitelist allows Reflected XSS. This issue affects CM Email Registration Blacklist and Whitelist: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CreativeMindsSolutions CM Email Registration Blacklist and Whitelist permite XSS reflejado. Este problema afecta a la lista negra y blanca de registro de correo electr\u00f3nico de CM: desde n/a hasta 1.5.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json index e90984f3066..652b80b8c26 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-24T18:15:46.707", "lastModified": "2025-01-24T18:15:46.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24758.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24758.json index 44f5817d60a..907948d8075 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24758.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24758.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.300", "lastModified": "2025-03-03T14:15:49.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Map Locations allows Reflected XSS. This issue affects CM Map Locations: from n/a through 2.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CreativeMindsSolutions CM Map Locations permite XSS reflejado. Este problema afecta a CM Map Locations: desde n/a hasta 2.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json index c48cb15585e..42e881b5a34 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-27T15:15:17.450", "lastModified": "2025-01-27T15:15:17.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24796.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24796.json index f6653021d7f..d54e33e35e6 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24796.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24796.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Collabora Online is a collaborative online office suite based on LibreOffice. Macro support is disabled by default in Collabora Online, but can be enabled by an administrator. Collabora Online typically hosts each document instance within a jail and is allowed to download content from locations controlled by the net.lok_allow configuration option, which by default include the private IP ranges to enable access to the local network. If enabled, macros were allowed run executable binaries. By combining an ability to host executables, typically in the local network, in an allowed accessible location, with a macro enabled Collabora Online, it was then possible to install arbitrary binaries within the jail and execute them. These executables are restricted to the same jail file system and user as the document instance but can be used to bypass the additional limits on what network hosts are accessible and provide more flexibility as a platform for further attempts. This is issue is fixed in 24.04.12.4, 23.05.19, 22.05.25 and later macros." + }, + { + "lang": "es", + "value": "Collabora Online es una suite de oficina colaborativa en l\u00ednea basada en LibreOffice. El soporte de macros est\u00e1 deshabilitado de manera predeterminada en Collabora Online, pero puede ser habilitado por un administrador. Collabora Online normalmente aloja cada instancia de documento dentro de una c\u00e1rcel y se le permite descargar contenido desde ubicaciones controladas por la opci\u00f3n de configuraci\u00f3n net.lok_allow, que de manera predeterminada incluye los rangos de IP privados para habilitar el acceso a la red local. Si se habilitaba, se permit\u00eda que las macros ejecutaran binarios ejecutables. Al combinar la capacidad de alojar ejecutables, generalmente en la red local, en una ubicaci\u00f3n accesible permitida, con un Collabora Online con macros habilitadas, fue posible instalar binarios arbitrarios dentro de la c\u00e1rcel y ejecutarlos. Estos ejecutables est\u00e1n restringidos al mismo sistema de archivos de la c\u00e1rcel y al mismo usuario que la instancia del documento, pero se pueden usar para eludir los l\u00edmites adicionales sobre qu\u00e9 hosts de red son accesibles y brindar m\u00e1s flexibilidad como plataforma para intentos posteriores. Este problema se solucion\u00f3 en las macros 24.04.12.4, 23.05.19, 22.05.25 y posteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24832.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24832.json index 15625a0a3aa..19385d6847e 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24832.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24832.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@acronis.com", "published": "2025-02-27T23:15:37.310", "lastModified": "2025-02-27T23:15:37.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json index ce29b26342a..571915ce648 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24836.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:12.270", "lastModified": "2025-02-13T22:15:12.270", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24843.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24843.json index 32b178dcc2e..9512bf6e167 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24843.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24843.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:17.103", "lastModified": "2025-02-28T17:15:17.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure file retrieval process that facilitates potential for file manipulation to affect product stability and confidentiality, integrity, authenticity, and attestation of stored data." + }, + { + "lang": "es", + "value": "Proceso de recuperaci\u00f3n de archivos inseguro que facilita la posibilidad de manipulaci\u00f3n de archivos para afectar la estabilidad del producto y la confidencialidad, integridad, autenticidad y certificaci\u00f3n de los datos almacenados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24846.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24846.json index b4a399dc9f2..636f2907156 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24846.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24846.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-03-03T09:15:39.817", "lastModified": "2025-03-03T09:15:39.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication bypass vulnerability exists in FutureNet AS series (Industrial Routers) provided by Century Systems Co., Ltd. If this vulnerability is exploited, a remote unauthenticated attacker may obtain the device information such as MAC address by sending a specially crafted request." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en la serie FutureNet AS (enrutadores industriales) proporcionados por Century Systems Co., Ltd. Si se explota esta vulnerabilidad, un atacante remoto no autenticado puede obtener informaci\u00f3n del dispositivo, como la direcci\u00f3n MAC, enviando una solicitud especialmente manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24849.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24849.json index 9fd7bc57e36..0e48e2c98fc 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24849.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24849.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-28T17:15:17.253", "lastModified": "2025-02-28T17:15:17.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lack of encryption in transit for cloud infrastructure facilitating potential for sensitive data manipulation or exposure." + }, + { + "lang": "es", + "value": "Falta de cifrado en tr\u00e1nsito para la infraestructura en la nube, lo que facilita la posibilidad de manipulaci\u00f3n o exposici\u00f3n de datos confidenciales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24864.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24864.json index 5bf95d5cbe7..49bb0d8c760 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24864.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24864.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect access permission of a specific folder issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege." + }, + { + "lang": "es", + "value": "Existe un problema de permiso de acceso incorrecto a una carpeta espec\u00edfica en las versiones de RemoteView Agent (para Windows) anteriores a la v8.1.5.2. Si se aprovecha esta vulnerabilidad, un usuario no administrativo en la PC remota puede ejecutar un comando arbitrario del sistema operativo con privilegios de LocalSystem." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24924.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24924.json index b257f284163..6e12646b2ae 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24924.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24924.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Certain functionality within GMOD Apollo does not require authentication when passed with an administrative username" + }, + { + "lang": "es", + "value": "Ciertas funciones dentro de GMOD Apollo no requieren autenticaci\u00f3n cuando se pasan con un nombre de usuario administrativo" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25015.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25015.json index f3fa0c7182b..d110536ecd3 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25015.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests.\nIn Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors" + }, + { + "lang": "es", + "value": "La contaminaci\u00f3n de prototipos en Kibana conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una carga de archivo manipulada y solicitudes HTTP manipuladas espec\u00edficamente. En las versiones de Kibana >= 8.15.0 y < 8.17.1, esto es explotable por los usuarios con el rol de Visor. En las versiones de Kibana 8.17.1 y 8.17.2, esto solo es explotable por los usuarios que tienen roles que contienen todos los siguientes privilegios: flee-all, integrations-all, shares:execute-advanced-connectors" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25070.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25070.json index 83ec88d363d..a5c72cc3c95 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25070.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25070.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.490", "lastModified": "2025-03-03T14:15:49.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Album Reviewer allows Stored XSS. This issue affects Album Reviewer: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Album Reviewer permite XSS almacenado. Este problema afecta a Album Reviewer: desde n/a hasta 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25083.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25083.json index 80917fc0f90..b2c22490616 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25083.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25083.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.633", "lastModified": "2025-03-03T14:15:49.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EP4 More Embeds allows Stored XSS. This issue affects EP4 More Embeds: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound EP4 More Embeds permite XSS almacenado. Este problema afecta a EP4 More Embeds: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25084.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25084.json index 0c543888033..928d77dbea1 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25084.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25084.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.777", "lastModified": "2025-03-03T14:15:49.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound UniTimetable allows Stored XSS. This issue affects UniTimetable: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound UniTimetable permite XSS almacenado. Este problema afecta a UniTimetable: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25087.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25087.json index 6370e2cb043..8ca3fc7a72c 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25087.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25087.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:49.920", "lastModified": "2025-03-03T14:15:49.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound seekXL Snapr allows Reflected XSS. This issue affects seekXL Snapr: from n/a through 2.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound seekXL Snapr permite XSS reflejado. Este problema afecta a seekXL Snapr: desde n/a hasta 2.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25089.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25089.json index f2ef0843140..fcd045b5c6c 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25089.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25089.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.053", "lastModified": "2025-03-03T14:15:50.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in appten Image Rotator allows Reflected XSS. This issue affects Image Rotator: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en appten Image Rotator permite XSS reflejado. Este problema afecta a Image Rotator: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25090.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25090.json index 1b90a6f28aa..75b69fa1326 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25090.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25090.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.197", "lastModified": "2025-03-03T14:15:50.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Dreamstime Stock Photos allows Reflected XSS. This issue affects Dreamstime Stock Photos: from n/a through 4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Dreamstime Stock Photos permite XSS reflejado. Este problema afecta a Dreamstime Stock Photos: desde n/a hasta 4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25092.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25092.json index 764e1c8d13f..83d9ba4d454 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25092.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25092.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.343", "lastModified": "2025-03-03T14:15:50.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gtlwpdev All push notification for WP allows Reflected XSS. This issue affects All push notification for WP: from n/a through 1.5.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en gtlwpdev All push notification for WP permiten XSS reflejado. Este problema afecta a todas las notificaciones push para WP: desde n/a hasta 1.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25099.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25099.json index af388542a4b..1c2219da67a 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25099.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25099.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.490", "lastModified": "2025-03-03T14:15:50.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in accreteinfosolution Appointment Buddy Widget allows Reflected XSS. This issue affects Appointment Buddy Widget: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en accreteinfosolution Appointment Buddy Widget permite XSS reflejado. Este problema afecta al widget Appointment Buddy: desde n/a hasta 1.2. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25102.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25102.json index 1b73bb7437b..84806e60789 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25102.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25102.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.630", "lastModified": "2025-03-03T14:15:50.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Yahoo BOSS allows Reflected XSS. This issue affects Yahoo BOSS: from n/a through 0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Yahoo BOSS permite XSS reflejado. Este problema afecta a Yahoo BOSS: desde n/a hasta 0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25108.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25108.json index 433132d57a0..4af77be9c5e 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25108.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25108.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.767", "lastModified": "2025-03-03T14:15:50.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in shalomworld SW Plus allows Reflected XSS. This issue affects SW Plus: from n/a through 2.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en shalomworld SW Plus que permite XSS reflejado. Este problema afecta a SW Plus: desde n/a hasta 2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25109.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25109.json index 2a6510670cf..e8f944b0fd0 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25109.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25109.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:50.907", "lastModified": "2025-03-03T14:15:50.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound WP Vehicle Manager allows PHP Local File Inclusion. This issue affects WP Vehicle Manager: from n/a through 3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en NotFound WP Vehicle Manager permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a WP Vehicle Manager: desde n/a hasta 3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25112.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25112.json index 96aa915379a..078efdf997a 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25112.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25112.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.050", "lastModified": "2025-03-03T14:15:51.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Social Links allows Blind SQL Injection. This issue affects Social Links: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Social Links permite la inyecci\u00f3n SQL a ciegas. Este problema afecta a Social Links: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25113.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25113.json index f5e34447bb0..61028b7a9c6 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25113.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25113.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.193", "lastModified": "2025-03-03T14:15:51.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Implied Cookie Consent allows Reflected XSS. This issue affects Implied Cookie Consent: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Implied Cookie Consent permite XSS reflejado. Este problema afecta a Implied Cookie Consent: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25114.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25114.json index e927276b4c7..03fa36738b6 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25114.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25114.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.333", "lastModified": "2025-03-03T14:15:51.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ehabstar User Role allows Reflected XSS. This issue affects User Role: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ehabstar User Role permite XSS reflejado. Este problema afecta al rol de usuario: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25115.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25115.json index a32505cb8a9..2b4eef0a8f3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25115.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25115.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.477", "lastModified": "2025-03-03T14:15:51.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Like dislike plus counter allows Stored XSS. This issue affects Like dislike plus counter: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Like dislike plus counter permite XSS almacenado. Este problema afecta a Like dislike plus counter: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25118.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25118.json index f9ccd06a0e9..44d961b22aa 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25118.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25118.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.610", "lastModified": "2025-03-03T14:15:51.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Top Bar \u2013 PopUps \u2013 by WPOptin allows Reflected XSS. This issue affects Top Bar \u2013 PopUps \u2013 by WPOptin: from n/a through 2.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Top Bar \u2013 PopUps \u2013 de WPOptin permite XSS reflejado. Este problema afecta a Top Bar \u2013 PopUps \u2013 de WPOptin: desde n/a hasta 2.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25119.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25119.json index 42fc6a85f03..a0df2417834 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25119.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25119.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.750", "lastModified": "2025-03-03T14:15:51.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Woocommerce osCommerce Sync allows Reflected XSS. This issue affects Woocommerce osCommerce Sync: from n/a through 2.0.20." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Woocommerce osCommerce Sync permite XSS reflejado. Este problema afecta a Woocommerce osCommerce Sync: desde n/a hasta 2.0.20." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25121.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25121.json index de40b260508..8da0c5ac9c7 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25121.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25121.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:51.887", "lastModified": "2025-03-03T14:15:51.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Theme Options Z allows Stored XSS. This issue affects Theme Options Z: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Theme Options Z permite XSS almacenado. Este problema afecta a las opciones de tema Z: desde n/a hasta 1.4. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25122.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25122.json index 4ff97f85bf0..f53295e5ee0 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25122.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25122.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.033", "lastModified": "2025-03-03T14:15:52.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal vulnerability in NotFound WizShop allows PHP Local File Inclusion. This issue affects WizShop: from n/a through 3.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad Path Traversal en NotFound WizShop permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a WizShop desde n/a hasta 3.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25124.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25124.json index 6d0eae81d0c..92cfd53cf2c 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25124.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25124.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.183", "lastModified": "2025-03-03T14:15:52.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in devu Status Updater allows Reflected XSS. This issue affects Status Updater: from n/a through 1.9.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en devu Status Updater que permite XSS reflejado. Este problema afecta a Status Updater: desde n/a hasta 1.9.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25127.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25127.json index 5e1b53386f7..bd357366374 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25127.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25127.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.320", "lastModified": "2025-03-03T14:15:52.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rohitashv Singhal Contact Us By Lord Linus allows Reflected XSS. This issue affects Contact Us By Lord Linus: from n/a through 2.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Rohitashv Singhal Contact Us By Lord Linus permite XSS reflejado. Este problema afecta a Contact Us By Lord Linus: desde n/a hasta 2.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25129.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25129.json index 509542b6bea..fd7af823bac 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25129.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25129.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.460", "lastModified": "2025-03-03T14:15:52.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Callback Request allows Reflected XSS. This issue affects Callback Request: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Callback Request permite XSS reflejado. Este problema afecta a Callback Request: desde n/a hasta 1.4. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25130.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25130.json index c438807452e..6e64ed108b9 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25130.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25130.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.613", "lastModified": "2025-03-03T14:15:52.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in NotFound Delete Comments By Status allows PHP Local File Inclusion. This issue affects Delete Comments By Status: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de path traversal relativa en NotFound Delete Comments By Status permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Delete Comments By Status: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25131.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25131.json index 98866fd0372..448472592bc 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25131.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25131.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.777", "lastModified": "2025-03-03T14:15:52.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RJ Quickcharts allows Stored XSS. This issue affects RJ Quickcharts: from n/a through 0.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound RJ Quickcharts permite XSS almacenado. Este problema afecta a RJ Quickcharts: desde n/a hasta 0.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25132.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25132.json index 6cc6c6adf3d..e5ae22963ae 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25132.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25132.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:52.917", "lastModified": "2025-03-03T14:15:52.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ravi Singh Visitor Details allows Stored XSS. This issue affects Visitor Details: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Visitor Details de ravi Singh que permite XSS almacenado. Este problema afecta a Visitor Details: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25133.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25133.json index 7d3fd5dfbc1..0c067fa9e74 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25133.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25133.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.060", "lastModified": "2025-03-03T14:15:53.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Frontend Submit allows Cross-Site Scripting (XSS). This issue affects WP Frontend Submit: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Frontend Submit que permite Cross-Site Scripting (XSS). Este problema afecta a WP Frontend Submit: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25137.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25137.json index 0ced86bff2e..3b42cd784b3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25137.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25137.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.200", "lastModified": "2025-03-03T14:15:53.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Social Links allows Stored XSS. This issue affects Social Links: from n/a through 1.0.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Social Links permite XSS almacenado. Este problema afecta a Social Links: desde n/a hasta 1.0.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25142.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25142.json index 73a9a388510..1ad4a4ed62b 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25142.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25142.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.337", "lastModified": "2025-03-03T14:15:53.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Less Compiler allows Stored XSS. This issue affects WP Less Compiler: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Less Compiler que permite XSS almacenado. Este problema afecta a WP Less Compiler: desde n/a hasta 1.3.0. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25150.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25150.json index 3a7b8ef89e2..1530eecf369 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25150.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25150.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.477", "lastModified": "2025-03-03T14:15:53.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix uListing allows Blind SQL Injection. This issue affects uListing: from n/a through 2.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Stylemix uListing permite la inyecci\u00f3n SQL ciega. Este problema afecta a uListing: desde n/a hasta 2.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25157.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25157.json index c0cc3035f10..ba8e3f984ad 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25157.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25157.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.617", "lastModified": "2025-03-03T14:15:53.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Church Center allows Reflected XSS. This issue affects WP Church Center: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Church Center que permite XSS reflejado. Este problema afecta a WP Church Center: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25158.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25158.json index 644586ee495..f1a45276d0f 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25158.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25158.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.760", "lastModified": "2025-03-03T14:15:53.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Uncomplicated SEO allows Reflected XSS. This issue affects Uncomplicated SEO: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Uncomplicated SEO permite XSS reflejado. Este problema afecta a Uncomplicated SEO: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25161.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25161.json index 30d6fbbc5cf..7a382d41db3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25161.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25161.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:53.900", "lastModified": "2025-03-03T14:15:53.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Find Your Nearest allows Reflected XSS. This issue affects WP Find Your Nearest: from n/a through 0.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WP Find Your Neest permite XSS reflejado. Este problema afecta a WP Find Your Neest: desde n/a hasta 0.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25162.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25162.json index bebb79634cf..4df017e4f6d 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25162.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25162.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.040", "lastModified": "2025-03-03T14:15:54.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Sports Rankings and Lists allows Absolute Path Traversal. This issue affects Sports Rankings and Lists: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en NotFound Sports Rankings and Lists permite la navegaci\u00f3n Path Traversal. Este problema afecta a las clasificaciones y listas deportivas desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25164.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25164.json index cd0b44e3b0e..d4cfdb25705 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25164.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25164.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.190", "lastModified": "2025-03-03T14:15:54.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Meta Accelerator allows Reflected XSS. This issue affects Meta Accelerator: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Meta Accelerator permite XSS reflejado. Este problema afecta a Meta Accelerator: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25165.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25165.json index f20a5ced473..ebceb8c3fa1 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25165.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25165.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.330", "lastModified": "2025-03-03T14:15:54.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staff Directory Plugin: Company Directory allows Stored XSS. This issue affects Staff Directory Plugin: Company Directory: from n/a through 4.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Staff Directory Plugin: Company Directory permite XSS almacenado. Este problema afecta al complemento Staff Directory: Company Directory: desde n/a hasta la versi\u00f3n 4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25169.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25169.json index 47de4041a03..b88e9d35983 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25169.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25169.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.477", "lastModified": "2025-03-03T14:15:54.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Authors Autocomplete Meta Box allows Reflected XSS. This issue affects Authors Autocomplete Meta Box: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Authors Autocomplete Meta Box permite XSS reflejado. Este problema afecta al cuadro de metadatos de autocompletar de autores: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25170.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25170.json index b672fd4a9be..4641d6e4696 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25170.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.613", "lastModified": "2025-03-03T14:15:54.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Migrate Posts allows Reflected XSS. This issue affects Migrate Posts: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Migrate Posts permite XSS reflejado. Este problema afecta a Migrate Posts: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25191.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25191.json index fd2dbdc3fe5..f8e1063c12e 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25191.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25191.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Group-Office is an enterprise CRM and groupware tool. This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored. This vulnerability is fixed in 6.8.100." + }, + { + "lang": "es", + "value": "Group-Office es una herramienta de CRM y groupware empresarial. Esta vulnerabilidad de XSS almacenado existe cuando la entrada del usuario en el campo Nombre no se depura correctamente antes de almacenarse. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 6.8.100." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25280.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25280.json index de0ebed320d..9f3298c1966 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25280.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25280.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-03-03T09:15:39.990", "lastModified": "2025-03-03T09:15:39.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability exists in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) provided by Century Systems Co., Ltd. If this vulnerability is exploited, a remote unauthenticated attacker may reboot the device by sending a specially crafted request." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en las series FutureNet AS (enrutadores industriales) y FA (m\u00e1quinas de conversi\u00f3n de protocolo) proporcionadas por Century Systems Co., Ltd. Si se explota esta vulnerabilidad, un atacante remoto no autenticado puede reiniciar el dispositivo enviando una solicitud especialmente manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json index 7500f1e11ca..1f59de104c7 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:13.263", "lastModified": "2025-02-13T22:15:13.263", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,16 +93,61 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:outbackpower:mojave_inverter_oghi8048a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC23DE7E-9B4B-4897-A62B-EDF8D05CD060" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:outbackpower:mojave_inverter_oghi8048a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E2A2D63-B4BD-40EE-8963-904DAC28A861" + } + ] + } + ] } ], "references": [ { "url": "https://old.outbackpower.com/about-outback/contact/contact-us", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25294.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25294.json index 0c65425b2fd..1143b7589af 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25294.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25294.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnerable to log injection attacks. If the attacker uses a specially crafted user-agent which performs json injection, then he could add and overwrite fields to the access log. This vulnerability is fixed in 1.3.1 and 1.2.7. One can overwrite the old text based default format with JSON formatter by modifying the \"EnvoyProxy.spec.telemetry.accessLog\" setting." + }, + { + "lang": "es", + "value": "Envoy Gateway es un proyecto de c\u00f3digo abierto para administrar Envoy Proxy como una puerta de enlace de aplicaciones independiente o basada en Kubernetes. En todas las versiones de Envoy Gateway anteriores a 1.2.7 y 1.3.1 se utiliza una configuraci\u00f3n de registro de acceso de Envoy Proxy predeterminada. Este formato es vulnerable a ataques de inyecci\u00f3n de registros. Si el atacante utiliza un agente de usuario especialmente manipulado que realiza una inyecci\u00f3n JSON, podr\u00eda agregar y sobrescribir campos en el registro de acceso. Esta vulnerabilidad se solucion\u00f3 en 1.3.1 y 1.2.7. Se puede sobrescribir el antiguo formato predeterminado basado en texto con el formateador JSON modificando la configuraci\u00f3n \"EnvoyProxy.spec.telemetry.accessLog\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25302.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25302.json index de469f1522b..d019ef72c9e 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25302.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25302.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:14.920", "lastModified": "2025-03-03T17:15:14.920", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middleware is setup incorrectly. All origins are reflected, which allows any website to send cross site requests to the rembg server and thus query any API. Even if authentication were to be enabled, allow_credentials is set to True, which would allow any website to send authenticated cross site requests." + }, + { + "lang": "es", + "value": "Rembg es una herramienta para eliminar el fondo de las im\u00e1genes. En Rembg 2.0.57 y versiones anteriores, el middleware CORS est\u00e1 configurado incorrectamente. Se reflejan todos los or\u00edgenes, lo que permite que cualquier sitio web env\u00ede solicitudes entre sitios al servidor rembg y, por lo tanto, consulte cualquier API. Incluso si se habilitara la autenticaci\u00f3n, allow_credentials se establece en True, lo que permitir\u00eda que cualquier sitio web env\u00ede solicitudes autenticadas entre sitios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25303.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25303.json index 7ff25ee7155..bd7d981576d 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25303.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25303.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:15.073", "lastModified": "2025-03-03T17:15:15.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MouseTooltipTranslator Chrome extension allows mouseover translation of any language at once. The MouseTooltipTranslator browser extension is vulnerable to SSRF attacks. The pdf.mjs script uses the URL parameter from the current URL as the file to download and display to the extension user. Because pdf.mjs is imported in viewer.html and viewer.html is accessible to all URLs, an attacker can force the user\u2019s browser to make a request to any arbitrary URL. After discussion with maintainer, patching this issue would require disabling a major feature of the extension in exchange for a low severity vulnerability. Decision to not patch issue." + }, + { + "lang": "es", + "value": "La extensi\u00f3n de Chrome MouseTooltipTranslator permite traducir cualquier idioma a la vez con el mouse. La extensi\u00f3n del navegador MouseTooltipTranslator es vulnerable a ataques SSRF. El script pdf.mjs usa el par\u00e1metro URL de la URL actual como el archivo que se descargar\u00e1 y mostrar\u00e1 al usuario de la extensi\u00f3n. Debido a que pdf.mjs se importa en viewer.html y viewer.html es accesible para todas las URL, un atacante puede forzar al navegador del usuario a realizar una solicitud a cualquier URL arbitraria. Despu\u00e9s de discutirlo con el fabricante, para solucionar este problema ser\u00eda necesario deshabilitar una caracter\u00edstica importante de la extensi\u00f3n a cambio de una vulnerabilidad de baja gravedad. Se decidi\u00f3 no solucionar el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json index 34ad321cf7d..2119866e93c 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25323.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.637", "lastModified": "2025-02-28T16:15:38.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json index d0fad60b80a..53e78bf082b 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.760", "lastModified": "2025-02-28T16:15:38.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json index 8933851268c..512407e291b 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25325.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.870", "lastModified": "2025-02-28T16:15:38.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json index a3f79bb3016..c6d9a5f750b 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:39.987", "lastModified": "2025-02-28T16:15:38.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json index 67ebddf0c4d..848308661ae 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25329.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T17:15:16.773", "lastModified": "2025-02-28T16:15:38.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json index 1634140aac9..dfb58c2ec6a 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25330.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.103", "lastModified": "2025-02-28T16:15:38.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json index 9744e21172a..7025a44238e 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25331.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.217", "lastModified": "2025-02-28T16:15:39.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25333.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25333.json index c99e6195171..148bded1313 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25333.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.350", "lastModified": "2025-02-27T20:16:05.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json index 4e99db8da06..37fca300c84 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T16:15:40.463", "lastModified": "2025-02-28T16:15:39.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json index a4322ba6eaa..386f06e6425 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Server-Side Template Injection (SSTI) en Spacy-LLM v0.7.2 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la inyecci\u00f3n de un payload manipulado en el campo de plantilla." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json index 082ba1c2d38..da25e748098 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T19:15:36.883", "lastModified": "2025-02-28T23:15:10.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page." + }, + { + "lang": "es", + "value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s de la variable r_name dentro de la funci\u00f3n have_same_name en la p\u00e1gina /addschedule.htm." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json index b01c06d4538..c5fdb783acf 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25461.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T16:15:39.387", "lastModified": "2025-02-28T16:15:39.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the \"Add Category\" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en SeedDMS 6.0.29. Un usuario o administrador malintencionado con el permiso \"Agregar categor\u00eda\" puede inyectar un payload XSS malicioso en el campo de nombre de la categor\u00eda. Cuando un documento se asocia posteriormente con esta categor\u00eda, el payload se almacena en el servidor y se procesa sin la depuraci\u00f3n o codificaci\u00f3n de salida adecuadas. Esto hace que el payload XSS se ejecute en el navegador de cualquier usuario que vea el documento." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25462.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25462.json index 0471160b446..10ba71c6c6c 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25462.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25462.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T16:15:16.933", "lastModified": "2025-02-26T16:15:16.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json index 08f0cad4c12..aca67cbc509 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25477.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.380", "lastModified": "2025-02-28T16:15:39.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A host header injection vulnerability in SysPass 3.2x allows an attacker to load malicious JS files from an arbitrary domain which would be executed in the victim's browser." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de encabezado de host en SysPass 3.2x permite a un atacante cargar archivos JS maliciosos desde un dominio arbitrario que se ejecutar\u00edan en el navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25514.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25514.json index 2cf19dcf046..44b07f2fc90 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25514.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25514.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:23.900", "lastModified": "2025-02-28T22:15:39.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25515.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25515.json index 40629c95621..89b81a736ac 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25515.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25515.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:23.983", "lastModified": "2025-02-26T15:15:25.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25516.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25516.json index 68b79305955..70c4b1b3cd2 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25516.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25516.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:24.067", "lastModified": "2025-02-26T15:15:25.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25517.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25517.json index bda4e41fef6..660560c0646 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25517.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:24.160", "lastModified": "2025-02-26T15:15:25.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25519.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25519.json index 3374e10d78c..d4802f254d1 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25519.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25519.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:24.257", "lastModified": "2025-02-26T15:15:25.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25520.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25520.json index 548565192f7..119fdd9f10f 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25520.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:24.340", "lastModified": "2025-02-26T15:15:26.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25521.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25521.json index 704bdd05323..17e44d7833c 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25521.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-25T22:15:24.430", "lastModified": "2025-02-26T15:15:26.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25570.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25570.json index f782c650eb4..a1ed5fe26da 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25570.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.707", "lastModified": "2025-02-28T22:15:39.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json index cbf2780270f..893daf22d35 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet." + }, + { + "lang": "es", + "value": "Tenda AC15 v15.03.05.19 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n del controlador en /goform/telnet." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25724.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25724.json index dfff1d98c80..38d8080c85d 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25724.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25724.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-02T02:15:36.603", "lastModified": "2025-03-02T02:15:36.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale." + }, + { + "lang": "es", + "value": "list_item_verbose en tar/util.c en libarchive hasta 3.7.7 no verifica un valor de retorno de strftime, lo que puede provocar una denegaci\u00f3n de servicio u otro impacto no especificado a trav\u00e9s de un archivo TAR manipulado que se lee con un valor verbose de 2. Por ejemplo, el b\u00fafer de 100 bytes puede no ser suficiente para una configuraci\u00f3n regional personalizada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25727.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25727.json index 21db1397c85..93f1208727b 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25727.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25727.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.530", "lastModified": "2025-02-28T00:15:36.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 were discovered to store passwords in cleartext." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que las versiones de firmware 11001.7078 y v11001.0000 y las versiones del sistema 6.25 y 6.00 del Bosscomm IF740 almacenan contrase\u00f1as en texto plano." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25728.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25728.json index 41f3f9b14d4..d56838b3fae 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25728.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25728.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.680", "lastModified": "2025-02-28T00:15:36.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 were discovered to send communications to the update API in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que las versiones de firmware 11001.7078 y v11001.0000 y las versiones del sistema 6.25 y 6.00 de Bosscomm IF740 enviaban comunicaciones a la API de actualizaci\u00f3n en texto plano, lo que permit\u00eda a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json index 41cb3defdad..360bc1b1508 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25729.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T00:15:36.827", "lastModified": "2025-02-28T16:15:39.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en las versiones de firmware 11001.7078 y v11001.0000 de Bosscomm IF740 y las versiones del sistema 6.25 y 6.00 permite a los atacantes obtener credenciales de texto plano codificadas mediante el proceso de actualizaci\u00f3n o arranque." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json index c3361c3d982..e115d1c3ff1 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.820", "lastModified": "2025-02-28T20:15:46.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25761.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25761.json index 6d607d396c8..8d4977a0319 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25761.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25761.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T15:15:41.777", "lastModified": "2025-02-27T15:15:41.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25791.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25791.json index 8f239806975..50e471a13f7 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25791.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.100", "lastModified": "2025-03-03T18:15:40.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25792.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25792.json index 9cc86bb9ee6..d18394f20dc 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25792.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25792.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.230", "lastModified": "2025-03-03T21:15:18.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json index 5ce20be8b86..e8b0a7bb003 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.993", "lastModified": "2025-02-26T16:15:17.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25818.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25818.json index 1047ffe35f8..0c96c0b4112 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25818.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25818.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:28.367", "lastModified": "2025-03-03T17:15:15.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json index cebf71070a4..0ea12351d14 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25916.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T15:15:13.613", "lastModified": "2025-02-28T16:15:39.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "wuzhicms v4.1.0 has a Cross Site Scripting (XSS) vulnerability in del function in \\coreframe\\app\\member\\admin\\group.php." + }, + { + "lang": "es", + "value": "wuzhicms v4.1.0 tiene una vulnerabilidad de cross site scripting (XSS) en la funci\u00f3n del en \\coreframe\\app\\member\\admin\\group.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json index 207e22f5070..a70813f877c 100644 --- a/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability exists in TeamPasswordManager v12.162.284 and before that could allow a remote attacker to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'name' parameter when creating a new password in the \"My Passwords\" page." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting (XSS) en TeamPasswordManager v12.162.284 y anteriores podr\u00eda permitir a un atacante remoto ejecutar JavaScript arbitrario en el navegador del usuario, incluyendo un payload malicioso en el par\u00e1metro 'name' al crear una nueva contrase\u00f1a en la p\u00e1gina \"Mis contrase\u00f1as\" (\"My Passwords\")." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json index 047328b8679..4d87df6d65d 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26206.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T19:15:35.507", "lastModified": "2025-03-04T17:15:18.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json index 41a61a04874..2439cd8e58f 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.947", "lastModified": "2025-02-28T22:15:39.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26325.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26325.json index dd3bba912f7..ccb27d0114d 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26325.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26325.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:39.057", "lastModified": "2025-02-28T22:15:39.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json index 03a401b7434..fd32e704cdf 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26367.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26367", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.533", - "lastModified": "2025-02-12T14:15:37.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26367", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json index feb85e9d62e..641f5a9df3a 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26368.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26368", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.660", - "lastModified": "2025-02-12T14:15:37.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26368", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json index 4ccea456e34..165365889f9 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26369.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26369", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.800", - "lastModified": "2025-02-12T14:15:37.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26369", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json index eb716e67665..98e87bbff07 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26370.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:37.940", "lastModified": "2025-02-12T14:15:37.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json index 837b641598d..447468e27f2 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26371.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26371", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.077", - "lastModified": "2025-02-12T14:15:38.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26371", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json index 7b9a7da1140..041ec4dc62f 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26372.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26372", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.227", - "lastModified": "2025-02-12T14:15:38.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26372", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json index 977aa32eec4..13210d2e79f 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.360", "lastModified": "2025-02-12T14:15:38.360", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json index 5aa89b66f4d..9046fc77e25 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26374.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26374", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.500", - "lastModified": "2025-02-12T14:15:38.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26374", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json index 7eeb59dbf40..7d683d87769 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26375.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26375", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.633", - "lastModified": "2025-02-12T14:15:38.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26375", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json index 6332f4de1b9..ca8186817af 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26376.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26376", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.777", - "lastModified": "2025-02-12T14:15:38.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26376", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json index eb1f6b4b92e..8eef8aef4df 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26377.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:38.933", "lastModified": "2025-02-12T14:15:38.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json index 607562e8f56..20e57816893 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26378.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26378", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:39.163", - "lastModified": "2025-02-12T14:15:39.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-03T19:36:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:q-free:maxtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "3BCAC20E-CD58-4376-BD70-584BCC62FA4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26378", - "source": "prodsec@nozominetworks.com" + "source": "prodsec@nozominetworks.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json index 27ec58eb149..d3b125fd481 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26465", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T19:15:29.230", - "lastModified": "2025-03-03T18:15:40.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T18:54:18.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 } ] }, @@ -51,74 +71,204 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndIncluding": "9.8", + "matchCriteriaId": "AD9E4318-20E3-420F-8EF5-7C05C3386586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*", + "matchCriteriaId": "50836FA3-8116-4D58-B73E-B4830FB3A551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*", + "matchCriteriaId": "E2B53BBB-6916-478C-A896-77C7F7E7D5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*", + "matchCriteriaId": "F7A2B794-BA83-4A01-BD2E-541F18CB9E37" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", + "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26465", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344780", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237040", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-February/000161.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250228-0003/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://ubuntu.com/security/CVE-2025-26465", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openssh.com/releasenotes.html#9.9p2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://seclists.org/oss-sec/2025/q1/144", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26466.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26466.json index 217bbc14326..7d13bf5cb67 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26466.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26466.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26466", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-28T22:15:40.080", - "lastModified": "2025-03-05T04:15:12.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T14:05:15.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,48 +49,192 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "B95D97F9-56D8-4A03-8D97-C9C3BC103AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:*", + "matchCriteriaId": "2AFDD23D-3B76-4942-B222-843918EE7996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "EA15AB35-EE6C-4435-9CD3-02E77A581CCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:*", + "matchCriteriaId": "35061B84-4628-469C-BEC2-06207F066F30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "E0DA97F7-489E-416E-9A01-DE7E4ABB8E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*", + "matchCriteriaId": "BF2C0441-653D-4BD3-A45D-D97C929A596F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:*", + "matchCriteriaId": "63A10946-C4A4-4F77-828D-568579A2599C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*", + "matchCriteriaId": "E2B53BBB-6916-478C-A896-77C7F7E7D5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*", + "matchCriteriaId": "F7A2B794-BA83-4A01-BD2E-541F18CB9E37" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "BF90B5A4-6E55-4369-B9D4-E7A061E797D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*", + "matchCriteriaId": "DE07EF30-B50E-4054-9918-50EFA416073B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "204FC6CC-9DAC-45FB-8A9F-C9C8EDD29D54" + } + ] + } + ] } ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-26466", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345043", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1237041", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security-tracker.debian.org/tracker/CVE-2025-26466", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250228-0002/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://ubuntu.com/security/CVE-2025-26466", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2025/02/18/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json index 0ca1f84204a..cfa6c76e598 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-13T22:15:13.417", "lastModified": "2025-02-13T22:15:13.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json index 1751e391dc8..02d3abae789 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T07:15:08.617", "lastModified": "2025-02-12T07:15:08.617", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.29", + "matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Cacti/cacti/commit/7fa60c03ad4a69c701ac6b77c85a8927df7acd51", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Cacti/cacti/pull/6096", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26534.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26534.json index 3638a8f296b..394693672ee 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26534.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26534.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.757", "lastModified": "2025-03-03T14:15:54.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en NotFound Helloprint permite Path Traversal. Este problema afecta a Helloprint: desde n/a hasta 2.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26535.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26535.json index 4ca82b5636c..7c4608862f7 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26535.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26535.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:54.900", "lastModified": "2025-03-03T14:15:54.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Bitcoin / AltCoin Payment Gateway for WooCommerce allows Blind SQL Injection. This issue affects Bitcoin / AltCoin Payment Gateway for WooCommerce: from n/a through 1.7.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Bitcoin / AltCoin Payment Gateway for WooCommerce permite la inyecci\u00f3n SQL ciega. Este problema afecta a Bitcoin / AltCoin Payment Gateway for WooCommerce: desde n/a hasta 1.7.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26540.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26540.json index 9f4e292deab..dce735cf1f5 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26540.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26540.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.037", "lastModified": "2025-03-03T14:15:55.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en NotFound Helloprint permite Path Traversal. Este problema afecta a Helloprint: desde n/a hasta 2.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26557.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26557.json index dd6f6510883..096cece3584 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26557.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26557.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.173", "lastModified": "2025-03-03T14:15:55.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ViperBar allows Reflected XSS. This issue affects ViperBar: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound ViperBar permite XSS reflejado. Este problema afecta a ViperBar: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26563.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26563.json index b03a5690a9d..beb10d7db88 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26563.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26563.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.310", "lastModified": "2025-03-03T14:15:55.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mobile allows Reflected XSS. This issue affects Mobile: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Mobile permite XSS reflejado. Este problema afecta a Mobile: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26585.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26585.json index 2e54c8abe2b..4711fb7c6e4 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26585.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26585.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.470", "lastModified": "2025-03-03T14:15:55.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DL Leadback allows Reflected XSS. This issue affects DL Leadback: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DL Leadback permite XSS reflejado. Este problema afecta a DL Leadback: desde n/a hasta 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26586.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26586.json index 6fcb65ac84e..e8924a63f44 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26586.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26586.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.640", "lastModified": "2025-03-03T14:15:55.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Events Planner allows Reflected XSS. This issue affects Events Planner: from n/a through 1.3.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Events Planner permite XSS reflejado. Este problema afecta a Events Planner: desde n/a hasta 1.3.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26587.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26587.json index 9f292201878..b37c61f1e33 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26587.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26587.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.780", "lastModified": "2025-03-03T14:15:55.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound sidebarTabs allows Reflected XSS. This issue affects sidebarTabs: from n/a through 3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound sidebarTabs permite XSS reflejado. Este problema afecta a sidebarTabs: desde n/a hasta 3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26588.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26588.json index 7c67669bcf4..637e1baf786 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26588.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26588.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:55.920", "lastModified": "2025-03-03T14:15:55.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound TTT Crop allows Reflected XSS. This issue affects TTT Crop: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound TTT Crop permite XSS reflejado. Este problema afecta a TTT Crop: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26589.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26589.json index e36f297dde5..4db82233109 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26589.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26589.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.067", "lastModified": "2025-03-03T14:15:56.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound IE CSS3 Support allows Reflected XSS. This issue affects IE CSS3 Support: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound IE CSS3 Support permite XSS reflejado. Este problema afecta a IE CSS3 Support: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26698.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26698.json index 138187534b3..ded91d2b27c 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26698.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-26T13:15:41.983", "lastModified": "2025-02-26T13:15:41.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json index 261aec67310..54fac4d6876 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26849.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a Hard-coded Cryptographic Key in Docusnap 13.0.1440.24261, and earlier and later versions. This key can be used to decrypt inventory files that contain sensitive information such as firewall rules." + }, + { + "lang": "es", + "value": "Hay una clave criptogr\u00e1fica codificada de forma r\u00edgida en Docusnap 13.0.1440.24261 y en versiones anteriores y posteriores. Esta clave se puede utilizar para descifrar archivos de inventario que contienen informaci\u00f3n confidencial, como reglas de firewall." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26879.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26879.json index ec016ae5851..da62ac2082d 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26879.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26879.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.213", "lastModified": "2025-03-03T14:15:56.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cristi\u00e1n L\u00e1vaque s2Member Pro allows Reflected XSS. This issue affects s2Member Pro: from n/a through 241216." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en s2Member Pro de Cristi\u00e1n L\u00e1vaque que permite XSS reflejado. Este problema afecta a s2Member Pro: desde n/a hasta 241216." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26885.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26885.json index e2c241edcd4..864c556c64b 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26885.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26885.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.360", "lastModified": "2025-03-03T14:15:56.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Brent Jett Assistant allows Object Injection. This issue affects Assistant: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Brent Jett Assistant permite la inyecci\u00f3n de objetos. Este problema afecta a Assistant desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26914.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26914.json index 1056e5e21ac..09b8614dfbf 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26914.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26914.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.500", "lastModified": "2025-03-03T14:15:56.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bowo Variable Inspector allows Reflected XSS. This issue affects Variable Inspector: from n/a through 2.6.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bowo Variable Inspector permite XSS reflejado. Este problema afecta a Variable Inspector: desde n/a hasta 2.6.2. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26917.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26917.json index 68f1ad1d90a..f96101515c9 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26917.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26917.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.640", "lastModified": "2025-03-03T14:15:56.640", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes WP Templata allows Reflected XSS. This issue affects WP Templata: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HasThemes WP Templata permite XSS reflejado. Este problema afecta a WP Templata: desde n/a hasta 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26918.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26918.json index 78cbdc3501a..f43eedfa0ea 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26918.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26918.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.787", "lastModified": "2025-03-03T14:15:56.787", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology Small Package Quotes \u2013 Unishippers Edition allows Reflected XSS. This issue affects Small Package Quotes \u2013 Unishippers Edition: from n/a through 2.4.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Small Package Quotes \u2013 Unishippers Edition de enituretechnology que permite XSS reflejado. Este problema afecta a Small Package Quotes \u2013 Unishippers Edition: desde n/a hasta 2.4.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26925.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26925.json index 6b44ed452d5..f0c3f3a68cd 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26925.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-26T14:15:11.743", "lastModified": "2025-02-26T14:15:11.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "audit@patchstack.com", diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26967.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26967.json index c73e568438b..7891fbd3857 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26967.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26967.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26967", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:56.927", - "lastModified": "2025-03-03T14:15:56.927", - "vulnStatus": "Received", + "lastModified": "2025-03-07T20:44:44.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Stiofan Events Calendar for GeoDirectory allows Object Injection. This issue affects Events Calendar for GeoDirectory: from n/a through 2.3.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Stiofan Events Calendar for GeoDirectory permite la inyecci\u00f3n de objetos. Este problema afecta a Events Calendar for GeoDirectory: desde n/a hasta 2.3.14." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpgeodirectory:events_calendar*:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.15", + "matchCriteriaId": "9628A4D2-968C-4554-A389-7C437C0C4094" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/events-for-geodirectory/vulnerability/wordpress-events-calendar-for-geodirectory-plugin-2-3-14-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26970.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26970.json index a573119d35e..779bc8bbcde 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26970.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26970.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:57.077", "lastModified": "2025-03-03T14:15:57.077", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Ark Theme Core allows Code Injection. This issue affects Ark Theme Core: from n/a through 1.70.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en NotFound Ark Theme Core permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta al n\u00facleo tem\u00e1tico de Ark: desde n/a hasta 1.70.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26999.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26999.json index 9cec1cac19b..1bb19f240b4 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26999.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26999.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:57.830", "lastModified": "2025-03-03T14:15:57.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Metagauss ProfileGrid allows Object Injection. This issue affects ProfileGrid : from n/a through 5.9.4.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Metagauss ProfileGrid permite la inyecci\u00f3n de objetos. Este problema afecta a ProfileGrid desde n/a hasta 5.9.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27094.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27094.json index 54b21dc0427..c9f48954024 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27094.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27094.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:43.023", "lastModified": "2025-03-03T17:15:15.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto dise\u00f1ada para mejorar la gesti\u00f3n y la colaboraci\u00f3n en el desarrollo de software. Un usuario malintencionado con acceso a un rastreador podr\u00eda forzar el restablecimiento de ciertas configuraciones de campo, lo que podr\u00eda provocar una posible p\u00e9rdida de informaci\u00f3n. El atributo de tiempo de visualizaci\u00f3n para el campo de fecha, el atributo de tama\u00f1o para el campo de cuadro de selecci\u00f3n m\u00faltiple, los atributos de valor predeterminado, n\u00famero de filas y columnas para el campo de texto, y los atributos de valor predeterminado, tama\u00f1o y m\u00e1ximo de caracteres para las configuraciones del campo de cadena se pierden cuando se agregan como criterios en un informe guardado. Adem\u00e1s, en las versiones 16.4.99.1739806825 a 16.4.99.1739877910 de Tuleap Community Edition, este problema podr\u00eda aprovecharse para evitar el acceso a los datos del rastreador al provocar un bloqueo. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1739877910 y Tuleap Enterprise Edition 16.3-9 y 16.4-4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27099.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27099.json index 883389091b9..bbbb81b592c 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27099.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27099.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T16:15:43.173", "lastModified": "2025-03-03T17:15:15.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Tuleap permite la ejecuci\u00f3n de cross-site scripting (XSS) a trav\u00e9s de los nombres de los rastreadores utilizados en el mensaje de eliminaci\u00f3n del marco temporal sem\u00e1ntico. Un administrador de rastreadores con un marco temporal sem\u00e1ntico utilizado por otros rastreadores podr\u00eda utilizar esta vulnerabilidad para obligar a otros administradores de rastreadores a ejecutar c\u00f3digo no controlado. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740067916 y Tuleap Enterprise Edition 16.4-5 y 16.3-10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json index 9d2811083d4..b4289b23c04 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27111.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11." + }, + { + "lang": "es", + "value": "Rack es una interfaz modular de servidor web Ruby. El middleware Rack::Sendfile registra valores de encabezado no depurados del encabezado X-Sendfile-Type. Un atacante puede aprovechar esto inyectando secuencias de escape (como caracteres de nueva l\u00ednea) en el encabezado, lo que da como resultado la inyecci\u00f3n de registros. Esta vulnerabilidad se corrigi\u00f3 en 2.2.12, 3.0.13 y 3.1.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27148.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27148.json index c1403235ce4..6cc72f5e7d2 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27148.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T21:15:18.073", "lastModified": "2025-02-25T21:15:18.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json index 86ed385c065..913739196ed 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27150.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. La contrase\u00f1a para conectar la instancia de Redis no se elimina del archivo generado con tuleap collect-system-data. Es probable que estos archivos los utilicen equipos de soporte que no deber\u00edan tener acceso a esta contrase\u00f1a. La vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740492866 y Tuleap Enterprise Edition 16.4-6 y 16.3-11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27154.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27154.json index 114eb9f2a63..e8dafd47d28 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27154.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-27T14:15:36.180", "lastModified": "2025-02-27T15:15:41.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json index 49bc4a932b4..cd0fbcbddd1 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Pinecone is an experimental overlay routing protocol suite which is the foundation of the current P2P Matrix demos. The Pinecone Simulator (pineconesim) included in Pinecone up to commit ea4c337 is vulnerable to stored cross-site scripting. The payload storage is not permanent and will be wiped when restarting pineconesim." + }, + { + "lang": "es", + "value": "Pinecone es un conjunto de protocolos de enrutamiento superpuestos experimentales que constituye la base de las demostraciones actuales de P2P Matrix. El simulador de Pinecone (pineconesim) incluido en Pinecone hasta el commit ea4c337 es vulnerable a cross site scripting almacenado. El almacenamiento del payload no es permanente y se borrar\u00e1 al reiniciar pineconesim." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json index 8322a2f710c..608a2ed2b8e 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27156.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The mass emailing features do not sanitize the content of the HTML emails. A malicious user could use this issue to facilitate a phishing attempt or to indirectly exploit issues in the recipients mail clients. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740567344 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Las funciones de env\u00edo masivo de correos electr\u00f3nicos no depuran el contenido de los correos electr\u00f3nicos HTML. Un usuario malintencionado podr\u00eda utilizar este problema para facilitar un intento de phishing o para explotar indirectamente problemas en los clientes de correo de los destinatarios. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740567344 y Tuleap Enterprise Edition 16.4-6 y 16.3-11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27157.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27157.json index c0d3e15722a..d953002bf4d 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27157.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27157.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-27T17:15:16.867", "lastModified": "2025-02-27T17:15:16.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27263.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27263.json index 8c5c74befb1..2dab7c900da 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27263.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27263.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:57.980", "lastModified": "2025-03-03T14:15:57.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Doctor Appointment Booking allows SQL Injection. This issue affects Doctor Appointment Booking: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en NotFound Doctor Appointment Booking que permite la inyecci\u00f3n SQL. Este problema afecta a Doctor Appointment Booking: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27264.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27264.json index 09f20337cc6..c135d666916 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27264.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27264.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.123", "lastModified": "2025-03-03T14:15:58.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Doctor Appointment Booking allows PHP Local File Inclusion. This issue affects Doctor Appointment Booking: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en NotFound Doctor Appointment Booking permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Doctor Appointment Booking: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27268.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27268.json index 76a5f14a905..ace298c08e7 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27268.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27268.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.260", "lastModified": "2025-03-03T14:15:58.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in enituretechnology Small Package Quotes \u2013 Worldwide Express Edition allows SQL Injection. This issue affects Small Package Quotes \u2013 Worldwide Express Edition: from n/a through 5.2.18." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en enituretechnology Small Package Quotes \u2013 Worldwide Express Edition permite la inyecci\u00f3n SQL. Este problema afecta a Small Package Quotes \u2013 Worldwide Express Edition: desde n/a hasta 5.2.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27269.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27269.json index 7537e6c822a..b6a778df9bf 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27269.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27269.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.403", "lastModified": "2025-03-03T14:15:58.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound .htaccess Login block allows Reflected XSS. This issue affects .htaccess Login block: from n/a through 0.9a." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound .htaccess Login block permite XSS reflejado. Este problema afecta al bloque de inicio de sesi\u00f3n de .htaccess: desde n/a hasta 0.9a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27270.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27270.json index 8ce353050ef..64465466632 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27270.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27270.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.540", "lastModified": "2025-03-03T14:15:58.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in NotFound Residential Address Detection allows Privilege Escalation. This issue affects Residential Address Detection: from n/a through 2.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en NotFound Residential Address Detection permite la escalada de privilegios. Este problema afecta a la detecci\u00f3n de direcciones residenciales: desde n/d hasta 2.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27271.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27271.json index 5ddfd305e79..5caebd4aa83 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27271.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.677", "lastModified": "2025-03-03T14:15:58.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound DB Tables Import/Export allows Reflected XSS. This issue affects DB Tables Import/Export: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound DB Tables Import/Export permite XSS reflejado. Este problema afecta a la importaci\u00f3n y exportaci\u00f3n de tablas de base de datos: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27273.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27273.json index c9449cf035d..d6480c20bac 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27273.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:58.817", "lastModified": "2025-03-03T14:15:58.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in winking Affiliate Links Manager allows Reflected XSS. This issue affects Affiliate Links Manager: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Affiliate Links Manager que permite XSS reflejado. Este problema afecta a Affiliate Links Manager: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27275.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27275.json index d5835145270..8938e6f9809 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27275.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27275.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:59.097", "lastModified": "2025-03-03T14:15:59.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in andrew_fisher WOO Codice Fiscale allows Reflected XSS. This issue affects WOO Codice Fiscale: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en andrew_fisher WOO Codice Fiscale permite XSS reflejado. Este problema afecta a WOO Codice Fiscale: desde n/a hasta 1.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27278.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27278.json index 4c3a28e6f38..2a77f077c90 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27278.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27278.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:59.237", "lastModified": "2025-03-03T14:15:59.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AcuGIS Leaflet Maps allows Reflected XSS. This issue affects AcuGIS Leaflet Maps: from n/a through 5.1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound AcuGIS Leaflet Maps permite XSS reflejado. Este problema afecta a AcuGIS Leaflet Maps: desde n/a hasta 5.1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27279.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27279.json index 81065768d3b..614135b5872 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27279.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27279.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T14:15:59.373", "lastModified": "2025-03-03T14:15:59.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Flashfader allows Reflected XSS. This issue affects Flashfader: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Flashfader permite XSS reflejado. Este problema afecta a Flashfader: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27399.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27399.json index 122f70daf77..d5c234e6d1f 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27399.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-27T18:15:30.380", "lastModified": "2025-02-27T18:15:30.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json index e967ded05ec..94e8d88118d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27400.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T16:15:40.237", "lastModified": "2025-02-28T16:15:40.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue." + }, + { + "lang": "es", + "value": "Magento Long Term Support (LTS) es un proyecto no oficial impulsado por la comunidad que ofrece una alternativa a la plataforma de comercio electr\u00f3nico Magento Community Edition con un alto nivel de compatibilidad con versiones anteriores. Las versiones anteriores a 20.12.3 y 20.13.1 contienen una vulnerabilidad que permite la ejecuci\u00f3n de scripts en el panel de administraci\u00f3n, lo que podr\u00eda provocar ataques de cross-site scripting contra usuarios administradores autenticados. El ataque requiere un usuario administrador con acceso a la configuraci\u00f3n, por lo que, en la pr\u00e1ctica, no es muy probable que sea \u00fatil dado que un usuario con este nivel de acceso probablemente ya sea un administrador completo. Las versiones 20.12.3 y 20.13.1 contienen un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json index 6359f377717..faf2fd1806c 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27401.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En un uso est\u00e1ndar de Tuleap, el problema tiene un impacto limitado, en su mayor\u00eda dejar\u00e1 datos pendientes. Sin embargo, un usuario malintencionado podr\u00eda crear y eliminar informes varias veces para recorrer todos los filtros de todos los informes de la instancia y eliminarlos. El usuario malintencionado solo necesita tener acceso a un rastreador. Esto provocar\u00eda la p\u00e9rdida de todos los filtros de criterios, lo que obligar\u00eda a los usuarios y administradores de rastreadores a volver a crearlos. Esta vulnerabilidad se solucion\u00f3 en Tuleap Community Edition 16.4.99.1740498975 y Tuleap Enterprise Edition 16.4-6 y 16.3-11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json index f4e397a1748..87d56a3d3fd 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27402.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Tuleap carece de protecciones CSRF en las operaciones administrativas de los campos de seguimiento. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a las v\u00edctimas para que eliminen o actualicen los campos de seguimiento. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740414959 y Tuleap Enterprise Edition 16.4-6 y 16.3-11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json index 544d8d1b7ef..9d050e2495c 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27411.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file upload. This vulnerability is fixed in 5.18.3." + }, + { + "lang": "es", + "value": "REDAXO es un CMS basado en PHP. En las versiones anteriores a la versi\u00f3n 5.18.3 de Redaxo, la p\u00e1gina de medios o el grupo de medios era vulnerable a la carga de archivos arbitrarios. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 5.18.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json index aee96b1b631..38df2995e0d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27412.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3." + }, + { + "lang": "es", + "value": "REDAXO es un CMS basado en PHP. En Redaxo desde la versi\u00f3n 5.0.0 hasta la 5.18.2, el par\u00e1metro rex-api-result es vulnerable a ataques de Cross-Site Scripting (XSS) reflejado en la p\u00e1gina de complementos. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 5.18.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27414.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27414.json index 9b5bc5dcb87..32acf5d6318 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27414.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27414.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T21:15:27.957", "lastModified": "2025-02-28T21:15:27.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MinIO is a high performance object storage. Starting in RELEASE.2024-06-06T09-36-42Z and prior to \nRELEASE.2025-02-28T09-55-16Z, a bug in evaluating the trust of the SSH key used in an SFTP connection to MinIO allows authentication bypass and unauthorized data access. On a MinIO server with SFTP access configured and using LDAP as an external identity provider, MinIO supports SSH key based authentication for SFTP connections when the user has the `sshPublicKey` attribute set in their LDAP server. The server trusts the client's key only when the public key is the same as the `sshPublicKey` attribute. Due to the bug, when the user has no `sshPublicKey` property in LDAP, the server ends up trusting the key allowing the client to perform any FTP operations allowed by the MinIO access policies associated with the LDAP user (or any of their groups). Three requirements must be met in order to exploit the vulnerability. First, the MinIO server must be configured to allow SFTP access and use LDAP as an external identity provider. Second, the attacker must have knowledge of an LDAP username that does not have the `sshPublicKey` property set. Third, such an LDAP username or one of their groups must also have some MinIO access policy configured. When this bug is successfully exploited, the attacker can perform any FTP operations (i.e. reading, writing, deleting and listing objects) allowed by the access policy associated with the LDAP user account (and their groups). Version 1.2.0 fixes the issue." + }, + { + "lang": "es", + "value": "MinIO es un almacenamiento de objetos de alto rendimiento. A partir de RELEASE.2024-06-06T09-36-42Z y antes de RELEASE.2025-02-28T09-55-16Z, un error en la evaluaci\u00f3n de la confianza de la clave SSH utilizada en una conexi\u00f3n SFTP a MinIO permite omitir la autenticaci\u00f3n y acceder a datos no autorizados. En un servidor MinIO con acceso SFTP configurado y que utiliza LDAP como proveedor de identidad externo, MinIO admite la autenticaci\u00f3n basada en clave SSH para conexiones SFTP cuando el usuario tiene el atributo `sshPublicKey` configurado en su servidor LDAP. El servidor conf\u00eda en la clave del cliente solo cuando la clave p\u00fablica es la misma que el atributo `sshPublicKey`. Debido al error, cuando el usuario no tiene la propiedad `sshPublicKey` en LDAP, el servidor termina confiando en la clave, lo que permite al cliente realizar cualquier operaci\u00f3n FTP permitida por las pol\u00edticas de acceso de MinIO asociadas con el usuario LDAP (o cualquiera de sus grupos). Para explotar la vulnerabilidad se deben cumplir tres requisitos. En primer lugar, el servidor MinIO debe estar configurado para permitir el acceso SFTP y utilizar LDAP como proveedor de identidad externo. En segundo lugar, el atacante debe tener conocimiento de un nombre de usuario LDAP que no tenga la propiedad `sshPublicKey` configurada. En tercer lugar, dicho nombre de usuario LDAP o uno de sus grupos tambi\u00e9n debe tener configurada alguna pol\u00edtica de acceso MinIO. Cuando se explota este error con \u00e9xito, el atacante puede realizar cualquier operaci\u00f3n FTP (es decir, leer, escribir, eliminar y enumerar objetos) permitida por la pol\u00edtica de acceso asociada con la cuenta de usuario LDAP (y sus grupos). La versi\u00f3n 1.2.0 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27416.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27416.json index c24de59ee9c..8bed93260ec 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27416.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27416.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-01T01:15:28.857", "lastModified": "2025-03-01T01:15:28.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in." + }, + { + "lang": "es", + "value": "Scratch-Coding-Hut.github.io es el sitio web de Coding Hut. El 28 de febrero de 2025, el sitio web conten\u00eda un formulario de inicio de sesi\u00f3n con nombre de usuario y contrase\u00f1a de Scratch. Cualquier usuario que utilizara la p\u00e1gina de inicio de sesi\u00f3n podr\u00eda verse expuesto a que cualquier otro usuario iniciara sesi\u00f3n en su cuenta. Al momento de la publicaci\u00f3n, no hab\u00eda una soluci\u00f3n disponible, pero se estaba trabajando en una. Como workaround, los usuarios deber\u00edan evitar iniciar sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27421.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27421.json index 90dd0fcf775..d43341e1555 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27421.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27421.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:15.630", "lastModified": "2025-03-03T17:15:15.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0." + }, + { + "lang": "es", + "value": "Abacus es una API de conteo altamente escalable y sin estado. Se ha identificado una vulnerabilidad cr\u00edtica de fuga de goroutines en la implementaci\u00f3n de eventos enviados por el servidor (SSE) del servidor Abacus. El problema ocurre cuando los clientes se desconectan del endpoint /stream, ya que el servidor no depura adecuadamente los recursos ni termina los goroutines asociados. Esto provoca el agotamiento de los recursos, donde el servidor contin\u00faa ejecut\u00e1ndose pero finalmente deja de aceptar nuevas conexiones SSE mientras mantiene un alto uso de memoria. La vulnerabilidad involucra espec\u00edficamente una limpieza de canal incorrecta en el mecanismo de gesti\u00f3n de eventos, lo que hace que los goroutines permanezcan bloqueados indefinidamente. Esta vulnerabilidad se solucion\u00f3 en 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27422.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27422.json index 3ad42157e27..2328023a694 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27422.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27422.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:15.787", "lastModified": "2025-03-03T17:15:15.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FACTION is a PenTesting Report Generation and Collaboration Framework. Authentication is bypassed when an attacker registers a new user with admin privileges. This is possible at any time without any authorization. The request must follow the validation rules (no missing information, secure password, etc) but there are no other controls stopping them. This vulnerability is fixed in 1.4.3." + }, + { + "lang": "es", + "value": "FACTION es un framework de colaboraci\u00f3n y generaci\u00f3n de informes de pruebas de penetraci\u00f3n. La autenticaci\u00f3n se omite cuando un atacante registra un nuevo usuario con privilegios de administrador. Esto es posible en cualquier momento sin autorizaci\u00f3n. La solicitud debe seguir las reglas de validaci\u00f3n (no falta informaci\u00f3n, contrase\u00f1a segura, etc.) pero no hay otros controles que las impidan. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27423.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27423.json index 12bd8d1c434..00966ec7eae 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27423.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27423.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:15.943", "lastModified": "2025-03-03T17:15:15.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164" + }, + { + "lang": "es", + "value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Vim se distribuye con el complemento tar.vim, que permite editar y ver f\u00e1cilmente archivos tar (comprimidos o sin comprimir). A partir de la versi\u00f3n 9.1.0858, el complemento tar.vim utiliza la l\u00ednea de comandos ex \":read\" para agregar debajo de la posici\u00f3n del cursor, sin embargo, no se depura y se toma literalmente del archivo tar. Esto permite ejecutar comandos de shell a trav\u00e9s de archivos tar especialmente manipulados. Si esto realmente sucede, depende del shell que se use (opci\u00f3n 'shell', que se establece utilizando $SHELL). El problema se ha solucionado a partir del parche de Vim v9.1.1164" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json index e6ad24b8689..2cd511aa0d1 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27424.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136." + }, + { + "lang": "es", + "value": "Los sitios web que redireccionan a una URL con un esquema que no sea HTTP podr\u00edan permitir que la direcci\u00f3n de un sitio web se falsifique para una p\u00e1gina maliciosa. Esta vulnerabilidad afecta a Firefox para iOS < 136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json index 66d6fe5ed3a..2746b0dcad4 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS < 136." + }, + { + "lang": "es", + "value": "Escanear ciertos c\u00f3digos QR que inclu\u00edan texto con la URL de un sitio web podr\u00eda permitir que la URL se abriera sin presentar primero al usuario una alerta de confirmaci\u00f3n. Esta vulnerabilidad afecta a Firefox para iOS < 136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json index 7a5fd50c82c..3d821a158bc 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27497.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to \"always\" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3." + }, + { + "lang": "es", + "value": "OpenDJ es un servicio de directorio compatible con LDAPv3. Las versiones anteriores a la 4.9.3 de OpenDJ contienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS) que hace que el servidor deje de responder a todas las solicitudes LDAP sin bloquearse ni reiniciarse. Este problema se produce cuando existe un bucle de alias en la base de datos LDAP. Si se ejecuta una solicitud ldapsearch con la desreferenciaci\u00f3n de alias configurada en \"siempre\" en esta entrada de alias, el servidor deja de responder a todas las solicitudes futuras. Afortunadamente, el servidor se puede reiniciar sin que se produzcan da\u00f1os en los datos. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 4.9.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27498.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27498.json index 02831dafc65..40e880b5612 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27498.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27498.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T17:15:16.443", "lastModified": "2025-03-03T17:15:16.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3." + }, + { + "lang": "es", + "value": "aes-gcm es una implementaci\u00f3n pura de Rust de AES-GCM. En decrypt_in_place_ Separate, el texto cifrado descifrado (que es el texto cifrado correcto) queda expuesto incluso si la etiqueta es incorrecta. Esto se debe a que en decrypt_inplace en asconcore.rs, la verificaci\u00f3n de la etiqueta hace que se devuelva un error con el contenido del texto sin formato a\u00fan en el b\u00fafer. La vulnerabilidad se corrigi\u00f3 en 0.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27506.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27506.json index 6eda9ea0324..0868100cc89 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27506.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27506.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "NocoDB is software for building databases as spreadsheets. The API endpoint related to the password reset function is vulnerable to Reflected Cross-Site-Scripting. The endpoint /api/v1/db/auth/password/reset/:tokenId is vulnerable to Reflected Cross-Site-Scripting. The flaw occurs due to implementation of the client-side template engine ejs, specifically on file resetPassword.ts where the template is using the insecure function \u201c<%-\u201c, which is rendered by the function renderPasswordReset. This vulnerability is fixed in 0.258.0." + }, + { + "lang": "es", + "value": "NocoDB es un software para crear bases de datos como hojas de c\u00e1lculo. El endpoint de la API relacionado con la funci\u00f3n de restablecimiento de contrase\u00f1a es vulnerable a Cross-Site-Scripting Reflejado. El endpoint /api/v1/db/auth/password/reset/:tokenId es vulnerable a Cross-Site-Scripting Reflejado. La falla ocurre debido a la implementaci\u00f3n del motor de plantilla del lado del cliente ejs, espec\u00edficamente en el archivo resetPassword.ts donde la plantilla usa la funci\u00f3n insegura \u201c<%-\u201c, que es representada por la funci\u00f3n renderPasswordReset. Esta vulnerabilidad se corrigi\u00f3 en 0.258.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json index cb7607aefe8..911261b45fb 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27507.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8." + }, + { + "lang": "es", + "value": "El software de infraestructura de identidad de c\u00f3digo abierto Zitadel permite a los administradores desactivar el autorregistro de usuarios. La API de administraci\u00f3n de ZITADEL contiene vulnerabilidades de referencia directa a objetos inseguros (IDOR) que permiten a los usuarios autenticados, sin roles de IAM espec\u00edficos, modificar configuraciones confidenciales. Si bien varios endpoints se ven afectados, la vulnerabilidad m\u00e1s cr\u00edtica radica en la capacidad de manipular configuraciones LDAP. Los clientes que no utilizan LDAP para la autenticaci\u00f3n no corren el riesgo de sufrir los aspectos m\u00e1s graves de esta vulnerabilidad. Sin embargo, se recomienda encarecidamente actualizar a la versi\u00f3n parcheada para solucionar todos los problemas identificados. Esta vulnerabilidad se ha corregido en 2.71.0, 2.70.1, 2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5 y 2.63.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27509.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27509.json index 91f10453754..3217011802f 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27509.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27509.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1." + }, + { + "lang": "es", + "value": "fleedm/fleet es un sistema de gesti\u00f3n de dispositivos de c\u00f3digo abierto, basado en osquery. En versiones vulnerables de Fleet, un atacante podr\u00eda crear una respuesta SAML especialmente manipulada para falsificar las afirmaciones de autenticaci\u00f3n, proporcionar una nueva cuenta de usuario administrativo si el aprovisionamiento Just-In-Time (JIT) est\u00e1 habilitado o crear nuevas cuentas vinculadas a afirmaciones falsificadas si la inscripci\u00f3n a MDM est\u00e1 habilitada. Esta vulnerabilidad se ha corregido en 4.64.2, 4.63.2, 4.62.4 y 4.58.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json index 6ce36f332ce..4ab7323c4a4 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenTelemetry dotnet is a dotnet telemetry framework. A vulnerability in OpenTelemetry.Api package 1.10.0 to 1.11.1 could cause a Denial of Service (DoS) when a tracestate and traceparent header is received. Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage. This issue impacts any application accessible over the web or backend services that process HTTP requests containing a tracestate header. Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime. This vulnerability is fixed in 1.11.2." + }, + { + "lang": "es", + "value": "OpenTelemetry dotnet es un framework de telemetr\u00eda de dotnet. Una vulnerabilidad en el paquete OpenTelemetry.Api 1.10.0 a 1.11.1 podr\u00eda provocar una denegaci\u00f3n de servicio (DoS) cuando se recibe un encabezado tracestate y traceparent. Incluso si una aplicaci\u00f3n no utiliza expl\u00edcitamente la propagaci\u00f3n del contexto de seguimiento, la recepci\u00f3n de estos encabezados puede provocar un alto uso de la CPU. Este problema afecta a cualquier aplicaci\u00f3n accesible a trav\u00e9s de la web o servicios de backend que procesen solicitudes HTTP que contengan un encabezado tracestate. La aplicaci\u00f3n puede experimentar un consumo excesivo de recursos, lo que genera mayor latencia, rendimiento degradado o tiempo de inactividad. Esta vulnerabilidad se solucion\u00f3 en 1.11.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json index aa7fccf3ce7..faab129468b 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1." + }, + { + "lang": "es", + "value": "Laravel es un framework de trabajo para aplicaciones web. Al utilizar la validaci\u00f3n con comodines para validar un campo de archivo o imagen determinado (`files.*`), una solicitud maliciosa manipulada por el usuario podr\u00eda eludir las reglas de validaci\u00f3n. Esta vulnerabilidad se ha corregido en las versiones 11.44.1 y 12.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27516.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27516.json index acddf510d95..0ba0a1e7a76 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27516.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27516.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6." + }, + { + "lang": "es", + "value": "Jinja es un motor de plantillas extensible. Antes de la versi\u00f3n 3.1.6, un descuido en la forma en que el entorno aislado de Jinja interact\u00faa con el filtro |attr permite que un atacante que controla el contenido de una plantilla ejecute c\u00f3digo Python arbitrario. Para explotar la vulnerabilidad, un atacante debe controlar el contenido de una plantilla. Si ese es el caso depende del tipo de aplicaci\u00f3n que utilice Jinja. Esta vulnerabilidad afecta a los usuarios de aplicaciones que ejecutan plantillas no confiables. El entorno aislado de Jinja detecta las llamadas a str.format y garantiza que no escapen del entorno aislado. Sin embargo, es posible utilizar el filtro |attr para obtener una referencia al m\u00e9todo de formato simple de una cadena, sin pasar por el entorno aislado. Despu\u00e9s de la correcci\u00f3n, el filtro |attr ya no pasa por alto la b\u00fasqueda de atributos del entorno. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json index 55de76ea50b..6e59aad23b4 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Volt is an elegantly crafted functional API for Livewire. Malicious, user-crafted request payloads could potentially lead to remote code execution within Volt components. This vulnerability is fixed in 1.7.0." + }, + { + "lang": "es", + "value": "Volt es una API funcional manipulada con elegancia para Livewire. Los payloads de solicitudes maliciosas manipuladas por el usuario podr\u00edan provocar la ejecuci\u00f3n remota de c\u00f3digo dentro de los componentes de Volt. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json index 05f815bba1f..cf2ae29011e 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27521.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27521", "sourceIdentifier": "psirt@huawei.com", "published": "2025-03-04T08:15:36.203", - "lastModified": "2025-03-04T08:15:36.203", - "vulnStatus": "Received", + "lastModified": "2025-03-04T20:42:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability of improper access permission in the process management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de permisos de acceso indebidos en el m\u00f3dulo de gesti\u00f3n de procesos Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,42 @@ "value": "CWE-264" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6" + } + ] + } + ] } ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2025/3/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27554.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27554.json index add37f070a3..cce64e3b1f8 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27554.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27554.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-01T06:15:34.693", "lastModified": "2025-03-01T06:15:34.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,6 +16,10 @@ { "lang": "en", "value": "ToDesktop before 2024-10-03, as used by Cursor before 2024-10-03 and other applications, allows remote attackers to execute arbitrary commands on the build server (e.g., read secrets from the desktopify config.prod.json file), and consequently deploy updates to any app, via a postinstall script in package.json. No exploitation occurred." + }, + { + "lang": "es", + "value": "La versi\u00f3n anterior a 2024-10-03 de ToDesktop, tal como la usaba Cursor antes de 2024-10-03 y otras aplicaciones, permite a atacantes remotos ejecutar comandos arbitrarios en el servidor de compilaci\u00f3n (por ejemplo, leer secretos del archivo config.prod.json de desktopify) y, en consecuencia, implementar actualizaciones en cualquier aplicaci\u00f3n, a trav\u00e9s de un script posterior a la instalaci\u00f3n en package.json. No se produjo ninguna explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json index 3a6749f135a..7ac2cb02218 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27590.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T04:15:09.020", "lastModified": "2025-03-03T04:15:09.020", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web." + }, + { + "lang": "es", + "value": "En oxidized-web (tambi\u00e9n conocido como Oxidized Web) anterior a 0.15.0, la p\u00e1gina de migraci\u00f3n de RANCID permite que un usuario no autenticado obtenga control sobre la cuenta de usuario de Linux que ejecuta oxidized-web." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27600.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27600.json index e094dc412d1..e36e49ca736 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27600.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27600.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "FastGPT is a knowledge-based platform built on the LLMs. Since the web crawling plug-in does not perform intranet IP verification, an attacker can initiate an intranet IP request, causing the system to initiate a request through the intranet and potentially obtain some private data on the intranet. This issue is fixed in 4.9.0." + }, + { + "lang": "es", + "value": "FastGPT es una plataforma basada en el conocimiento y construida sobre los LLM. Dado que el complemento de rastreo web no realiza la verificaci\u00f3n de IP de la intranet, un atacante puede iniciar una solicitud de IP de la intranet, lo que hace que el sistema inicie una solicitud a trav\u00e9s de la intranet y potencialmente obtenga algunos datos privados de la intranet. Este problema se solucion\u00f3 en la versi\u00f3n 4.9.0." } ], "metrics": { diff --git a/README.md b/README.md index 3a668bd4744..2fa4203356b 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-09T00:55:19.071020+00:00 +2025-03-09T03:00:19.873769+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-03-08T01:00:04.346786+00:00 +2025-03-09T01:00:04.357788+00:00 ``` ### Total Number of included CVEs @@ -38,18 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `0` -- [CVE-2023-52968](CVE-2023/CVE-2023-529xx/CVE-2023-52968.json) (`2025-03-08T23:15:13.173`) -- [CVE-2023-52969](CVE-2023/CVE-2023-529xx/CVE-2023-52969.json) (`2025-03-08T23:15:14.357`) -- [CVE-2023-52970](CVE-2023/CVE-2023-529xx/CVE-2023-52970.json) (`2025-03-08T23:15:14.527`) -- [CVE-2023-52971](CVE-2023/CVE-2023-529xx/CVE-2023-52971.json) (`2025-03-08T23:15:14.683`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2536` +- [CVE-2025-27400](CVE-2025/CVE-2025-274xx/CVE-2025-27400.json) (`2025-02-28T16:15:40.237`) +- [CVE-2025-27401](CVE-2025/CVE-2025-274xx/CVE-2025-27401.json) (`2025-03-04T17:15:19.547`) +- [CVE-2025-27402](CVE-2025/CVE-2025-274xx/CVE-2025-27402.json) (`2025-03-04T17:15:19.703`) +- [CVE-2025-27411](CVE-2025/CVE-2025-274xx/CVE-2025-27411.json) (`2025-03-05T16:15:40.310`) +- [CVE-2025-27412](CVE-2025/CVE-2025-274xx/CVE-2025-27412.json) (`2025-03-05T16:15:40.457`) +- [CVE-2025-27414](CVE-2025/CVE-2025-274xx/CVE-2025-27414.json) (`2025-02-28T21:15:27.957`) +- [CVE-2025-27416](CVE-2025/CVE-2025-274xx/CVE-2025-27416.json) (`2025-03-01T01:15:28.857`) +- [CVE-2025-27421](CVE-2025/CVE-2025-274xx/CVE-2025-27421.json) (`2025-03-03T17:15:15.630`) +- [CVE-2025-27422](CVE-2025/CVE-2025-274xx/CVE-2025-27422.json) (`2025-03-03T17:15:15.787`) +- [CVE-2025-27423](CVE-2025/CVE-2025-274xx/CVE-2025-27423.json) (`2025-03-03T17:15:15.943`) +- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T16:15:40.647`) +- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T16:15:40.797`) +- [CVE-2025-27497](CVE-2025/CVE-2025-274xx/CVE-2025-27497.json) (`2025-03-05T16:15:40.587`) +- [CVE-2025-27498](CVE-2025/CVE-2025-274xx/CVE-2025-27498.json) (`2025-03-03T17:15:16.443`) +- [CVE-2025-27506](CVE-2025/CVE-2025-275xx/CVE-2025-27506.json) (`2025-03-06T19:15:27.833`) +- [CVE-2025-27507](CVE-2025/CVE-2025-275xx/CVE-2025-27507.json) (`2025-03-04T17:15:20.360`) +- [CVE-2025-27509](CVE-2025/CVE-2025-275xx/CVE-2025-27509.json) (`2025-03-06T19:15:27.973`) +- [CVE-2025-27513](CVE-2025/CVE-2025-275xx/CVE-2025-27513.json) (`2025-03-05T19:15:39.337`) +- [CVE-2025-27515](CVE-2025/CVE-2025-275xx/CVE-2025-27515.json) (`2025-03-05T19:15:39.483`) +- [CVE-2025-27516](CVE-2025/CVE-2025-275xx/CVE-2025-27516.json) (`2025-03-05T21:15:20.073`) +- [CVE-2025-27517](CVE-2025/CVE-2025-275xx/CVE-2025-27517.json) (`2025-03-05T20:16:05.960`) +- [CVE-2025-27521](CVE-2025/CVE-2025-275xx/CVE-2025-27521.json) (`2025-03-04T20:42:28.777`) +- [CVE-2025-27554](CVE-2025/CVE-2025-275xx/CVE-2025-27554.json) (`2025-03-01T06:15:34.693`) +- [CVE-2025-27590](CVE-2025/CVE-2025-275xx/CVE-2025-27590.json) (`2025-03-03T04:15:09.020`) +- [CVE-2025-27600](CVE-2025/CVE-2025-276xx/CVE-2025-27600.json) (`2025-03-06T19:15:28.117`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 786bef076f9..96e6f8109d9 100644 --- a/_state.csv +++ b/_state.csv @@ -52173,7 +52173,7 @@ CVE-2012-0387,0,0,624a8124510c59101bf25d738c1e4759ae73cf4a75d3904ee6de9db55d362b CVE-2012-0388,0,0,fd61089affbc101b9479ccb2889d4da60fc15b0d3cbc5006958ed32b1bf6c2e6,2024-11-21T01:34:53.103000 CVE-2012-0389,0,0,17e03df6dd95a275ed8bb5951b390831bf73288df735c8aaf19f2325b4f29267,2024-11-21T01:34:53.210000 CVE-2012-0390,0,0,2a0e8dac1d0148b04420232b80812ced77cee940e0491aea5716b6b6f5531ac9,2024-11-21T01:34:53.377000 -CVE-2012-0391,0,0,6fc957c4608e2316c09d2f67c00ea9200fa63e0f2449cab6ef062fde9548bcc0,2025-02-10T21:15:09.680000 +CVE-2012-0391,0,1,b3d56dcec3c290de99e48905d421d0cb05fec6b2cb79f2df92ee0411fa4eb57e,2025-02-10T21:15:09.680000 CVE-2012-0392,0,0,99b8ed06d732e77c6c8a226d9f1651df53f82a3fb3fe5ea174ac52e27759685a,2024-11-21T01:34:53.673000 CVE-2012-0393,0,0,f130bf06aec93783126e2aeae630adbebf64eb4c07286d58a898025b1356a230,2024-11-21T01:34:53.817000 CVE-2012-0394,0,0,486e3333682e8168671f2bf0f3bcb5b2d72e33ad3b2f9bc60bdb0ae82f9add31,2024-11-21T01:34:53.950000 @@ -58401,7 +58401,7 @@ CVE-2013-0740,0,0,5b3694562b0ed624f13221c631a8ab773128b22ff36f640be2ab78b846f9ca CVE-2013-0741,0,0,920d947cdb415087fc699ed13e4a18c049f7350888e018b84b41f82051c8880f,2024-11-21T01:48:06.567000 CVE-2013-0742,0,0,43a7fa3af13317d863388f67e1baafb38c186089580d7b0e40823eb47b9cc983,2024-11-21T01:48:06.690000 CVE-2013-0743,0,0,5a0005a7227d006d5a7afc9eed6cff69a8c12e6063f8bd6095a660881cd0b12c,2023-11-07T02:13:55.203000 -CVE-2013-0744,0,0,1b3d1f57f9046b2f85f723b75e3b74e5f983f83618873b60aa9e5e82897eed30,2024-11-21T01:48:06.817000 +CVE-2013-0744,0,1,0c743fdd70b51832030c9bbbba2f4978f48f5f2a6cbe0d3fbbf2e51e1f5c1661,2024-11-21T01:48:06.817000 CVE-2013-0745,0,0,1e32f0de9583940b899867f46e710244d5c412d6fd354529110aa4d2866afc6b,2024-11-21T01:48:06.970000 CVE-2013-0746,0,0,b434eaa45d15f034ec71b54fedde7514476f9275109cfd680e83d9ba094c6f25,2024-11-21T01:48:07.113000 CVE-2013-0747,0,0,39079e21fe31b7d7c06ca4a2f5bc8e737e4dfcdf1b1c347afd619f26c85dfe5b,2024-11-21T01:48:07.263000 @@ -103544,7 +103544,7 @@ CVE-2017-3062,0,0,ac3b345ad95f10e735ab69ea990c6af9b3230ef38a4463030828d3964f78f4 CVE-2017-3063,0,0,5fa9f659f2774399f1708168687d3e98afe75edad415c1aa6e5016e3e3e51fd4,2024-11-21T03:24:45.347000 CVE-2017-3064,0,0,63f6d50ceccfed39ecbbeee37cef38bd6ffe17a20574544916dfe225da95171b,2024-11-21T03:24:45.477000 CVE-2017-3065,0,0,0963c2ea0b754d113dd707a8e8b0d5bf5afc17d081be5b0ca1a48f32865e2497,2024-11-21T03:24:45.600000 -CVE-2017-3066,0,0,ecd0971aa3577dff527ec63b3c07a67a50ef8dde3765f03eb507a5961812bfeb,2025-02-25T02:00:02.097000 +CVE-2017-3066,0,1,da4dd6261e645819bdca0b8e910e315c63d5f1efd04759e476fcdbb6228d12be,2025-02-25T02:00:02.097000 CVE-2017-3067,0,0,791a33003dd1e11c651c188e4f03f08ab06e2e31440f58108137e87ceef3bbd2,2024-11-21T03:24:45.847000 CVE-2017-3068,0,0,af80d0c3c329fc69043b3685c041805dc046bbe7ad713185db1fd6aa7c72c33d,2024-11-21T03:24:45.967000 CVE-2017-3069,0,0,d3276aefa92679d09fe4b20dbe1190ee1aaeabf36bdd233a71239fdc29223803,2024-11-21T03:24:46.100000 @@ -112840,7 +112840,7 @@ CVE-2018-11806,0,0,a5f588cdaab4f8a649f1634b02c5612f682b105e02b9bd2ed0104e54771aa CVE-2018-11808,0,0,10b7765be18c21f04d1e776317b54947b44b9b1c54f158e09e2289e2752da927,2024-11-21T03:44:04.587000 CVE-2018-1181,0,0,3e98bd65bca0888ca0d91ce1a2a6e808c0266ef9d976889b9d4a13cedd1849bd,2023-11-07T02:55:51.020000 CVE-2018-11813,0,0,52ff473fb49b01041c020db7f233a431925d03ed15a13967a97be7afe7b68fa1,2024-11-21T03:44:04.737000 -CVE-2018-11816,0,0,c5eb229f24e14fda3c7042844735ed36fcc0d45e9c1f4c8a25969bcc2f5ca351,2025-02-06T16:41:05.897000 +CVE-2018-11816,0,1,84d0439d88d35241085ff56bdbb2d9af049bdd79eb45e6ef02f25978a4dceb97,2025-02-06T16:41:05.897000 CVE-2018-11818,0,0,693b6ab2c5aee4ee49aaf9f37b0ae42c92c06c0aafbfa813b992ddff5638bf66,2024-11-21T03:44:04.897000 CVE-2018-11819,0,0,cef0b72398808eee38e7df58643b4a9402c82af3de6296102911ef205880de5a,2024-11-21T03:44:05.023000 CVE-2018-1182,0,0,962d98a6da0abb362e2bbe3665699b85c9af69946bbbaeddeda30f1f271be6c2,2024-11-21T03:59:21.017000 @@ -119687,17 +119687,17 @@ CVE-2018-19939,0,0,3f6321b898b3a86a30acbee2192e38feb591cc9fafddbf17601701a947152 CVE-2018-1994,0,0,cffa48bfc2633f74b73a1daf8bb2bce3b578ac02d07432b35c27cc8241475eee,2024-11-21T04:00:42.817000 CVE-2018-19941,0,0,169aa04d0470aa43cb8f774305917222c2d9e8384e2fcaf3247e848ee15ca2dd,2024-11-21T03:58:51.163000 CVE-2018-19942,0,0,3cb9a105db9ec7cedb4d43b3396ff2a2085d3e192f16b13a2d862c8c9a13bd3c,2024-11-21T03:58:51.297000 -CVE-2018-19943,0,0,3c21fb00b0b78b39c45610b5ae7af3329871340e926b599e21f9c3a499650bbb,2024-11-21T03:58:51.453000 +CVE-2018-19943,0,1,9d44cd37b70ffdbc39ad7783e27b442c978510850e3296631a60dda680695d90,2024-11-21T03:58:51.453000 CVE-2018-19944,0,0,4212dbc8b943b8eeb2e304bc617776d17f38156c33fc3a78501fb5d0ba21bdda,2024-11-21T03:58:51.597000 CVE-2018-19945,0,0,5f4c19d947a63ee4d767711882d155801bcba85abdcba00f6eb0efbdcc7b5e4c,2024-11-21T03:58:51.720000 CVE-2018-19946,0,0,05ad786b96088c72bf9f87b2c3be6c582a7e0562f1dbdf4211cb0134a2e93542,2024-11-21T03:58:51.847000 CVE-2018-19947,0,0,729c2a23dc0c94d8ead859580c68c58ce82eee92637b74c61d171b083edea01e,2024-11-21T03:58:51.980000 CVE-2018-19948,0,0,6d5f1636d1ac024599af0d67006cac35f2fadb2cd038fdbee576687b973d6777,2024-11-21T03:58:52.110000 -CVE-2018-19949,0,0,20fb3106bde5f30ab9867c3f0c176af5e37be55497fa9e8301e857a913883a2a,2025-02-06T21:15:12.333000 +CVE-2018-19949,0,1,669b381088fa90a11bd9012db01a0a9c2950e23c10e78b71ccd2f9f5c9d78dbe,2025-02-06T21:15:12.333000 CVE-2018-19950,0,0,3efbed131ebf0124db39bd55e3c1b6239cb68dd75ef3522c631cfe6f2a78a660,2024-11-21T03:58:52.370000 CVE-2018-19951,0,0,a8627ab2d261053548708197b1e31a9819d39497fcf8d97cb90700d25e16e23f,2024-11-21T03:58:52.500000 CVE-2018-19952,0,0,e056e7d214d156f3c38c6dea1a51a86c1852e5f2174d360376b2509ea0f9a3c0,2024-11-21T03:58:52.637000 -CVE-2018-19953,0,0,c19a6b15d89b6ca0206a4341b9c4463c0d1bfcab9f6886d782c8f2b4ea2cd7b8,2025-02-06T21:15:12.550000 +CVE-2018-19953,0,1,4d3fe583210e61986a76372a0e9506a60b13947b40cec17c82ec2dc6e190e632,2025-02-06T21:15:12.550000 CVE-2018-19954,0,0,84bb568872babaf6f6504d4ab155e4742c14b88e603fc5de8215461131dbfdd7,2024-11-21T03:58:52.890000 CVE-2018-19955,0,0,c3c6eb940300359cf21881fe048bd7f83651973908eb1342f41729384777b718,2024-11-21T03:58:53.007000 CVE-2018-19956,0,0,fda82be30162859403cffe4538285821267f64463e6ce2ff75960a67c8a2193b,2024-11-21T03:58:53.123000 @@ -121221,7 +121221,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7 CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000 CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000 CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000 -CVE-2018-2380,0,0,17465b2620df2dae6bef319e71daf26cc0410002de0c9542faeab68693874e53,2025-01-29T21:15:08.910000 +CVE-2018-2380,0,1,6cb299a1631c1299c46c030d8c69e67d94990c731f0932272538ed6fa1da0d78,2025-01-29T21:15:08.910000 CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000 CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000 CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000 @@ -126416,7 +126416,7 @@ CVE-2018-8635,0,0,2fa77610eae5127b69b72c8cd0c818352e2543174d574fb2deef54909e4fd4 CVE-2018-8636,0,0,432a07941e0899dcde198ff4f6249981610b9fb745921cfa04dab18ffc106851,2024-11-21T04:14:09.333000 CVE-2018-8637,0,0,14830137fe8bbc02788d245c16f9474c23cdbb327541d997f923df2c03a74013,2024-11-21T04:14:09.450000 CVE-2018-8638,0,0,b65222b6ab3c08a5318c5cfa087d17966ae608ccda1cc49c66b47d657073eba3,2024-11-21T04:14:09.573000 -CVE-2018-8639,0,0,f95f58a17bc9ea55bcb4a920fd4767c14b1e24b379119a25d8462d74bda47934,2025-03-04T02:00:01.987000 +CVE-2018-8639,0,1,9d6b42e25d280a187daff7ea41585c1f56f6d845ec2f803151cb880f1de841ae,2025-03-04T02:00:01.987000 CVE-2018-8641,0,0,a43394ac0283961ddab14e82a4299cbf7b8ac31c65f3064c1f9d8590d867ced2,2024-11-21T04:14:09.823000 CVE-2018-8643,0,0,bb7f45a85641f4ae4900e37b2faa285774a0d13729ca5f355b4cb6670454fe5d,2024-11-21T04:14:09.953000 CVE-2018-8649,0,0,c268dba9f2f7c15df48853255b474b1824af0b9b7086e1ed7148f8b0f4c9ee76,2024-11-21T04:14:10.080000 @@ -135468,7 +135468,7 @@ CVE-2019-1811,0,0,7257fa9318dbfbb906f8172322d1a6dcf0026ac87e97127a618142b9ce820f CVE-2019-1812,0,0,f39f3180939fe0866f9a91a0e0e9b95e0612f700f79a209a057b2b8cb0dacbf2,2024-11-21T04:37:26.070000 CVE-2019-1813,0,0,72bcb700ab78583c44bd818d08ef976f5a57e0b08f0d9981270962c1cc81ecea,2024-11-21T04:37:26.217000 CVE-2019-1814,0,0,6b482a1984164225f91a406f53c4f46d9a97fe53faff00d70635949504734401,2024-11-21T04:37:26.363000 -CVE-2019-1815,0,0,4871e5779746f975ac6ff42d79d909a08b58b5f74c8290525e657fd4eb18ff46,2025-03-04T19:15:36.177000 +CVE-2019-1815,0,1,29df1798c4a3ac2579c6be67706e1290f88358ec8671346ea5b27cbb99b0ba72,2025-03-04T19:15:36.177000 CVE-2019-1816,0,0,bc1b96179ad9e6dc3efe1c98de6af983824c419aa24897dd76fe2ae3535bf76d,2024-11-21T04:37:26.523000 CVE-2019-1817,0,0,b37f886c116df24d0ef11fd8cd0180a420714c8f2b41e09b3f99177374f69a57,2024-11-21T04:37:26.647000 CVE-2019-18177,0,0,997596f59e0036f91e0b923e8d3cab2e9e3873b57aa1cfd4f381e2447e82c231,2024-11-21T04:32:46.273000 @@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000 CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000 CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000 -CVE-2019-20171,0,0,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000 +CVE-2019-20171,0,1,1fbb837995a262691cb4297cd5a1ffdcbad633ed1490b25733f4d9204b3e6612,2025-03-07T14:24:42.067000 CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000 CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000 CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000 @@ -137276,7 +137276,7 @@ CVE-2019-20202,0,0,225754f16f47c90380fccf8827c98465d47385fda3f6f7310dc138e5e178f CVE-2019-20203,0,0,81f8f500e4dacfa1a464fa6cc2647a4e94891e1a1f31c0e2ff413ca325b05e95,2024-11-21T04:38:12.003000 CVE-2019-20204,0,0,71d4f11dc2031a94c71229ceea553dfef2723fe46a773ffae589b572ce57ceac,2024-11-21T04:38:12.147000 CVE-2019-20205,0,0,6f4bfd166b4284407214c4899f6e88fd50def278a49e724981580660eb622539,2024-11-21T04:38:12.300000 -CVE-2019-20208,0,0,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000 +CVE-2019-20208,0,1,f22c19dac764cf7ffaa43a888a25d92981070b939edbe9fc331282fbf86b7b43,2025-03-07T14:24:42.067000 CVE-2019-20209,0,0,efd75c14a5c6e81194b3619da1ff2a9fc5b7f814652709cfbf81fc3f656b480c,2024-11-21T04:38:12.580000 CVE-2019-2021,0,0,fbcb1d3495d7618f920e224680b2702bc2f65966152303d5c8b5fa92f30e9868,2024-11-21T04:40:04.950000 CVE-2019-20210,0,0,2fc1ff5a0a75d3bd86e6c6aba2c77494fb2307544c863374c5a2e43cb40c28f9,2024-11-21T04:38:12.737000 @@ -142195,9 +142195,9 @@ CVE-2019-7476,0,0,5de83e782c05182a1d8ce0089444e16799f6635a3da03c8cb60c046b554fb6 CVE-2019-7477,0,0,6ce02f38e0cf97d4d9ef2a83ac5a827c596013af233a32cb39446952f8cff819,2024-11-21T04:48:15.470000 CVE-2019-7478,0,0,5ee4b9782b987af812ca190c6a17611061b337f7f62d87d7bcc119a52c568b0f,2024-11-21T04:48:15.587000 CVE-2019-7479,0,0,7dadc717545b824d9cc1575ff272b2af482999ff8135838122148ba3cc6fe637,2024-11-21T04:48:15.703000 -CVE-2019-7481,0,0,45a86d0c3675f43e47bb11b4dd3712c319c8dcc0c7bf5b2ed3212d661ec62c2d,2025-02-06T20:15:33.540000 +CVE-2019-7481,0,1,5735bff822ea8fe4087f550888e197b8108d03ed67c78504190b779f6a784369,2025-02-06T20:15:33.540000 CVE-2019-7482,0,0,f362faf36acf0534a3ddd6ab6abc5c302e830095ac7140a06c69d43e47b32df2,2024-11-21T04:48:15.943000 -CVE-2019-7483,0,0,84b74275afffefd8aa62348d202845c564ba489661eeff691d12df14ea08f096,2025-02-06T20:15:33.757000 +CVE-2019-7483,0,1,f6dfc58dbf54525fa23c7fe12bd9e39ed2a411613f060f6ff167ac351a17617d,2025-02-06T20:15:33.757000 CVE-2019-7484,0,0,088a2ed84077a90b95d47feea6d1d7b2a37f5c386a37ea91293747a6dc8424e1,2024-11-21T04:48:16.173000 CVE-2019-7485,0,0,e195d5b6b958bf03a8a2601ef451141f72ff32ebe6912657c9e3d56fa0c26e43,2024-11-21T04:48:16.297000 CVE-2019-7486,0,0,7bd108c967b2c70bb11ec2b5c98739597e83962a9140eb21308d98390b9222c6,2024-11-21T04:48:16.423000 @@ -147032,7 +147032,7 @@ CVE-2020-11859,0,0,cdd51020acb6cfb576cf03478f3a224e3289e8aa8dd3044bc89babff2e3c6 CVE-2020-1186,0,0,34c9e43bb9e038e3a013728f2419cbb4d0f2d9a1295496b5dd67890500dabefe,2024-11-21T05:09:55.947000 CVE-2020-11860,0,0,51198c1088c4bee0d62c184fbadb34b9a15017cf81cfab05f14bedc519d2e0e1,2024-11-21T04:58:46.313000 CVE-2020-11861,0,0,1fa8a51fc7788effb3baca54aca1b0de908440d0631c5201e3f50f563354e908,2024-11-21T04:58:46.413000 -CVE-2020-11862,0,0,bec4fd4f9b7fedfdc71c451bd0782d89da237425bee0f74ae179aa99dca00ed3,2024-11-21T04:58:46.520000 +CVE-2020-11862,0,1,d0bf1ff986ab5203345624ef36f221be98711c6de8f1020fad67fb29826518dd,2024-11-21T04:58:46.520000 CVE-2020-11863,0,0,1038e3f4c4307e35a182f1277c9e6c0ce6c9f06a627a1ba414f342ed5ba1c481,2024-11-21T04:58:46.640000 CVE-2020-11864,0,0,7fa396ffe8924fa3f07a6256522af2c4f1398be07491b3164ce31f43ec428b1d,2024-11-21T04:58:46.797000 CVE-2020-11865,0,0,93f0af213cf0f4d3157e110ddc7a036438e953740c67bb11a1bd6e9685c95161,2024-11-21T04:58:46.940000 @@ -147150,7 +147150,7 @@ CVE-2020-11974,0,0,e4d4cd0de7bc8df667b103f5dee9321682596ef35cc387961bf8de1fef0d9 CVE-2020-11975,0,0,620509214a178cffb419e00c052af567cbbda65c84df66c035070c21eb548707,2024-11-21T04:59:01.647000 CVE-2020-11976,0,0,3d2d43b8d898177ce6bc83ef797adb8598604134b353e5f2f236c34b828c9386,2024-11-21T04:59:01.770000 CVE-2020-11977,0,0,54c4752a9159463c487a9593e8f4974e97b30f4a52f3321bd515e3b5ee79a352,2024-11-21T04:59:01.910000 -CVE-2020-11978,0,0,c72141cfdfec6a2fb1b41df334e0f863d76742a6485527b219944bf1918bdfb9,2025-02-06T21:15:14.453000 +CVE-2020-11978,0,1,e7dce553f325cd7910d2435e99115866794b879596641182f32e29294acc2b6e,2025-03-06T19:48:51.880000 CVE-2020-11979,0,0,679d490867848a17124ad000cfa9374b818918f6ea9118f58731415b7dbd4040,2024-11-21T04:59:02.170000 CVE-2020-1198,0,0,a81fcd6cf265a258a30e5f469d6fc082474a77ce258568cbc9f62b28b2e7da30,2024-11-21T05:09:57.567000 CVE-2020-11980,0,0,516e9f564767956ffc6d1c2f7978dbf48b20c9245bd368c69ff10d010f629183,2024-11-21T04:59:02.447000 @@ -148937,7 +148937,7 @@ CVE-2020-13923,0,0,1b73a8425b6ac1ba3bde6cdc9e5a134481dd8bbd3bb17999c977aff674cfb CVE-2020-13924,0,0,b1da729835d8e399c6a4d222e533734eac93bc45245d8f5f0ebe8fca315f86e3,2024-11-21T05:02:09.543000 CVE-2020-13925,0,0,c04b4b4a6dba46bd4db3cfb789c8855e96b3045895c86f4631fe32f478eb3569,2024-11-21T05:02:09.647000 CVE-2020-13926,0,0,a935188cd2b3515e1745f393c587ee64e207363c28b2b403852029cd46400fcd,2024-11-21T05:02:09.750000 -CVE-2020-13927,0,0,62ce610f901befde1003db9557a8e4abfc43dfeb389b3ae3148f52138e10a113,2024-11-21T05:02:09.853000 +CVE-2020-13927,0,1,90917c3042c56e8605de662d3263162f66277acb1ab896954a6d58538c4a5d32,2025-03-06T19:48:51.880000 CVE-2020-13928,0,0,b336333248d10284d53c667cf9026ca5a0462072b7b3bf02f99e139ea6272a24,2024-11-21T05:02:10.053000 CVE-2020-13929,0,0,2747ba4587d2bdb4749187235f95bf7d5245c81d91b3afd5c7d1e4e19a99fb9a,2024-11-21T05:02:10.197000 CVE-2020-1393,0,0,d7212859ef3e29eb6c3b0e283ce21bb4cb86dd9eac447438fc8e52d5d97eb58f,2024-11-21T05:10:24.340000 @@ -153807,7 +153807,7 @@ CVE-2020-23373,0,0,ed95f6883c9020ba20f58ea5ed2953056429f5cc89ca616baddbc57021583 CVE-2020-23374,0,0,41c64d027245d5760e9f742909427e53700585c6136d9359480945611a6d8a47,2024-11-21T05:13:48.020000 CVE-2020-23376,0,0,93992f78343dd8910c81b004ae2ad3ae891bccaecf9cf5c8e3b17e8c361bc8c9,2024-11-21T05:13:48.153000 CVE-2020-23426,0,0,f62b0e6a732a94edac59175929696cde44032328f771832d17ebff4ad24c8fb9,2024-11-21T05:13:48.287000 -CVE-2020-23438,0,0,216fc9451b476383265a839ed63b17b80eefca8578be4f89961e5debba9a0231,2025-03-04T21:15:10.907000 +CVE-2020-23438,0,1,a22f53b4ce36ef5690643d9ff4d12c1a43f19226728603b5448ade9ef293e6de,2025-03-04T21:15:10.907000 CVE-2020-23446,0,0,88c29f2746008a01e89a0c729df4d9a3bc7511c7606776d5c75fb09952cd46ef,2024-11-21T05:13:48.437000 CVE-2020-23447,0,0,be30263ff308de1c9539ba998de3bb8fac1bd9ca26faf8500d512518f9b6ec41,2024-11-21T05:13:48.580000 CVE-2020-23448,0,0,d45d7e57b1e4d75c3161a8ef8a6ed6a2836024eec5e66035a556c9012745fd01,2024-11-21T05:13:48.720000 @@ -154521,7 +154521,7 @@ CVE-2020-24824,0,0,11620be99e4493f2ca6ff05eda93d88dcfa1553ef5eaeb2a7db70fef612e4 CVE-2020-24825,0,0,fa05f9b1d603afc419d77a57b2b4b64584070836683cebb8f3dd7a19258fe7f8,2024-11-21T05:16:06.127000 CVE-2020-24826,0,0,d368675283c1f7839bd62a38c4459c0318d8ac8cdb56102061882f91bf3be5e6,2024-11-21T05:16:06.287000 CVE-2020-24827,0,0,dc3fb208f34555b1543649abaf2cde5eff54f3b697e681d31421c720bda153d0,2024-11-21T05:16:06.473000 -CVE-2020-24829,0,0,47a4cf08672e30b026a8d28103f099748b722b92b340950833146c71e07ffba9,2025-03-05T23:15:13.040000 +CVE-2020-24829,0,1,18a693c74ae1c5c3756deff0f544ee786fb48af847df3cecec9ffd4abef51425,2025-03-05T23:15:13.040000 CVE-2020-24837,0,0,a00a2ce7a99ee060412f1443f28e66d5aa414cba4c6cf12a5da7a3e2c1451fd4,2024-11-21T05:16:06.817000 CVE-2020-24838,0,0,3042e18033af62eb470ede81a04bd2d2468fb6e6d10f930f48a8be1e62498afb,2024-11-21T05:16:06.997000 CVE-2020-24841,0,0,6af913a0f059faa2f3b8e2c778d96549270432837d46dbba78cf1947ded0a166,2024-11-21T05:16:07.183000 @@ -156760,7 +156760,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365 CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000 CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000 CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000 -CVE-2020-27950,0,0,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000 +CVE-2020-27950,0,1,84ed27a31290def0be964882d987e3ce518979205ec4f107e1672e42670fe565,2025-02-28T14:44:48.713000 CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000 CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000 CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000 @@ -157299,7 +157299,7 @@ CVE-2020-2879,0,0,159f6a71d4b8664572c45b74abf5fce8b242bc159343b93eee81e94063e415 CVE-2020-2880,0,0,755715c6671780e66fae7131af813fc14164993191bc1afa9efadfe70d6a1267,2024-11-21T05:26:31.717000 CVE-2020-2881,0,0,d8703a6afda3c646d90c908e204ced3076e81c72d7f033ca214af638e7fcf388,2024-11-21T05:26:31.867000 CVE-2020-2882,0,0,56281f604f68c8cb8007b683409f6bf0b9dc197e22c23f38d21d24837fbc725a,2024-11-21T05:26:32.043000 -CVE-2020-2883,0,0,88c5788bc56bff379cf7d50f4c217da1bf682b578f8e2678a0e24a705ffb18fe,2025-01-08T02:00:01.937000 +CVE-2020-2883,0,1,1f882c8bb92a2e4301dc56134f380ee9dad0e7b6ccc15a78d71763901fe992aa,2025-01-08T02:00:01.937000 CVE-2020-28838,0,0,d6d5e87f010e669310e50bfdbf8c2e2ff39fdaef0cbe0828a57a541051490af8,2024-11-21T05:23:10.513000 CVE-2020-2884,0,0,1ef1b5d3492120e009bd2f21e686c7eccae82fc79921954bc4c6d4bfd41b609d,2024-11-21T05:26:32.357000 CVE-2020-28840,0,0,c665f50c066c5bb29584327db8e412ee4a36cd5790faf198b79b41b62e5deff4,2024-11-21T05:23:10.657000 @@ -157384,7 +157384,7 @@ CVE-2020-28945,0,0,33ad7ac250d1dc7ca2d7ac581dbc2489461e170a6c156cdf9b27ff5203a22 CVE-2020-28946,0,0,95782fa6bba3d8352ea0e94ebd441642f09243c29fd34bb5c4bc46638ae15cd8,2024-11-21T05:23:21.203000 CVE-2020-28947,0,0,fb46595ba4e86fed206b1aab246d96408851ad0fbc627ef0fde91da68cfd8f85,2024-11-21T05:23:21.360000 CVE-2020-28948,0,0,6eabbd61c1edc07fb210d35219ec3d8e34246392fe08dc08d8e87f067f51e57d,2024-11-21T05:23:21.513000 -CVE-2020-28949,0,0,3dbeaf41804d7a3281c51a92e9e8faf8c09f94e5f33714f05ecab69ce5054a84,2025-02-07T14:15:47.757000 +CVE-2020-28949,0,1,7897ba51337af3b383eab27618115bcf7a992cea1a6c166993ca69d3664d4162,2025-03-07T17:12:53.023000 CVE-2020-2895,0,0,5a939382a5a4301f168df4cdfc206b8e25a4e366a0e8f2f39c42f120fd4be8fd,2024-11-21T05:26:34.160000 CVE-2020-28950,0,0,c934fa406c512b1631796b34f4eb6a4be6877836f08ecff72660434307fd1b66,2024-11-21T05:23:21.910000 CVE-2020-28951,0,0,fd3ced095acc54e4b26ac87ce84035e8c23f89b92fa8afb4c301d26a09e5ce30,2024-11-21T05:23:22.047000 @@ -157841,7 +157841,7 @@ CVE-2020-3118,0,0,ab3d8ab3aa505c2c0d05ad5df043a25ffb5a170413595648bcabb8b1b1d972 CVE-2020-3119,0,0,0870dee6bca2f4249667243d4049273e03b842939953ccfd2796129499d443d1,2024-11-21T05:30:21.903000 CVE-2020-3120,0,0,97360dafe2754942cbbb79bf509a7de595d46c19be8f6643a32688ca08cac22b,2024-11-21T05:30:22.057000 CVE-2020-3121,0,0,ed15543005c12fde1ae863fa626214726d57ca2a6dce777d35eccc784c07b467,2024-11-21T05:30:22.217000 -CVE-2020-3122,0,0,f9bc9a2e14b010199ab8d7c332f1e52a64e4c6e6b6c73fc2d429c1f705cfda13,2025-03-04T19:15:36.890000 +CVE-2020-3122,0,1,2ca5316ed2d09c7966cc83f5fdf10fd79b351049fddb86873411fdfa5a5180df,2025-03-04T19:15:36.890000 CVE-2020-3123,0,0,df70284a76d5d85ce7336281e6eeb89c860eb74aca7c21d31d73f769e601aefb,2024-11-21T05:30:22.373000 CVE-2020-3124,0,0,bd5bdfd427a38f4aeec68de1a9cfb55f706a375f16cf469eb125e2cdfe5e414f,2024-11-21T05:30:22.513000 CVE-2020-3125,0,0,583946cdbeffea277d4142f6145ecc184f2fb93acdb5403daef2d93670740b6e,2024-11-21T05:30:22.623000 @@ -161632,7 +161632,7 @@ CVE-2020-6203,0,0,a2e678d77732026c643d2aae23fa26d1f0034614fd6a79c687d6981d10d319 CVE-2020-6204,0,0,606c8bf057d9135f9eeb4b8cfbf8db3c15165ff296622f3896e556cb4bdfb666,2024-11-21T05:35:17.640000 CVE-2020-6205,0,0,f6c6470dc8a8917cdb000711d9618c3d61f5a25176d299424bb84bbc6ebb5c7c,2024-11-21T05:35:17.763000 CVE-2020-6206,0,0,f070adf2bf6a9c36a3dfd951348c6e2370a2c9f9a00e021d265c20e86f0fc2e7,2024-11-21T05:35:17.880000 -CVE-2020-6207,0,0,305735b1cb614977e4e70079e64b05bbb822d5c5f48af840c676c15050a85b61,2025-01-29T21:15:10.157000 +CVE-2020-6207,0,1,eee3a56a0ccc99dbd87c021e04a065e1a41457384747ff372a22c3b8e665ce3a,2025-01-29T21:15:10.157000 CVE-2020-6208,0,0,20bb43ad9e938c765bfa2952d4c376193c5aba2150bc542c835d748a70cd9775,2024-11-21T05:35:18.147000 CVE-2020-6209,0,0,8b2bc6e47a2dbc48ccba450687fc68c7202707ea30366f7636bbfd278283248e,2024-11-21T05:35:18.270000 CVE-2020-6210,0,0,5d018e0b63a70e52e612aa3557d15b5b5911ba240ee77c4cf8ae470e71706f29,2024-11-21T05:35:18.387000 @@ -166331,7 +166331,7 @@ CVE-2021-1671,0,0,6d52d39464970cdeffbf0eb38cb8163fef2082e32954d8170ff58d0d3b5927 CVE-2021-1672,0,0,21e720aa081cd70de70f9a0d16f6b3790cbb54a54fc4d0c5be4916cd07d0eab2,2024-11-21T05:44:51.763000 CVE-2021-1673,0,0,bd9bd2b59d5f7a0c729e2082b99ea0a8ff75b9fb1b5faacce5ce64f1374b92fd,2024-11-21T05:44:51.883000 CVE-2021-1674,0,0,a6bf8318cd50b2af0a7d9253af322bb6537fef1db09fd56b743b73b70f951b51,2024-11-21T05:44:52.020000 -CVE-2021-1675,0,0,008a1e77e3c5bcc737a2482969513b815f9649f54181026396626f530fb264db,2024-11-21T05:44:52.153000 +CVE-2021-1675,0,1,c81fb750b5ea03757706530a494893c47e8d0dc6ca63f53edf1e1d3e18aaedd0,2025-03-07T17:12:53.023000 CVE-2021-1676,0,0,c2934505d955bf697f16b11eb36263bae94d76bbff89155e9fa7b8b6e883e09e,2024-11-21T05:44:52.353000 CVE-2021-1677,0,0,e2a34fa88c2f81bcecd4f69abe1f53809b21bac4769a8e634d294dae874b221f,2024-11-21T05:44:52.493000 CVE-2021-1678,0,0,a0fa3f1e783a364efdf0a5426bd0681ee1a16846dd8ba1266c2fb98a2629961f,2024-11-21T05:44:52.620000 @@ -168530,7 +168530,7 @@ CVE-2021-21971,0,0,a15f1643a0f04bb936cefae8f6967a0fc877c6217c175a92d1206b9f1c8fd CVE-2021-21972,0,0,b57c893da4ffcca06a65da114b9ad2b198306b125accfcb2157b074d4baad2cb,2025-02-04T16:15:32.760000 CVE-2021-21973,0,0,85d779213cd5af6ca27d417549ceecff4d8d45742fc5843bf3be97898e893208,2025-02-04T20:15:39.867000 CVE-2021-21974,0,0,3de0ff3f51a876bb964c76490a717a7a534efb367618e09e797a5112d8532ed2,2024-11-21T05:49:21.173000 -CVE-2021-21975,0,0,a59dfe3f56e1f21963abfbbbe294abb2602ccb6a7bcceb8dcaffe80f523f15d8,2025-01-29T18:15:39.043000 +CVE-2021-21975,0,1,8b24d0915bc39c55537892acbdd775d46f839d022ec4055b8668750fed9d153e,2025-01-29T18:15:39.043000 CVE-2021-21976,0,0,923480596973a58660d6900e0f43c7887211c204cf1867dcd9b388637ff06cac,2024-11-21T05:49:21.460000 CVE-2021-21978,0,0,9870a6dd498e6ad00eed972d287700399c75392d5d68fc37e8357ff723566fba,2024-11-21T05:49:21.573000 CVE-2021-21979,0,0,d14498eab6b7f9365ec85f8330cbb64b8223a0c7c4d82a7219f053a1e56831b4,2024-11-21T05:49:21.690000 @@ -169974,7 +169974,7 @@ CVE-2021-23807,0,0,6a75b280203317daea84367b04604555d73dce1e7b062c1ec4ed95723e4d3 CVE-2021-2381,0,0,73c8f0f20d7c0d82a834c6c2433f14a1b0192d95ad270c68a3a9c2a28a32f3af,2024-11-21T06:03:00.337000 CVE-2021-23814,0,0,05b7694c6871e414e1d38dfa93faea0bbff03ef31ec821bb43ceb57d448d1b86,2024-11-21T05:51:53.883000 CVE-2021-2382,0,0,ad1c8d64756b68cea26351f8493edc116cb9eadff88d7c9a4241c09cace8cee5,2024-11-21T06:03:00.463000 -CVE-2021-23820,0,0,984a376e9b126efaad7c79c616438688091c1ba8804843fde50a51a03468365f,2024-11-21T05:51:54.017000 +CVE-2021-23820,0,1,0a68fc8dfce8fa114540466f056989e35840e9ee18f42646e7983e078c9c5cbb,2024-11-21T05:51:54.017000 CVE-2021-23824,0,0,bbb9a711474b62b58291dd1188bf8bcb155385cc2b578cf95db9f4e6203dc7b0,2024-11-21T05:51:54.143000 CVE-2021-23827,0,0,a1f56ca6b0d75bc12b384ea0816f6ea2376423d479334d0790cd416a267c071d,2024-11-21T05:51:54.273000 CVE-2021-2383,0,0,f34dc74617b22c29abac2af7f9cfe87cc1b85eb6e4e127961bd814c6a0408fc0,2024-11-21T06:03:00.630000 @@ -172946,7 +172946,7 @@ CVE-2021-27556,0,0,778887766fbadba94fb97ed834f3b60a2e955186027a49a1cefd56375439a CVE-2021-27557,0,0,a8eacc3655641700595eeb2e0745a8c77343173086be723394724f68d546fd08,2024-11-21T05:58:11.310000 CVE-2021-27558,0,0,e105aa2088e068ce33d898358756acec875fc3e05c4f86d8be24290e21f34ad1,2024-11-21T05:58:11.440000 CVE-2021-27559,0,0,d24cb6058f8d381ca3085a56c42e32a5535f64b614451211ee77c1f298517aca,2024-11-21T05:58:11.580000 -CVE-2021-27561,0,0,698ec137ed6ed77d84060356ef976dd4e6a50610bf85d08b6615d3341de21cb0,2025-02-04T20:15:41.637000 +CVE-2021-27561,0,1,20719b3fcd72737d8bbecf0d2bc1ab9c71f11e70b51f1d4bef153efeb989dc97,2025-03-07T17:12:53.023000 CVE-2021-27562,0,0,1e9af58315cc74f4fdc547875a29e4c0ecb67acc20f02d7980a1c5056ca35cc4,2025-02-04T20:15:41.850000 CVE-2021-27564,0,0,46349670ffa1464c26c22df4bdedd124d17f71a1a9d806ba3cfbf356034f49b5,2024-11-21T05:58:12.023000 CVE-2021-27565,0,0,24f56b044e39cbda379c522f389bbce4d60f18815f79ad45cba91ed57fd35893,2024-11-21T05:58:12.160000 @@ -173723,7 +173723,7 @@ CVE-2021-28794,0,0,c3bd3bafabd343a2fd1301dd8aec75882bf84ffa0818784b88dc3c9f4ed10 CVE-2021-28796,0,0,8d6a674f05eeb4930ea8e4bf52fcb628f49321578fecd193281e47bdc13b0d34,2024-11-21T06:00:13.100000 CVE-2021-28797,0,0,dab576bcf095b75a1e8a7ac22401591bdad61405054ffa3b86090608887e7e10,2024-11-21T06:00:13.237000 CVE-2021-28798,0,0,a2eaa231c73d723f795c0337eae8248d375ab123b32e881b01c6b6df5ec75ad5,2024-11-21T06:00:13.410000 -CVE-2021-28799,0,0,dcda13cb31323e8a20ebf21f9ee20c628eed1583ad5e6159fb63f3e2bdd2b943,2024-11-21T06:00:13.537000 +CVE-2021-28799,0,1,cc3c2da2f57e491649776d08780559290654cf3d9bc96a84cbbdf9bd66edb98a,2024-11-21T06:00:13.537000 CVE-2021-28800,0,0,d837d281b45384ef3960d2dbb0f819ea439acef14d9564a0c3f77fdfb7c2ee05,2024-11-21T06:00:13.670000 CVE-2021-28801,0,0,edbcb61c825be77319e0af4a6d6d4dad68d195a109e7032b0fc0c750cb5f31f7,2024-11-21T06:00:13.787000 CVE-2021-28802,0,0,6b9de75c6c25d8a858c68002226f45a1ec6f09b8bdb13355d988b680129f396f,2024-11-21T06:00:13.903000 @@ -174563,12 +174563,12 @@ CVE-2021-30003,0,0,41e63ecf3796f2c560a51c4d12240bf88f64098cc9a65a965a6179f50ad61 CVE-2021-30004,0,0,30cea0f685eb3a8925a48680b7d0817973a2971acfe1291446a9185177636fb6,2024-11-21T06:03:13.273000 CVE-2021-30005,0,0,deb7eb2a839ff19973d29e1f88654641c6de47bd571412cb28a9cab5cea1203e,2024-11-21T06:03:13.417000 CVE-2021-30006,0,0,a4ba6766ab907ab782f03571c749c99e866fda0523b7980c99dfca31cc608ac2,2024-11-21T06:03:13.560000 -CVE-2021-30014,0,0,be3299c5f47dd026feb441e77392c1543bc5171512263b85a59e79fb7ebd1418,2025-03-05T23:15:13.217000 +CVE-2021-30014,0,1,bd9abeab9dc0b8a188c30c148de6c8eb4b96804a09ea168fc4fe04297055f82e,2025-03-05T23:15:13.217000 CVE-2021-30015,0,0,6dfad1afe14d7048d13f13c12e4e62cc15ac364f3246fb855c1ad3753bc7fe32,2024-11-21T06:03:13.833000 CVE-2021-30019,0,0,5607ad43d469821a81c7c1ba4cf982c040c1229206c65cb56853ec793d9a9b8d,2024-11-21T06:03:13.970000 CVE-2021-3002,0,0,aeb42c7a87a5807d92e6415753b1aa2a154b3fb68d497b9c24d8653c3b61a399,2024-11-21T06:20:43.243000 CVE-2021-30020,0,0,bbeaaded3be6114c6271d69cefc67ec573993abfc9f4ace09039fb5d677b603b,2024-11-21T06:03:14.110000 -CVE-2021-30022,0,0,b628ce4a2ca32ee55926996feb4739ccdb40e9fce38d88cc7936af1888443aee,2025-03-05T23:15:13.390000 +CVE-2021-30022,0,1,504460f448df8adb53b2c8d1752bbb089056d8ac7e7c01747eacf1a2bac63401,2025-03-05T23:15:13.390000 CVE-2021-30027,0,0,56009c2c6551f49ce242a61209a9182dd5d4365f2257655991c0d6d93d5f3ba2,2024-11-21T06:03:14.380000 CVE-2021-30028,0,0,5f24673cee541e27fd7ada2510cc191b244beb397d4b72a85cae94de4870891b,2024-11-21T06:03:14.520000 CVE-2021-3003,0,0,f55bcb1991a97f96a45e24e8ba07a8634353ebd96eae3a3bef994a6cd672f29f,2024-11-21T06:20:43.433000 @@ -175259,7 +175259,7 @@ CVE-2021-30879,0,0,20320501f2ff6ce3fcf5a78ccd617ae08f7a8e5337fa66ab841571dd8cf83 CVE-2021-30880,0,0,9de681e419b44e2ab1f986278ed96374e3999fd73463fa1ba5e9c3c1d1caa4da,2024-11-21T06:04:53.720000 CVE-2021-30881,0,0,cc637d0a6ab6de23487a32fa18daed7067c820f4bc1486572a8b802ef5c97185,2024-11-21T06:04:53.823000 CVE-2021-30882,0,0,0f19ca61ba398b2c522c355621f1c7a6eab4410e9793da040015d4e939da00dc,2024-11-21T06:04:53.937000 -CVE-2021-30883,0,0,1c23fdebbdff6c9411857a8a8ec025ea4952deb121e5508ae53255cd6d59d016,2025-01-29T18:15:42.520000 +CVE-2021-30883,0,1,bffd2ef47a00760297157ca240edba705ff71a0ec25ea2fa5da47595ab14dc94,2025-03-06T19:48:51.880000 CVE-2021-30884,0,0,8f91f908b5bdf1633b074dfd273b2ca013565cda78fad0d895d86a1f91f84631,2024-11-21T06:04:54.180000 CVE-2021-30885,0,0,5473b27189b8974fc745e13b7ea67e6fcbdb9fa00155501c7db0b4bc98b3bb66,2023-11-07T03:33:41.733000 CVE-2021-30886,0,0,f64b0521db294576de290ef4e1d863d6264e4559f1b7e285989c28c6b0c5bd11,2024-11-21T06:04:54.313000 @@ -175398,7 +175398,7 @@ CVE-2021-31007,0,0,e6af9a168bbfde997f1a3c390bd618ab950b3790bdb1c4bc1e63198976a81 CVE-2021-31008,0,0,c31f6b38d60708e2813826061640cee745e302a8afe3a1182bd05ef52cfaba0f,2024-11-21T06:05:08.710000 CVE-2021-31009,0,0,aebd2616c54a3a7fd1777b527eb8c34011fa33ef25d52e9fe1310c1a80829db6,2024-11-21T06:05:08.837000 CVE-2021-3101,0,0,5393b0faa5e899db9d0421b36d743b226b654285ee9f145ca94e29a50fe87eba,2024-11-21T06:20:53.637000 -CVE-2021-31010,0,0,669428059b5e6ab790591c486eb31dfb2cd325ad32d3d88d6f423dc0ad6a79d5,2025-01-29T18:15:43.220000 +CVE-2021-31010,0,1,34150456d7a22288e3c2649e9b15a447788d5f95accd255cf08d2f00ff95710e,2025-03-06T19:48:51.880000 CVE-2021-31011,0,0,70a43d5ac20a9bd1d04aab52f97bd81f3fb248c87e064dfc8241d02a413803b0,2023-11-07T03:34:20.100000 CVE-2021-31012,0,0,9a03d7b8ed15bdae23ae6e2d87fac44081a331e9fcb8d2782d2e303497c87ce5,2023-11-07T03:34:20.373000 CVE-2021-31013,0,0,dd04e6265f1d13b2a6fe90b89d0f487bbfebeeea23f1ae8c44394f6990bb1648,2024-11-21T06:05:09.143000 @@ -175593,9 +175593,9 @@ CVE-2021-31192,0,0,f07ef651578ca9860c64ae55919cc415bc34f952a26a3c22506cd89556b08 CVE-2021-31193,0,0,23aa20450819871fc24e6a5975ecd1defd4313ad2c6c4bbc2cce4665b72887d1,2024-11-21T06:05:16.630000 CVE-2021-31194,0,0,f6d0a81f0c364cc20dab4b9702435b1cab296ad6ac5379fa6b7c529c010b76bb,2024-11-21T06:05:16.790000 CVE-2021-31195,0,0,9f863898bd9e969b2def3de1f906368bf88bdb18f77e1d61ae70d6cf8852ee8f,2025-02-28T20:15:38.533000 -CVE-2021-31196,0,0,14d6911bb246fdbe3f58ab58f83882da93d47780dfeffef35ea4894aca62cfd6,2024-11-21T06:05:17.070000 +CVE-2021-31196,0,1,b4a3ff87ff4a588d43dacf1ba0ef7057fbd73f62e2ef0c3d82e72e17b3f84429,2025-03-07T17:12:53.023000 CVE-2021-31198,0,0,9956191044a9b27c74574616cd5002c2379d0ea3a552163e95b24a58e1914d49,2025-02-28T21:15:17.550000 -CVE-2021-31199,0,0,d07fb122b68a8f49d86e22035d4e212e5fbd412c4a1456c6f224f1ea60dd6c4a,2024-11-21T06:05:17.340000 +CVE-2021-31199,0,1,b9217f8727ab5e8d0bee2064777c525d17c3c7a408984271326a9b113ede1c8f,2025-03-07T17:12:53.023000 CVE-2021-3120,0,0,bac264ee650c446b7aa5a50d317a99aa8249696e4dfaef54a1e97c489757c7be,2024-11-21T06:20:55.750000 CVE-2021-31200,0,0,4e175f087856638bd9ca1d1d53a4eb6547b2633a9c2abcbddd564eb88a6e6b99,2024-11-21T06:05:17.520000 CVE-2021-31201,0,0,47459e5ba2cddbe81d96540c56dbbf33b278ab500767725b51744d07e9b8743c,2025-03-07T21:54:07.007000 @@ -176161,7 +176161,7 @@ CVE-2021-31933,0,0,308e3c4348898d39657c0252fb3fc84ba036f2d9d72096f4351a9aa18599b CVE-2021-31934,0,0,bdcdeba76ec796043a39460f835f19770c9eeb92f443398fde42216fc1cd3eca,2024-11-21T06:06:32.700000 CVE-2021-31935,0,0,b1b518ea7de708064c4d14f9e1a5510624d7d2ea8821b6cd9bde2f0fd2a223dc,2024-11-21T06:06:32.850000 CVE-2021-31936,0,0,a53d6f6a47090064b46686326c81a36c301029f3211d9a1515f16dd39e89e560,2024-11-21T06:06:33.003000 -CVE-2021-31937,0,0,109c410ccb58a94eae7f9ea386724c05402efedd2e36bdc642c1f8d94bdbbe96,2025-02-28T20:15:38.843000 +CVE-2021-31937,0,1,6ef3959c773f0a1b9dc1e3af3422dff34f177e7c640ca3d1f8ec2b63dbee84ba,2025-02-28T20:15:38.843000 CVE-2021-31938,0,0,1ce1e819a4c1d075df6f8f39678c802c2b7e6b246a221bed61bf3c4636cb840d,2024-11-21T06:06:33.253000 CVE-2021-31939,0,0,0d89a9a3d121dda56441416aa9d0cd520a48a18a6f63fc5855265b0bb6960ba7,2024-11-21T06:06:33.377000 CVE-2021-31940,0,0,5ab9c4eeed983df268b1b803bde589fcb04960a48582e82ddc7fcc7437f5bb71,2024-11-21T06:06:33.530000 @@ -176209,7 +176209,7 @@ CVE-2021-31978,0,0,01440762722acb63943eaee5dc1a5bd0703cb368b3bcee59f15c46f8994b6 CVE-2021-31979,0,0,43c2e154686e3746a4f41945786bf79b6c7cc96732b37a677821703876595ae8,2025-02-07T17:15:21.370000 CVE-2021-3198,0,0,75720823131e8fafeb57fd611000fd44ae4615f796074e8626b00b96edb947fa,2024-11-21T06:21:07.707000 CVE-2021-31980,0,0,fd4b30db4b74cff39d00583afcda5c0b332b9962989f1726553e79e42d64824a,2024-11-21T06:06:39.557000 -CVE-2021-31982,0,0,a2eb14893c4adea0b44c48f961714069e165fdd6e8eb4953cb5348d63a69e0d1,2025-02-28T21:15:17.857000 +CVE-2021-31982,0,1,1acefdc940005d210d7ac405ac14fafc412e988340e9d2308ad14340cedac48e,2025-02-28T21:15:17.857000 CVE-2021-31983,0,0,2e97bf3e718999ada1cef6809f2a718de62cecbf3983e99368fd1d52f133b75b,2024-11-21T06:06:39.803000 CVE-2021-31984,0,0,8f1cae8bcdc1abceca9656a2c6987f76ed6e788f845a3f161745b2b977fafaa0,2024-11-21T06:06:39.923000 CVE-2021-31985,0,0,c8addc8274addfec115fa884afe6aecd901abc7696da0441e971062781a3c981,2024-11-21T06:06:40.040000 @@ -178037,7 +178037,7 @@ CVE-2021-3452,0,0,cd0f29219d7d013203ce823706de865e668257408956a0a3afc2a318697cb8 CVE-2021-34520,0,0,7afffe3f6faa615530d526305731535917bd778345f079354bb4412e93c7a522,2024-11-21T06:10:35.623000 CVE-2021-34521,0,0,cde55dc1c56c131ab5d72d16641840fcac0d3d534b0ec42b5fb6f46ac8ce1b47,2024-11-21T06:10:35.740000 CVE-2021-34522,0,0,76cb3b9f961b7fa625a706c179c3aa44635bd6ab1f6378c9aea69512c07be06c,2024-11-21T06:10:35.863000 -CVE-2021-34523,0,0,df4db33b8c482e1b0fe130c94f6f052f405f847aadeee52492a76184bf77a22a,2024-11-21T06:10:35.977000 +CVE-2021-34523,0,1,2217e5fc3e7a167fdf8061d5449c88d12a45324b3a2eeff00dcbbda135e55d75,2025-03-07T17:12:53.023000 CVE-2021-34524,0,0,14217f656e46490b7b99f1d06acb14915698fe81e852b6649eadd5b0e72122b0,2024-11-21T06:10:36.140000 CVE-2021-34525,0,0,f2eb365a183ccf3725ad9aa4bfcef667ce84e13fdeb29b2c958fc5feb3f53a5f,2024-11-21T06:10:36.267000 CVE-2021-34527,0,0,e4811fd47ebe5ef4aa324a0518651f903e935a93b4075ea6c2bb29a50d02abed,2024-11-21T06:10:36.397000 @@ -178531,8 +178531,8 @@ CVE-2021-34998,0,0,ef42b041640f68781abb0a8af3ef94e3d0f019d8b06f73821d7872bca69b5 CVE-2021-34999,0,0,dbc0aff416c5e5345dfdee4f2af42756d1f58036bd9671c1df22d91d60005a7f,2024-11-21T06:11:40.303000 CVE-2021-3500,0,0,2f7ca3f155bf428684e2ad97255a9c2a0a5f3be53f05471ae7f389614561a3a0,2024-11-21T06:21:41.537000 CVE-2021-35000,0,0,adc9f85b1ac940b4d74f9e0eaacd91bed627adf20e1225c4d4dbe338189215be,2024-11-21T06:11:40.427000 -CVE-2021-35001,0,0,08ab8c42d2d235a3b6e64a975a03be6845eb65283ca07cb50d20d893f5997e70,2024-11-21T06:11:40.547000 -CVE-2021-35002,0,0,a2f3ddd150016a76d5de1f1d1ce11e790647c9f1152d3af7396d273f2bc9bade,2024-11-21T06:11:40.673000 +CVE-2021-35001,0,1,7135774d0106a7a85c4800708e1667498ac7aeb8fbcc2fc0de6eb89e2ae400e4,2025-03-05T18:25:53.837000 +CVE-2021-35002,0,1,d7090928e1e8bd29878fb315ac6bf774058452f78c8474fc99531191474bcf9c,2025-03-05T18:25:53.837000 CVE-2021-35003,0,0,120f22c20a5974bd1b03170c0bdb649660600ef26e7bbd3a53585f8e41665b8d,2024-11-21T06:11:40.790000 CVE-2021-35004,0,0,49f136ad0c93b4e2545e35398a21443b9cb552ac8880e47b51bcb151d8010a8c,2024-11-21T06:11:41.500000 CVE-2021-35005,0,0,8a670d7c61409040533ae0e45f6fb1f807abe7e7ad6afd9c8af03dd5771c661a,2024-11-21T06:11:41.883000 @@ -178910,7 +178910,7 @@ CVE-2021-35583,0,0,4d409640f1fb87687346969496adb13970aac82d0fa3ec792bc6591e6ca63 CVE-2021-35584,0,0,8a8267540a8ada436b5a9dbb727b26cb7997a6c73bbcd3c176adfdecdf3b2fa3,2024-11-21T06:12:35.010000 CVE-2021-35585,0,0,9512e1263e8b5f214e71a8332ad4072a8f43e5fd759f231d00f7cdba4dff6ed7,2024-11-21T06:12:35.160000 CVE-2021-35586,0,0,91b468b392393b637ec637a19ad17ae5e7873ee6201d3613fe1d4ff445644af9,2024-11-21T06:12:35.307000 -CVE-2021-35587,0,0,e4eb5092aa2ab74a5eb33ebcec882c9df5028fe32aa61cbd12b144d8fb6ed192,2024-11-21T06:12:35.493000 +CVE-2021-35587,0,1,0aa367e4746eb3f4b3aecef1c3cc8aba2ad8c499fb3f44aa78b68a3406d3e12d,2024-11-21T06:12:35.493000 CVE-2021-35588,0,0,181160accfdb58e8be070dd76dd4d5e0ff5688a88d2d3ddd60dd4429207b8d10,2024-11-21T06:12:35.663000 CVE-2021-35589,0,0,1bf9fad0c22d865b274937bc201e3da0af6375e301c67f1bd55cd9dfb430957b,2024-11-21T06:12:35.823000 CVE-2021-3559,0,0,79dccd4506676edc433427af8cea5d8f4aba121afc8a9327cd5da15be8c40796,2024-11-21T06:21:50.863000 @@ -179410,7 +179410,7 @@ CVE-2021-36376,0,0,5e0bf206c1ec47984c685b724f98704d839ec792ace5e1ee7d6ad4e7697cd CVE-2021-36377,0,0,48da614765e7934342ab71826af56343758b23f867066adabb92e96594f08a61,2024-11-21T06:13:38.473000 CVE-2021-36379,0,0,de1a5a3ea409e940a0ce1bdfe0811194cdd912c3ac5c4801bc56692a9b7119ba,2023-11-07T03:36:45.670000 CVE-2021-3638,0,0,94bc85022fc7ad9f0fb1d329f574d9cf23c909bafbcef2dafa1edd97a3ea9052,2024-11-21T06:22:02.743000 -CVE-2021-36380,0,0,02caf46b603f52bfbd7f17e09ae68f73e2c231432df44bb287c2776b89c8fae3,2024-11-21T06:13:38.640000 +CVE-2021-36380,0,1,465cea34532c2cbbd2abe144ac4bc24f39341df9e6025fcb88db65435cbb557e,2025-03-07T17:12:53.023000 CVE-2021-36381,0,0,a3ed8f09cf81ba55ff4f48f00865ad9cc271e1af7ff89713f9f992d8513df669,2024-11-21T06:13:38.883000 CVE-2021-36382,0,0,be204b396ac7b6c3abb8de759ba5b3f87f4873f262af31e67969b90ab79e4145,2024-11-21T06:13:39.027000 CVE-2021-36383,0,0,2e0d659fedf9f0d70ecbc1a01b5a704e0376fc87344dfe1b450d1299c99debf4,2024-11-21T06:13:39.177000 @@ -179766,19 +179766,19 @@ CVE-2021-36938,0,0,97d6969fc21f4d8559cc5ff968167a48ffe1a5b3a7814eac248fe95714452 CVE-2021-3694,0,0,da38678d00387e698ab98b579a4faf9a02fc32d84babff8135edd5babddf2f6e,2024-11-21T06:22:10.327000 CVE-2021-36940,0,0,3a580e568385b65a55a4b15192194bfe99ea34b565e59497d2f3dea30ac78aa2,2024-11-21T06:14:20.850000 CVE-2021-36941,0,0,3f6a8ec4fa747171bdbd8c73386ee5e08a6842c97b83918393e495b03dbef919,2024-11-21T06:14:20.980000 -CVE-2021-36942,0,0,919235ffb998e900153880b7d28969b6fd3b39f988336612e4e11dfd594e102b,2024-11-21T06:14:21.103000 +CVE-2021-36942,0,1,4cfa572ffa4629e8f960d86f005b241a7918cd346d39a23e369da15ea6116ef2,2025-03-07T17:12:53.023000 CVE-2021-36943,0,0,af9350909f839f1ace06d74a6b86d55846aeadbeb0ad6105826ea0ee1fecb2c2,2024-11-21T06:14:21.250000 CVE-2021-36945,0,0,6c78978d80c0e63823e6aa961ff192e24110b33de3387a5c552dab1443b115fb,2024-11-21T06:14:21.363000 CVE-2021-36946,0,0,d5db84055acb84fdc080f244ea92dd1580fc53c4c64d2f2996224826d2d5767e,2024-11-21T06:14:21.487000 CVE-2021-36947,0,0,1f0936eaa05f67933ff06c62da2d324cc1acfed8df3013bcbb206bca552a9ccc,2024-11-21T06:14:21.607000 -CVE-2021-36948,0,0,43ba20f8ad26552184f6347883a0caf495b648124777ce65c56241654c58699a,2024-11-21T06:14:21.747000 +CVE-2021-36948,0,1,20126c122ff4ac3730a4ffa3cbf50995dc2036d35b4a918beaac09bbd2ce2d7c,2025-03-07T17:12:53.023000 CVE-2021-36949,0,0,fcc57f49005d77464e175b2badf5e15e67598fd41c2ecc4a6f81c49923e4c8a2,2024-11-21T06:14:21.867000 CVE-2021-3695,0,0,15692bc004f3f772ab90899f1bc81c354819460a1a523de3fabf7667c31d6460,2024-11-21T06:22:10.483000 CVE-2021-36950,0,0,41fe62efe6edbe92a02da19a1518896c820b47e3cf08a847b2eef7a8adb4be2c,2024-11-21T06:14:21.980000 CVE-2021-36952,0,0,7eba5b5e5a41f180e61d40e1c00af29183050bafdd1af873f271aedede94fe83,2024-11-21T06:14:22.090000 CVE-2021-36953,0,0,1134dd1effe951768b90eededaa563bc2df1a02c4f887691aae1812774cfe3e2,2024-11-21T06:14:22.217000 CVE-2021-36954,0,0,72b8d8d07a8279aeb66c0a83fb901e49d95228cc1a8fafd85da7e37341e9eaa2,2024-11-21T06:14:22.397000 -CVE-2021-36955,0,0,fd4e871246650e6b231fcfd36dd90a03cd0f75cc4d7fbe34df36222c643a5a1d,2024-11-21T06:14:22.520000 +CVE-2021-36955,0,1,b7730424cbb7e46ab7da1aebd5f2b54439d331ac893ce3f843a3e9c40bfbf10d,2025-03-07T17:12:53.023000 CVE-2021-36956,0,0,ad15e9b745004a28b76239028e28deb4222dd12b83f572c76ed1669702748d19,2024-11-21T06:14:22.663000 CVE-2021-36957,0,0,c54c2931545acbf56c1cc04ffe2ec17ff1f2faa2b09452563fc3d369f1afb3fd,2024-11-21T06:14:22.787000 CVE-2021-36958,0,0,6cf5baa8f3354376fb08da3bb1d40176493a9a5f1ba4a233dd3c30f3a750c30e,2024-11-21T06:14:22.930000 @@ -180575,7 +180575,7 @@ CVE-2021-3797,0,0,3590ccc3191e2443aa904ab7148349c901e0e747927462bce890749221ee59 CVE-2021-37970,0,0,c0c056a237b910ce0a2b98bc1f0a90deee2f6b7531b4ed711278e73bcf99c30c,2024-11-21T06:16:09.500000 CVE-2021-37971,0,0,6f98832cea8c6c41a2789df18ed7da8b96043e8ad22001c09eeddd714eb83e85,2024-11-21T06:16:09.643000 CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f32c,2024-11-21T06:16:09.790000 -CVE-2021-37973,0,0,f6e3eb5a52902d515f80eab88d06b903882cf71b462d47ec910b5677092515b5,2025-02-03T14:15:32.667000 +CVE-2021-37973,0,1,96d8b6a601f9bc8b31962c83fd63f97273736bbe38db3a730d0a3e6b35fcbfe1,2025-03-06T19:48:51.880000 CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000 CVE-2021-37975,0,0,574c7731ec3c645981816344462d7b8e155d6f2955a8879bf1219a53ab4d177c,2025-02-19T19:37:44.870000 CVE-2021-37976,0,0,dd5a7fa4d6b16e7e14ff3b5357015c05846da841d51b43f563c37221ca591a09,2025-02-20T18:05:54.830000 @@ -181148,7 +181148,7 @@ CVE-2021-3864,0,0,22372ba78ad49871b70e0b53814b17a40daff7a1ba0abde9e00901ca6509ed CVE-2021-38641,0,0,4ca22b2db6f4312f184cc82f67f515a382f74bc2ef26052cb8575b8c8eb09b18,2024-11-21T06:17:47.793000 CVE-2021-38642,0,0,c2cd78728b754284396a76492bd31483a0687e93cbf7a345cf21cc0e34e3b792,2024-11-21T06:17:47.940000 CVE-2021-38644,0,0,17a8fbbe7e6d2d71773a2b0dffdc746888b13bf949dfa1afaffa125bb9de35d2,2024-11-21T06:17:48.080000 -CVE-2021-38645,0,0,60c652f74c6809a138f4641951d5fcce2f7e6228cda63997ceb9ceca921001ce,2024-11-21T06:17:48.213000 +CVE-2021-38645,0,1,3a7f24c3d2ee8c5b2682208abf0f8ce6a692ee2c49a82e06f478b12b58cd2449,2025-03-07T17:12:53.023000 CVE-2021-38646,0,0,858b6f34b1addb057a8d4566c9602e0921213ce94b29db24f316983068cbe2d8,2025-03-07T21:54:07.007000 CVE-2021-38647,0,0,16205c79830d430ed63beaefc9dd5fb2624401c70d1b9468e538030b2389aa5c,2025-03-07T21:54:07.007000 CVE-2021-38648,0,0,01ccbf9840c5ba06c5276c1f5616771c6a93ceb6bcfa89773b8ef723087e8319,2025-03-07T21:54:07.007000 @@ -182700,7 +182700,7 @@ CVE-2021-40570,0,0,c22c108bf4eb3a63400f0e217bd0a245fc997bee7ab90340ddbaedddc716b CVE-2021-40571,0,0,aa4f6a71450787379fdc95d80863d7f90a59d3c06d2cd9a0bb0dd192095a7aa9,2024-11-21T06:24:24.450000 CVE-2021-40572,0,0,edac3c01cd53a913854635a11f375e6049f8eae8c654ebb018fe539e08cb6729,2024-11-21T06:24:24.630000 CVE-2021-40573,0,0,5b7d9b9ac0e4ad1b5e8e623e8abbbe0c5b2cd805c7dbec828c37f93b203438f0,2024-11-21T06:24:24.823000 -CVE-2021-40574,0,0,49d22b9cf953b81bac858b399c72a2e1bf729928c8122c88cfc57d200f9b7f76,2025-03-05T23:15:13.557000 +CVE-2021-40574,0,1,8fd3be16b73367f93c312162a865f0d37b0b9285828f421daa93f62d44a44647,2025-03-05T23:15:13.557000 CVE-2021-40575,0,0,0f65f4ef9c810f1b2e325a3627816e075a88e30d91381050d0540696afb617c6,2024-11-21T06:24:25.183000 CVE-2021-40576,0,0,cb8f3982fb5429dfc85000a4f18127ab8409bfb0135825f13f7ed91881373563,2024-11-21T06:24:25.363000 CVE-2021-40577,0,0,b29810c963e75a9e5d0c9a4bc50764dbb309f3abcdb5a165aa7109da18e9c9eb,2024-11-21T06:24:25.553000 @@ -183612,7 +183612,7 @@ CVE-2021-4171,0,0,d6973b89eda8573f0cc77737b23b712a87bd9e9baf6501828b75ab17d50f2c CVE-2021-41714,0,0,e48756d244dee85ea57debac32e4d12267f4eda2b8e124373427985b69ebcaad,2024-11-21T06:26:39.217000 CVE-2021-41715,0,0,db879839d02c790808ec1a011ea57dfd852a0f1c316a65ebea370d2db32e0b3a,2024-11-21T06:26:39.383000 CVE-2021-41716,0,0,d34bb8fb71dd2027fe9e5668ef7fdcc1793fc7e22897bb2b84d6e0b5904561bd,2024-11-21T06:26:39.543000 -CVE-2021-41719,0,0,b916032008ccf43406d636af25ba4f943ae3db0f0daa6c0e01de662b7db596f0,2025-03-04T21:15:11.237000 +CVE-2021-41719,0,1,569d51a637bb77ae0cb97e3bf0edacacd42757960ae97408c71c05a163a48f65,2025-03-04T21:15:11.237000 CVE-2021-4172,0,0,e96e216ec67c77f4d12066b034c9783c3a8dfe54a2298c3700ee210d6d4468a8,2024-11-21T06:37:03.893000 CVE-2021-41720,0,0,80ff269557dafca1f62fd75c530f1f3954044fc80a2b1af1977e3aae370d8856,2023-11-07T03:38:59.713000 CVE-2021-41728,0,0,ad5a0dd3cfbdea3c0e75417edb410657010dbedf6d45fb8c3988fe77fa9dcf34,2024-11-21T06:26:39.710000 @@ -185414,7 +185414,7 @@ CVE-2021-44203,0,0,508eb6b050cb9edbc4d859609017b4ff90c361b8833265453c85194c90e26 CVE-2021-44204,0,0,6aa974a64a61b329c694450f42afb1d8eae9a90c5f26859b2e2e19f2c7f64169,2024-11-21T06:30:34.300000 CVE-2021-44205,0,0,9799064d1571df0d6982a5073ec220e92a13da5e067c0085ff08f97692729941,2024-11-21T06:30:34.457000 CVE-2021-44206,0,0,feed6a6bf0af4d6221906ba9bcec078465a0c79d160fd89322c280f481c9a8b2,2024-11-21T06:30:34.593000 -CVE-2021-44207,0,0,b5aff12efd2c462c108587ffe1f77bd44563f08cfb2733b021b96b22b53bc31c,2024-12-24T02:00:01.823000 +CVE-2021-44207,0,1,770127a1c34c4c1a232a75e864c17ccc57514d10be77da8f276faf3b53a7c1fe,2025-03-07T17:12:53.023000 CVE-2021-44208,0,0,a9d10b6a2bda2a03da19d70e83cce1926454ffed3cce9a05f84b2a5b9a807bcf,2024-11-21T06:30:34.903000 CVE-2021-44209,0,0,13573abfe045728a3019e5db77d9947d269097fe48a3b8d8e4f8297ef768ba41,2024-11-21T06:30:35.083000 CVE-2021-4421,0,0,fa171effbeb755b01cbed06c07ebd983fcfa0fc4053d0cff65567cd80e77ab7e,2024-11-21T06:37:41.153000 @@ -185673,7 +185673,7 @@ CVE-2021-44526,0,0,7ea3241da3c4b98a7ec39e7167eeb0e7907c4a19b0d89197fa337d186f61f CVE-2021-44527,0,0,7319922d1be00e495135202ffea66439e6defe836e4fe697b546a514590436aa,2024-11-21T06:31:09.933000 CVE-2021-44528,0,0,d1b06b895f167c9432839ddbbbf028b094b0f18def21b7f3343fa88e5359c944,2024-11-21T06:31:10.060000 CVE-2021-44529,0,0,56bd9b4288dd6c97350a8754260dc5af997b1a920f77d92c24ec20a8f9e2816c,2024-11-21T06:31:10.190000 -CVE-2021-4453,0,0,a6c20f7ca842c3c79af5890ac1bb31ffd7c50c6f9c0b3b86b20d0baa1fdf37d6,2025-02-26T06:37:29.820000 +CVE-2021-4453,0,1,fd2234620810d55e71d90d3aaf5a7253785000e8cad65cf02669345e8069d244,2025-02-26T06:37:29.820000 CVE-2021-44530,0,0,50dd50139f6db9cec4390a2fe08291ecb15c33442e808b321adfda099dd59322,2024-11-21T06:31:10.440000 CVE-2021-44531,0,0,e72c46aef544c16b9b7d45ce9edf39451e4c154a1afe49b24a4148b3cccb1819,2024-11-21T06:31:10.550000 CVE-2021-44532,0,0,24351336b904bc34f340cbe67f0e8f8f158ccb31b0ba4c0d06bec574c2e4c906,2024-11-21T06:31:10.750000 @@ -187434,9 +187434,9 @@ CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340 CVE-2021-47183,0,0,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000 CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000 CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000 -CVE-2021-47186,0,0,83160bdcf56ac3709355890febc241c8c39459a8f5cd38f4d614419ab81748a5,2025-02-21T17:15:10.273000 +CVE-2021-47186,0,1,7721a187f8e8c62334682866aa8345b5755552738c32ac28135cd018e579e6a8,2025-03-03T17:47:59.260000 CVE-2021-47187,0,0,a4aa540b0dd14ad359c36d2a9ab5f7f6e0f4d25d40cc6e094f3e9a0ba8dd3469,2024-11-21T06:35:35.210000 -CVE-2021-47188,0,0,22f0841cea1b499e75e95a07b621e48805710bdce543824a21f83040e21518e1,2024-11-21T06:35:35.330000 +CVE-2021-47188,0,1,d649a31ea23e8975108bc626e76e9eeeb454b02bffcb4ea977370ce5ca1ec1d2,2025-03-03T17:47:59.260000 CVE-2021-47189,0,0,6b5a3eaa80084a3e837e6115663c571962e3f793536fa8f08533d74f389c8aef,2024-11-21T06:35:35.463000 CVE-2021-47190,0,0,40ef95b8cb1627967e420a0198535424c5b2953d956679426a61ed7516c65495,2025-01-07T17:11:50.810000 CVE-2021-47191,0,0,852e5f21c2f27721ffff20a5aa14cc9d373131c4810b464f930bf925acc7d2e7,2025-01-14T16:40:59.737000 @@ -187444,7 +187444,7 @@ CVE-2021-47192,0,0,7c4cd5bbbdb4219843e00ea339300d08c65e06dec7b36ecf3164f42082648 CVE-2021-47193,0,0,c905fa876770fb280b0f84199dc4cabbc26a998966555c8162862f405026d033,2024-11-21T06:35:36.083000 CVE-2021-47194,0,0,0cf48d0987b605869a637210ddbdf4bc207c9eaac2ae582e1a26f691b3d52160,2024-11-21T06:35:36.263000 CVE-2021-47195,0,0,ae07f8af7323f460f36cddf655e138db6ede037a4af6c91ef72f3e6c96ece0fd,2024-11-21T06:35:36.413000 -CVE-2021-47196,0,0,b2f9dc75df3d0aba4ec66eb76bc72f009842656b964cfe0c9dea27e597c20f81,2024-11-21T06:35:36.543000 +CVE-2021-47196,0,1,46b865331833792b2a392e4d0388c052b812a2a2ab74c5793e1c4494362bc39a,2025-03-03T17:47:59.260000 CVE-2021-47197,0,0,e1be827f1706e71126b521cdeedf1b7080c03ca936e6a8a7a91237e856912a8d,2024-11-21T06:35:36.657000 CVE-2021-47198,0,0,b993f750c37c4c38f432a1fa687c613c700df27bc966490e10b5bbb5b658e377,2025-01-10T19:05:47.023000 CVE-2021-47199,0,0,b54d7d4593bdaa1296c80c94872766f0aebb031e426176cb727724e16ea27e3b,2025-01-14T16:40:06.220000 @@ -187453,7 +187453,7 @@ CVE-2021-47201,0,0,95dca28d1aec2043b14c4b3d34caf8b5c6cf58f315fe66aad9fdae98e9727 CVE-2021-47202,0,0,f71fdf699570077845ea4020f7dda9b1b42ec5830520d11735bde0982f5ac699,2025-01-14T14:42:43.193000 CVE-2021-47203,0,0,9564d820cb2d93da0a0ae7eda2757d5eef2fa0adaa3776421915d06aab3e590c,2024-11-21T06:35:37.340000 CVE-2021-47204,0,0,d855ea7a1c34fec98e08b6ec6fc4b87aa056a23800ca368fb608f86f4465fa84,2025-01-14T14:35:39.270000 -CVE-2021-47205,0,0,24af3f569e050754e222cf8538249f4b328d7d4ca7d23915b32a9f9689e73f7e,2024-11-21T06:35:37.577000 +CVE-2021-47205,0,1,94279f64e464b133b9f03621b2ea5cbf4827e45708a593016071d18964e5be6f,2025-03-03T17:47:59.260000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000 CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000 @@ -187467,7 +187467,7 @@ CVE-2021-47215,0,0,cfdefaf9b029543f16aac32420ba933dec7095dbd6f0caf21f6b7dae971c2 CVE-2021-47216,0,0,b9923a9bb40b309501da4df280ea3daae9d799fc68ae86aeac9aec8067d1b429,2024-11-21T06:35:38.797000 CVE-2021-47217,0,0,0a489705239b1608b1dac0f9ef137450310d629ac310e04d5fbc0878960cf64a,2025-01-14T14:44:11.917000 CVE-2021-47218,0,0,cdeb5c7e6dbdcca4a12e7f3fd8c0c1023ff2d2f036ea1b66236860ff4b09a050,2025-01-14T14:44:55.610000 -CVE-2021-47219,0,0,8fd7b49783f6254677b7f9434439a8e53b783a768ae7c5cbb865150bd782a548,2024-11-21T06:35:39.137000 +CVE-2021-47219,0,1,848c7560301c9fea53dfdf882926cc48d72010673b3629d60f70343efbd877f0,2025-03-03T17:47:59.260000 CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000 CVE-2021-47221,0,0,7afbe582defa95f34b58ec3b4d10fc6db91ded7409ab2f1fde46bee521aabd80,2024-11-21T06:35:39.267000 CVE-2021-47222,0,0,f0d76d0e2cdb314b19f8094ddd09a2b1cda77d6c5b61bbba0f92f2b58298fbb9,2024-11-21T06:35:39.383000 @@ -187655,7 +187655,7 @@ CVE-2021-47403,0,0,8e9a0db3b62d6c0cacc4676198b64747930d54d96a5fcddadbe78d515353f CVE-2021-47404,0,0,b4a6c4984c318e0b5f084184228def57d269d3a8a4195164e12844a9b471a71c,2024-12-24T16:05:42.447000 CVE-2021-47405,0,0,1cdbd44c13d2f8232fde2c8c485c2b6990b3a78ee79f2bb0f3bce11552afaaa0,2025-02-03T16:11:50.860000 CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000 -CVE-2021-47407,0,0,4157cc74fa14aaaad2bf37307620f8a8d44aac4a5a38db5748133d0604b69980,2024-11-21T06:36:04.980000 +CVE-2021-47407,0,1,09b31925cba995f506e21d119d21a0268f86d18953b4ea126e0cd4f100d9e42c,2024-11-21T06:36:04.980000 CVE-2021-47408,0,0,1bb9de9f9fb0c138f101bdd077c488720764253896933e9ddd90af986223f012,2024-11-21T06:36:05.087000 CVE-2021-47409,0,0,4409848935610c806a916f78420b16db2a2ab2efcb7ac8dd99c83d5249f8b960,2024-12-30T20:00:41.677000 CVE-2021-47410,0,0,4075c00f9d5ffd89b59e95e73a9e5fa86e05d5bb14ffa8d2023787fcb8cce122,2024-11-21T06:36:05.360000 @@ -187873,36 +187873,36 @@ CVE-2021-47621,0,0,cc65e3006cebbde43642e9fbd2d8cfabb01079eb7c90b09b8a7980eb912b1 CVE-2021-47622,0,0,3f7658486b916d46d507738eba465babaa2980cfbdc235eebc36198bd63c2e16,2024-11-21T06:36:41.647000 CVE-2021-47623,0,0,91986677d2b927797b5966fc0ca5a89d3af7a7e6c7265115b11848398ade465a,2024-11-21T06:36:41.780000 CVE-2021-47624,0,0,592282086cd10fb104528f56f6839241d592ee1a02779ba76fa63df4227294fb,2024-11-21T06:36:41.900000 -CVE-2021-47631,0,0,e4257d4095a6e1c9b12125b4971a5b31a11e661e2df047892bd037e3e35d6fe4,2025-02-26T06:37:04.400000 -CVE-2021-47632,0,0,76e2f3106a1bf72f318982b12d16b0ade3871d61e4384511559963538eb876a9,2025-02-26T06:37:04.943000 -CVE-2021-47633,0,0,662212fad6bb138def43d601044c95a262d26185fd28ff34ec2f682992a6057e,2025-02-26T06:37:05.060000 -CVE-2021-47634,0,0,ab5528e0eb2af02ab96c66020cd494f91dad5818054db8322dad466bebb37b8b,2025-02-27T19:15:40.623000 -CVE-2021-47635,0,0,55b6977eab9e35740cf849e318d93f8c390be9e1102bdf774b39a61d0905e5b5,2025-02-26T06:37:05.280000 -CVE-2021-47636,0,0,2092f486508f30d532c96fd83423509597029a6c1b2fa000cae37d16ba6b3391,2025-02-26T06:37:05.377000 -CVE-2021-47637,0,0,a7b76072dfbf0861f35f6f9a13883a022241d7125d97f110216261daf70de01e,2025-02-26T06:37:05.477000 -CVE-2021-47638,0,0,a74849e8a0f7a94f290e600f7d2e8967a297638517ebd47fdcfa36deeec3439a,2025-02-26T06:37:05.580000 -CVE-2021-47639,0,0,17b8fca6bf4b52114dbce5b1cb2899855c7b3b6e0c480e14fb1d194743173a7f,2025-02-27T19:15:40.773000 -CVE-2021-47640,0,0,dc51f273c96f3f3ce59294c169e9df7f572df47704c789f34fb5e3adde92f274,2025-02-26T06:37:05.780000 -CVE-2021-47641,0,0,b5a9bd1da74573c162798e131118ddf54d51182e22bec27c8dcd4653824818d7,2025-02-26T06:37:05.883000 -CVE-2021-47642,0,0,fdf2427a64fe49a9475ebf1c85ecd97e34cd6715da4040eb3913858f2623319a,2025-02-26T06:37:05.993000 -CVE-2021-47643,0,0,0a3628c495e756a4723464a06f039076abb696113f45009c008d46931d18a55f,2025-02-26T06:37:06.097000 -CVE-2021-47644,0,0,816b37adcc0102b604e4c434485d91ad7e75073630d6877a21b2ef677fb16030,2025-02-26T06:37:06.197000 -CVE-2021-47645,0,0,ad4908b673381811b31b630092b640db85adaefc8f382847b15e65fd52c657f5,2025-02-26T06:37:06.293000 -CVE-2021-47646,0,0,81333abc3b2a80d12c4d7ff59b9a11e55ba8d13768cb502e645619f02f9125c7,2025-02-27T18:15:22.093000 -CVE-2021-47647,0,0,7ca0fe359737b15f94367174c170a0790eee74470baee79fb96ecc408fab4608,2025-02-26T06:37:06.490000 -CVE-2021-47648,0,0,73326aa13995ec97c9d5bb04ae8faeb81e3442c05aa316fb461a9690a16d3fc3,2025-02-26T06:37:06.597000 -CVE-2021-47649,0,0,e03b535601194db5d96b14b92977982238614daee3674523620fb8874de896d9,2025-02-26T06:37:06.687000 -CVE-2021-47650,0,0,a9c26f8b871a568c4da4fe5f89a695dbead0285822fd04643e92eaa7c0327383,2025-02-26T06:37:06.780000 -CVE-2021-47651,0,0,39d4d4b75ef9063073fb4bef82a8dc69caa302b4979ae4c4748ecfcd4ec07352,2025-02-26T06:37:06.880000 -CVE-2021-47652,0,0,bc4b5e57b752b6cfd8af0e4b5a879724547635e7210c58818b944eb465685193,2025-02-26T06:37:06.973000 -CVE-2021-47653,0,0,04eaa3d5f4fd396b8e04c0075027018d64abbfa209a016b6c86bfefccecb9148,2025-02-27T19:15:40.917000 -CVE-2021-47654,0,0,79210aef31a176c721bb4075d7c368deef87565e89736e27542164344c4ea939,2025-02-26T06:37:07.170000 -CVE-2021-47655,0,0,bf987fa7c09c8d75afeb73168453bb6d64cc72eeecf9021218ced02f88394cb6,2025-02-26T06:37:07.267000 -CVE-2021-47656,0,0,e2177c77ee4fe6ea315be5da13c2e4035835d0163562b408590e31a286ffa4f7,2025-02-27T18:15:23.133000 -CVE-2021-47657,0,0,edf12d31363a0994d1c245eaa5770d04dbadc473d432da575c8a4aa3595f77da,2025-02-26T06:37:07.467000 -CVE-2021-47658,0,0,ae4523830c3f70c3e7070c4797115b54dc6fa05218237321e2949324c1e47704,2025-02-26T06:37:07.557000 -CVE-2021-47659,0,0,eb2f81b9c85c25dae40fdb9c018122f29e0bc8664efa1bc24b8f0d5365b6f2b0,2025-02-26T06:37:07.640000 -CVE-2021-47660,0,0,9eed2965d5c33ac995f49528c9c5af70824c4fc22e8189f8f55b56ade76a41e6,2025-02-26T06:37:07.733000 +CVE-2021-47631,0,1,a69d3b8feec8746ceedc9c0873cbc733b9a0285ea16987e69528560a61aea823,2025-02-26T06:37:04.400000 +CVE-2021-47632,0,1,fa407140b5ad0a8aaa6702cf5050bbd27f77c7c72bb7046ea59c3ba4fbf39d56,2025-02-26T06:37:04.943000 +CVE-2021-47633,0,1,29d448f0c317b41f3342e5eb405bb07bf79a194244d026ff16156d24f6e10448,2025-02-26T06:37:05.060000 +CVE-2021-47634,0,1,c16b0ce76a2d010b61ed014053a29ba5220dfc23ae6ec82ea3a575019415753b,2025-02-27T19:15:40.623000 +CVE-2021-47635,0,1,786e1e6f465fc33fbc134f3af050e2dd8dfd8b7646e7ac88fe4fef0ef83ed199,2025-02-26T06:37:05.280000 +CVE-2021-47636,0,1,ca7da47faf0426c55f1486432f8b6f2a548392bccceb631d81d2b0aa69bf3e63,2025-02-26T06:37:05.377000 +CVE-2021-47637,0,1,8a4b2bb08baa6417bf47a716a2079f00c4fe45f1537e3450215f49b7b23f8a18,2025-02-26T06:37:05.477000 +CVE-2021-47638,0,1,5b76f057e440ca6147e1f36c21aec3744ab0a725fe75606049cc88d555dbb718,2025-02-26T06:37:05.580000 +CVE-2021-47639,0,1,11f8f9d6d59539a955b9ce12106f585044a875b4b127ad574201c0d9e72e8ceb,2025-02-27T19:15:40.773000 +CVE-2021-47640,0,1,eeae88b95e0e57051eacbf3fdb36c1de6dc526f28c0d9f6d5a8ff91f5d30c5ea,2025-02-26T06:37:05.780000 +CVE-2021-47641,0,1,857a1465bce116085f77a8b6929c98b4aa906b08be55067c5f7922899c6ff83d,2025-02-26T06:37:05.883000 +CVE-2021-47642,0,1,9c61dd6599dbed18fa3fcffb6878092289bc6f69fc714d1d9d2b1bff03791f52,2025-02-26T06:37:05.993000 +CVE-2021-47643,0,1,ee3b4e2c1dc026d9b2fd21cb2c9265e6b329d9c5fe2fc5d7d8975c28a18c9bb5,2025-02-26T06:37:06.097000 +CVE-2021-47644,0,1,cb7dc2b6764d2f8b2fce89d94c3834b9cd527debe037c0f771a20f99b9cc4671,2025-02-26T06:37:06.197000 +CVE-2021-47645,0,1,ca262dcaad637102fc9d23c55e982672fa42e8119f92c71c4d177c3d9f99fa84,2025-02-26T06:37:06.293000 +CVE-2021-47646,0,1,54eb9e8231fc6e7ca7824cbc089c5100708ea0e6b8a5c7025d75b7c700560410,2025-02-27T18:15:22.093000 +CVE-2021-47647,0,1,a38a8ff6df99d807de0756888b084b9cdcd858ca2df57c632bac2264930e650d,2025-02-26T06:37:06.490000 +CVE-2021-47648,0,1,3c20f008532e9edfeaf2dd52e877fcc8a80cc5b6789eb8e94911c21eaf3edf60,2025-02-26T06:37:06.597000 +CVE-2021-47649,0,1,ceb66deced6f57e135b75497731259594622df709415d60b69f0fb280b2e9fbb,2025-02-26T06:37:06.687000 +CVE-2021-47650,0,1,2f549aa21a9cc180f0689454d9257c4d9bac0304042ff7265313b449546179cc,2025-02-26T06:37:06.780000 +CVE-2021-47651,0,1,2d00261f5f9683550641dedf4b96a83527befe8297ccf74ee352445b67fc960b,2025-02-26T06:37:06.880000 +CVE-2021-47652,0,1,b6e733509cc5d4118c48bfb055f0c79c7c0612f8ac58b02f98cef31c72b65a8b,2025-02-26T06:37:06.973000 +CVE-2021-47653,0,1,f8f0815ccd4812ab349d22fae35ff7abc16548b72de4dd39d48d789005b67a97,2025-02-27T19:15:40.917000 +CVE-2021-47654,0,1,2c8519b2b599c9cfc93d8218cf3bba548146b345c95bbd3e8d573c60490fe72e,2025-02-26T06:37:07.170000 +CVE-2021-47655,0,1,b0190e7c50074328423e927fc0b5d162fbc022139d165320e7b3674c87d2c063,2025-02-26T06:37:07.267000 +CVE-2021-47656,0,1,32bc830182c9b0abfa20daa0282ac8c484ddcde84b79cfdd235679a29e2a63e9,2025-02-27T18:15:23.133000 +CVE-2021-47657,0,1,912f43eeb0b4ea06a2157e77ef1f6ec98a80dca350beb47aece000985c21edd9,2025-02-26T06:37:07.467000 +CVE-2021-47658,0,1,40cee62fe59cbcad55bfa583a2a783321bfe2aa50e6ba27a98aa5e5272260471,2025-02-26T06:37:07.557000 +CVE-2021-47659,0,1,5aa899f756953f035092f7b1fe4153c0d3304e0ff38c8b4cdec0e8f319d19fd3,2025-02-26T06:37:07.640000 +CVE-2021-47660,0,1,d9a42e8ce3380006ecba565c223037530e47d3295e872ade76b7149d88669aee,2025-02-26T06:37:07.733000 CVE-2022-0001,0,0,d630d65d043af9b84ecc9398947f34a2295c0c4d0361b3aeea445eb7fd5fee61,2024-11-21T06:37:45.587000 CVE-2022-0002,0,0,8109a7e42c2476389a26f4b576e048bf54a0f7b87a24a41ab958cd97937ab177,2024-11-21T06:37:45.933000 CVE-2022-0004,0,0,76e2034631db671c6d78b8f053274466d56a4afd5cff5cbbea3a9413334df9ae,2024-11-21T06:37:46.137000 @@ -191171,7 +191171,7 @@ CVE-2022-21441,0,0,26d9af75995c08648706edb73e97015b2e499ffd976f9c62152c0ee5b82ec CVE-2022-21442,0,0,a93f74f9655d5062b3eb713a215ea42aafe509409b16bef4d32b0d98fe6915fc,2024-11-21T06:44:42.557000 CVE-2022-21443,0,0,c07c90b2013677d990006fc9474f86e5b45928d0f64b39e1126cff9c6df22b86,2024-11-21T06:44:42.700000 CVE-2022-21444,0,0,37c77ad4799692b449eaa6341fd35e930063aad9abf8762f5e6381366ca65c42,2024-11-21T06:44:42.863000 -CVE-2022-21445,0,0,7fb9eb5ad138b093cd6e99330c3d3c0c6171307328831a98420b622774bc6d62,2025-02-26T17:15:12.863000 +CVE-2022-21445,0,1,5208fd5d95a318a6b8b821dbf471ca2f9a9b1d42441d12e38add26c13f060a76,2025-02-26T17:15:12.863000 CVE-2022-21446,0,0,9e1a7306a1fb2547c56353ee3e18754ea42ee3038381bbaf4f3d23f962278cfc,2024-11-21T06:44:43.167000 CVE-2022-21447,0,0,e70b610295025dbd7bd9fee6193e62200bcb2018fb55a167531b7d96da16a4ea,2024-11-21T06:44:43.300000 CVE-2022-21448,0,0,b706e09bcc1a19a21c67e2e007c01bf059882f23236add7aa21dcbcb364d4c43,2024-11-21T06:44:43.437000 @@ -191791,7 +191791,7 @@ CVE-2022-22041,0,0,3b3d03794ef57654cd91fd6db245c5f4df6a1a4e602937fc174c54f83eded CVE-2022-22042,0,0,83b3a20cf802d37c8db9dd5960beb115f49d8dfcf4557e19d5b789629d820a0a,2024-11-21T06:45:57.090000 CVE-2022-22043,0,0,cc532e5c0b91ffc7466b7a385f6936487ad99ce46374cbf56610fd6cb95d893f,2024-11-21T06:45:57.227000 CVE-2022-22045,0,0,61cdd18b339a77d3b4061f6fb982ef805374ec346d4ba6793be5be6f24b0361d,2024-11-21T06:45:57.393000 -CVE-2022-22047,0,0,7c4df29f40e4f066409e38f7edec95fc5f917e2b711db67630623332697fbf0d,2024-11-21T06:45:59.233000 +CVE-2022-22047,0,1,5d26420dc18208458246cd44c524a800eb894fb9c331c37b3426b2bb51fb99cd,2025-03-07T17:12:53.023000 CVE-2022-22048,0,0,9d0c4e00fd702a7f61dee3fd25e3dfca56241a0c51f812f581c070f7a0163ad1,2024-11-21T06:45:59.387000 CVE-2022-22049,0,0,466a03f66f9026f1c56f8bccf86b50e86fe9d1ab90b27d087328c6e18b3edb92,2024-11-21T06:45:59.527000 CVE-2022-22050,0,0,3b0d011cde74156c2ea282514ddcc7296e7f3c7c43ddeaa281848a0fafc90b95,2024-11-21T06:45:59.670000 @@ -192433,7 +192433,7 @@ CVE-2022-22713,0,0,2b084c4c613af799bff5bd317b96fdf4482262c4edf17c96e5858ae2c6732 CVE-2022-22715,0,0,44bb8f628e787aee0b83663456668487f3f9f780ee27e3b8d87dcd78183733c7,2024-11-21T06:47:18.177000 CVE-2022-22716,0,0,e1d3946564c17630da5b293328f4dc38874352f4eeeb0bc77ca12d5d8adc02ab,2024-11-21T06:47:18.300000 CVE-2022-22717,0,0,8f8b7d05b1c3e69cf79e639a2543b02a6196050d70727f491fddb9643980ae88,2024-11-21T06:47:18.423000 -CVE-2022-22718,0,0,2b928f217d529074fd581f532f51a8718ac96fae2717da18c6d1beea2d4427d6,2024-11-21T06:47:18.560000 +CVE-2022-22718,0,1,e975fd82e7361972708f5fb64b6e2dbd5dd4235f11cccfe141f18847df5f3e3b,2025-03-07T17:12:53.023000 CVE-2022-22719,0,0,7182402a1fe5fd5efcdb9a69511eea6b48c389ee108c16c4ef9ec84ea679b1de,2024-11-21T06:47:18.700000 CVE-2022-2272,0,0,26621a2931d48311b60ebdf052e141505b322634da22b87ff374fed016a335eb,2024-11-21T07:00:39.787000 CVE-2022-22720,0,0,26a9b35aa3b246df5c1b848b829dca79dcad14fe88bf610b2e86ab8e0feca963,2024-11-21T06:47:18.963000 @@ -192882,7 +192882,7 @@ CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1ef CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000 CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000 CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000 -CVE-2022-23227,0,0,351b3ed1866a1ffc1d54c35001ab133fc6249c37b1bf9e4c035c96651f05ff7a,2025-01-03T02:00:01.953000 +CVE-2022-23227,0,1,b34a9bbe653b4723df31d43dee3da5534c43b0d16db223c5606033a6004ba721,2025-01-03T02:00:01.953000 CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000 CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000 CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000 @@ -195118,7 +195118,7 @@ CVE-2022-25769,0,0,09d1282e903c5cc225752dc6cf403804decb18b1a1c2904acc53c1b106ff1 CVE-2022-2577,0,0,7dfb4d9179f1eefcc863c8a3e76107909150e1945e894d94650c4a3f70597e2c,2024-11-21T07:01:16.753000 CVE-2022-25770,0,0,c192cbfb1384ff5dd4b005d6d88808cffaeeaa59c4244fc9977b6db65b29c98f,2025-02-27T19:30:33.180000 CVE-2022-25772,0,0,ff796297ad7865332e00bb2b318127a389900f15aa53f8502eeaf569afa498b5,2024-11-21T06:52:58.343000 -CVE-2022-25773,0,0,eb5575af1dea27f2d0ffd720c0eff81239f9ab8775ee6b508796f1b737073f6d,2025-02-26T13:15:32.550000 +CVE-2022-25773,0,1,1f07213c59a66d8041cf223873196c141615b038ce6d23ba7255337469258114,2025-02-26T13:15:32.550000 CVE-2022-25774,0,0,bd380684d32ffa9cd4640164928b773a3662f874edc7e0d020930c6456c349a1,2024-09-23T23:21:35.443000 CVE-2022-25775,0,0,86cd764b6a567381983af3ef2ac724e63b9fbc2964b23fee64b226f75093e044,2024-09-23T23:22:15.763000 CVE-2022-25776,0,0,b92a32835cc3936cfcece435820b9a30ee61228c21cc5409787525b6dbc22604,2024-09-24T15:19:46.117000 @@ -195492,7 +195492,7 @@ CVE-2022-26251,0,0,df490dbea078bdaca7f1c792d1c247eb1afd2906ac6cdf7402338f2304c2e CVE-2022-26252,0,0,458b448708b8444936255ac48337f984e7d630229f3d86b54229d976c872f5a1,2024-11-21T06:53:38.820000 CVE-2022-26254,0,0,4953152d2e87507f545d483bcb4fd1c515c30c6b9564db38663c89944ef5b294,2024-11-21T06:53:38.960000 CVE-2022-26255,0,0,44225860914cef9adeff34b3078b109bd66566832f5e3e05ef60be5b1cb0dd40,2024-11-21T06:53:39.107000 -CVE-2022-26258,0,0,d74cd5ccb83693aac0acf1d28b1366861f8c375509c7d18644f38fe5d2d751a0,2025-01-29T17:15:18.150000 +CVE-2022-26258,0,1,6b130448c27ae7550af6df8899006a74f03c88706d3097aca4891591efd99483,2025-01-29T17:15:18.150000 CVE-2022-26259,0,0,75fddcad536cba547fd94d1b4f66dd4d7004dd4d62c4cfddea16fc1692a6cfe3,2024-11-21T06:53:39.477000 CVE-2022-2626,0,0,4ef4d00cc71da9779458b7e770445d033beb6e4a1054ac8bcffcafd5ffadbc8a,2024-11-21T07:01:23.147000 CVE-2022-26260,0,0,b6eead7368b6889abae062ddf83a377b8001ddee2aa57bc0c501ecaf06c57333,2024-11-21T06:53:39.633000 @@ -196810,9 +196810,9 @@ CVE-2022-27918,0,0,8674e471da7f3503c274ce3ddc54a2e01853df65b42f173f28632af936f42 CVE-2022-27919,0,0,a11bd79ed72f9771535843d55b124e78d04abf5fba1cef2d18220d545cc9ea61,2024-11-21T06:56:28.020000 CVE-2022-2792,0,0,cd183fcd525db8a7dd9c55e88578e37c9b6b149b143f7130deab5e6d02e689c1,2024-11-21T07:01:42.227000 CVE-2022-27920,0,0,d5055b7228c4d13c1a78a219ff52d92e2b735d50ac021e97797591f24a2890f5,2024-11-21T06:56:28.153000 -CVE-2022-27924,0,0,0c817f47072ee84b2e4e5cbfa2f2ed394185d16df928ffdec248b8d64cec1c93,2025-02-25T02:00:02.097000 -CVE-2022-27925,0,0,38234b4c924b5bdaa25729609e38dd1a2ee22ffa633ff252ac8a1d8ef977f2c4,2025-02-25T02:00:02.097000 -CVE-2022-27926,0,0,8ef3cf665df5d50ed14141d1d4e2a52a8fe4ccd91182ba650a3fa308d0c8da7a,2025-02-25T02:00:02.097000 +CVE-2022-27924,0,1,67885e4e2c28892265e078bf5d98a25261c3ed719f65d5b22b27dbb5686d6619,2025-03-07T17:12:53.023000 +CVE-2022-27925,0,1,86a338efc1b80bda070233d3b3f45fb56aa268acd096cb684c917ca949895be8,2025-03-07T17:12:53.023000 +CVE-2022-27926,0,1,41ddab5bb0ff03d267a2e42b953278856a79c4b1e626d475b854a8f90bf04232,2025-02-25T02:00:02.097000 CVE-2022-27927,0,0,81ced154bfd17d2353a2fca2e6c561efe9eca19085a4b7974475780416a40339,2024-11-21T06:56:28.780000 CVE-2022-27928,0,0,6e254f7f408399d46631767f474b912e698944ca12a7d4885ed017698951686a,2024-11-21T06:56:28.933000 CVE-2022-27929,0,0,e1d6eded4a4badcad5a48f5a752c6266fa98b2fae30a5258fe34aaca1061ca21,2024-11-21T06:56:29.067000 @@ -197977,7 +197977,7 @@ CVE-2022-29299,0,0,cece71dded58e31c2d38391ffce938abc12eb99f558d9f6eb0fa62fb26b21 CVE-2022-2930,0,0,af0e6e45c4e98b2f01c50bf67361b18e35971fa09edf185418f99533289204ff,2024-11-21T07:01:56.477000 CVE-2022-29301,0,0,27c6034fa209794d206fd8d181616ccccda1f102c715de5058ddac817c119068,2023-11-07T03:46:00.397000 CVE-2022-29302,0,0,fefd47bb754fef71be5a320981137c9d9962013f14e7ff8bd1d24cf443fd5585,2024-11-21T06:58:52.653000 -CVE-2022-29303,0,0,a0040e0fb84c798990af734334619394ba65cab53fb9fdf8ee0342c91739e78d,2025-01-29T17:15:19.637000 +CVE-2022-29303,0,1,ac5f9637b6295bad1fb3e6afcdf0ad8fd1a723c2b5566c1e32abf1fd96994eb3,2025-01-29T17:15:19.637000 CVE-2022-29304,0,0,286010f5fb7696fe98fb1306af778d8a3fe29ffcc19e7b6815a41595ad07ba37,2024-11-21T06:58:52.937000 CVE-2022-29305,0,0,ffb5fc95d769406d41de93b50401c5d6e167a36adc7ab7d035469268016137a9,2024-11-21T06:58:53.077000 CVE-2022-29306,0,0,ff286ac6c7c82916128568a846f797c6254ca1725cd85a12d9219d4a075111e0,2024-11-21T06:58:53.217000 @@ -198816,7 +198816,7 @@ CVE-2022-3033,0,0,2bbaeb3f980faba6019c7ce4e7862fd57e9bacbe1407ba6f0f0806c239b4fe CVE-2022-30330,0,0,cd8ff75824c20b8bf311161188a1026cc9c9fde398c47435155db4cb4052697b,2024-11-21T07:02:36.110000 CVE-2022-30331,0,0,671ddebdfd0fec19c5a39c725041bae16176a43c34810cf424744e61faffb1b0,2024-11-21T07:02:36.307000 CVE-2022-30332,0,0,10f05d42653919039abbd2a39fff3da7d0ca5d530e7f2f746fc36d97700f85ab,2024-11-21T07:02:36.457000 -CVE-2022-30333,0,0,696aa8a4bb91c061c5eaac200d8e50f9c0496094e919df1a70f4ad3d30a5669b,2025-01-29T17:15:20.117000 +CVE-2022-30333,0,1,2ae1db30d9a4b98b7182e15e28a6708a5b2c1b14afbe8a4b4eb80703039450f8,2025-01-29T17:15:20.117000 CVE-2022-30334,0,0,0594dd21bb5afb4d06402e114fb169644f98873722aee211f1f8dd81c9fcb62b,2024-11-21T07:02:36.830000 CVE-2022-30335,0,0,34d6df2285a84d23a41dbf9873eb3b5884996fdad684268041867829ec15d1ef,2024-11-21T07:02:36.967000 CVE-2022-30337,0,0,83ffdbd2247d534b1e50f18fa3bc496b3f96c87d28336397da2d90df528f1cbc,2024-11-21T07:02:37.180000 @@ -200055,7 +200055,7 @@ CVE-2022-31762,0,0,bb6b22df7ef4fc53f49e054a15ce44c4fbc0012358e73c25e15dd603edf6e CVE-2022-31763,0,0,b43c22e16cee7f4d119cb5b8d655d9db9798a7b49f2bef758258ceb1c42c43c2,2024-11-21T07:05:15.613000 CVE-2022-31764,0,0,cebef64b1cc359157eb5656d561318b558be69c1d189f13d69f85f412de5ad31,2025-02-06T17:15:13.030000 CVE-2022-31765,0,0,586417082fbde887bf1c9b1db7e79c13de1278309904ca5f31a0432f3684915a,2024-11-21T07:05:15.753000 -CVE-2022-31766,0,0,49ef4f0ee11858bf0feb62f7c6de554831e3ba977b23532c83f480f664a4d671,2025-02-11T11:15:11.210000 +CVE-2022-31766,0,1,422fa249cb0dd0bcbc820e7824e83679475104bbe3db8e669474d9ba00c266a7,2025-02-11T11:15:11.210000 CVE-2022-31767,0,0,b7ea3f47b3ba866b5369e56abd48c9381c68e37bfa533cc503ceda935346da2c,2024-11-21T07:05:16.410000 CVE-2022-31768,0,0,8255369fb3f5a73ae0a97ef802e6d920c75da3e4a421781cbe93a5203b92521b,2024-11-21T07:05:16.570000 CVE-2022-31769,0,0,93c224ca9df901171603d7f4c37d3572783ca392aee94d3c0c1f016b4dbd1f40,2024-11-21T07:05:16.700000 @@ -203329,7 +203329,7 @@ CVE-2022-35910,0,0,7fc2885883102fc727096e2774117802777ce074d4d291f5fc97a3501d4d7 CVE-2022-35911,0,0,e0726f2dc12f74ea86390dfef1e1d1c742ae547b53b4529dd114c069c4165757,2024-11-21T07:11:56.440000 CVE-2022-35912,0,0,75fe2e3206f9f165b585185e652fc4bbcebe0f8a26b7326a958ab5ee47c053a8,2024-11-21T07:11:56.617000 CVE-2022-35913,0,0,89a6a4cbb147809e631e777d2af221126f33a975dee4dca0c25011e88eda7e40,2024-11-21T07:11:56.810000 -CVE-2022-35914,0,0,8aeea515c4db6f9351494120f26596a0d2b3879985de092d4e8d6c1779028069,2025-01-29T17:15:21.063000 +CVE-2022-35914,0,1,812023ff8c1db9ba67bd622f68ea7ce6873b9d6be06583de4710b612314f86bd,2025-01-29T17:15:21.063000 CVE-2022-35915,0,0,cbd708eca6adbf0ed7ec96e61eb8e6e42a02c1eacc456abedba64aa3a407f9ab,2024-11-21T07:11:57.170000 CVE-2022-35916,0,0,9af87e09731f27efc95196b424b67dd321aa236a2082bf5ebbbcb2d7300805df,2024-11-21T07:11:57.320000 CVE-2022-35917,0,0,7e238076ca80dfe65eff9f389b38bd22676dbbcca323966feafdf40cc77142c4,2024-11-21T07:11:57.457000 @@ -203901,7 +203901,7 @@ CVE-2022-36532,0,0,9a6dc258e4acb03d115254806dd77b1afe902e9ad466d5ad69ec4eedbe099 CVE-2022-36533,0,0,3e4b7acaaea00f0ed8f8f2dfc64c45744f18b5417f9762a212a1517b200e0069,2024-11-21T07:13:14.913000 CVE-2022-36534,0,0,874385a331b89e607e3af105ca3b8c2ef7b703fc07b58f0cdde4eee064022ffd,2024-11-21T07:13:15.077000 CVE-2022-36536,0,0,5c0d4b3b945ffc295f10f9aa86bfe286ee7e6a56ebbfd2e99cfc58d6dd6450f9,2024-11-21T07:13:15.240000 -CVE-2022-36537,0,0,8669ce284e65d12e4a00ef7f508c99c3aa2af39717aee3688ff96364acdd66db,2025-01-29T16:15:30.340000 +CVE-2022-36537,0,1,c8085c38160d288bea00b898da7800101d4c23b5ab940eddddce27b90ca91418,2025-03-07T17:12:53.023000 CVE-2022-36539,0,0,e8d131d51cc67798b30b13dce28738cdcc796ee6e42c637c28c658c874b4bacd,2024-11-21T07:13:15.550000 CVE-2022-3654,0,0,9e7a62cca217f5668122590f52e0a9b83233adb7880b2d013982b509ace6b4c7,2024-11-21T07:19:57.727000 CVE-2022-36542,0,0,f1f8c3cebbdb48f102ceebf852d1ca35116dbe93dc1608940894fb9bfdac0d6f,2024-11-21T07:13:15.707000 @@ -204339,7 +204339,7 @@ CVE-2022-37034,0,0,44c3ff79f3241d69d9b0fda167b0c9117a9f6cd87d2dcc17544ed562c9ccd CVE-2022-37035,0,0,79c99da62b00b653f0668cd130a7c10e6431b2f2b52b49ba02b6125615219d83,2024-11-21T07:14:19.953000 CVE-2022-3704,0,0,15eb5a1597614a16cd1ca9c5110e86241009ac0731de2733acf20b57d757d3fa,2024-11-21T07:20:04.373000 CVE-2022-37041,0,0,2e90c7133ca39722055e1269e726344d5792dc0071e86a20ec76fb9f734f1af3,2024-11-21T07:14:20.100000 -CVE-2022-37042,0,0,57fd645558b934c0be0d68301b7ee83153a1b469380be5b38eecfcc4efbb6eff,2025-02-25T02:00:02.097000 +CVE-2022-37042,0,1,82ca03776b2f88b9e9e9770567f01b108f0ee7e9645b047215d130841eea294b,2025-02-25T02:00:02.097000 CVE-2022-37043,0,0,33b2b827e0455d7c706f59b3e4e51d18162c0ce2a8b95aa3f7730560699a3b5e,2024-11-21T07:14:20.410000 CVE-2022-37044,0,0,e40e4180804b10fdb28a78dfab9a640de3015abc513fd7bf5deb72047371e224,2024-11-21T07:14:20.570000 CVE-2022-37047,0,0,d6ef48199b8e2af42001d7bd6e62f60f1c1b2ed8f14a2df9832eae6cd0dca9f1,2024-11-21T07:14:20.723000 @@ -207219,7 +207219,7 @@ CVE-2022-41037,0,0,a5207e410031b473199d76f446ea7aff35e792754946afac9d20e1b0f8293 CVE-2022-41038,0,0,5139f0eceb1c1c9e3c7156a1f72ea48e3023a913c5b772fa68fa0237089dc6cc,2025-01-02T22:15:19.540000 CVE-2022-41039,0,0,d301a8df2867f370f24c22b4f7dcb22e58d455c45934b727d390db5faf7449a6,2024-11-21T07:22:30.020000 CVE-2022-4104,0,0,c3f870f41b7e05a558f4ff2f68c6ab2edadddcec1c1e03e5ab7274cded1720e9,2024-11-21T07:34:35.460000 -CVE-2022-41040,0,0,853896935ae18919cd01b04bd10b30ae51199dc50fc48cbc688bdcf6b0e84e55,2025-02-24T15:48:30.437000 +CVE-2022-41040,0,1,4b5b7b0b238c7e71fd1f3535fad15fd1f387a8ab733a684cc64981d5eafcc803,2025-02-24T15:48:30.437000 CVE-2022-41042,0,0,8ed51dc60d4bf92596b08ebe51d7e2bf87951e8e15107f41266aba185b392fbb,2025-01-02T22:15:19.810000 CVE-2022-41043,0,0,47dd01e700c1c2263498dc011e32ab62a1d287f7f2170cff13f42ba9c4f6612b,2025-01-02T22:15:19.913000 CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb35f,2024-11-21T07:22:30.543000 @@ -207239,7 +207239,7 @@ CVE-2022-41057,0,0,054a066a43f21eb7579caca9716f978bff58e872c2e7e8266dcb30731418e CVE-2022-41058,0,0,73bd8928a378a002e757ca9a21edbcba22869395aac190290f089c70476e64d1,2024-11-21T07:22:32.440000 CVE-2022-4106,0,0,dbe89ded2e546ade2fab7f13d467837b61db8343d9487b3106680714fdc7d41f,2024-11-21T07:34:35.663000 CVE-2022-41060,0,0,cdfe90ef6c059d82f36589ebe1bcd3fda18c5b72a6a4a8ec4c313385323ea20c,2024-11-21T07:22:32.610000 -CVE-2022-41061,0,0,12d16d0a283ae240ceb207213161839850bbfab118e15249f08f3b6616ee2cca,2025-02-28T21:15:18.520000 +CVE-2022-41061,0,1,d3ff4c2849254bbeb8056d1bf31e5a4c1e784a9fe077a5b69acc592e50ab2223,2025-02-28T21:15:18.520000 CVE-2022-41062,0,0,9e11a0a3323dce9ed7289ce4b7e0867252529ed4d0e920b693872fcbfdc285e5,2024-11-21T07:22:32.880000 CVE-2022-41063,0,0,9435a8e4ef0bd0f50fc908a2dbba3cf01fddc74e86e7c27bcbf629ae50f6c71e,2024-11-21T07:22:33.017000 CVE-2022-41064,0,0,f04f6f08373dc8a60423f3ffa6286de803341a47388fd1b659533c8de9b8a34d,2025-01-02T22:15:22.180000 @@ -207262,7 +207262,7 @@ CVE-2022-41088,0,0,ab89ed5c520ec325a6ffe5470c7903109306c76d03d95c10448ecb00ab3ac CVE-2022-41089,0,0,df0a3e15dcd3f9a3ce27ded14418b03e16cf6b26899830e16cc83a2749a1c6b6,2025-01-02T22:15:23.873000 CVE-2022-4109,0,0,8242ca420abd65ec1d7db1932bc9868236d63b3c2f25ebd475f1b2152147ccbe,2024-11-21T07:34:35.953000 CVE-2022-41090,0,0,29e7b6b47012d97a66f07e755d8c87d490ef49309b8229330a86ddec353adfab,2024-11-21T07:22:35.500000 -CVE-2022-41091,0,0,bc70a05726a89b44381cfc503130d9abee30603f10245878a342669d5b265c5f,2024-11-21T07:22:35.650000 +CVE-2022-41091,0,1,455b60366766f4fa4e08b89203a96688d9ac9f4c574923648e6192908e37d37e,2025-03-07T17:12:53.023000 CVE-2022-41092,0,0,41e3cfee41d5f02a34baa191de367e83717dd69802c3b3d24246f67d5831f980,2024-11-21T07:22:35.823000 CVE-2022-41093,0,0,9350eb3d75cc5dccb961cba82ff6a17778e1c3c2da082e2b9b144df4694153dd,2024-11-21T07:22:35.960000 CVE-2022-41094,0,0,e87660715ed3be1193126d0e4af1ba4deb4a776f43e1e3ea5f964e87afcab35b,2024-11-21T07:22:36.110000 @@ -207295,7 +207295,7 @@ CVE-2022-41122,0,0,133e8735e10ecae83fee6579759d253bb3c7ca5d683d17cc0c179ed130908 CVE-2022-41123,0,0,c21f7ec46912883651196d10160a60b8e8210f5760e35c9197740e4c6b4104de,2024-11-21T07:22:39.970000 CVE-2022-41125,0,0,8d8af01c383f5a8f052575c5522ee85b37c5b7b849b33c420f50f1a231868c9b,2025-02-24T15:47:00.947000 CVE-2022-41127,0,0,c5470238c8916101c4c113c61b86334eac0b25796dc9bb1b6c150173f84c4526,2024-11-21T07:22:40.220000 -CVE-2022-41128,0,0,692a44ad2ddaed75ad69bb743680792473b798337e427349b445af6e6b825f91,2024-11-21T07:22:40.347000 +CVE-2022-41128,0,1,c42b9ac8c3e34f80758f3a3c83ccbf622e9a105c1bc0420e1bfced2723f06090,2025-03-07T17:12:53.023000 CVE-2022-41131,0,0,a9b352ec223f536926e75cba1208c8854d94f58ab28fa8a4439b6ee55aa538be,2024-11-21T07:22:40.500000 CVE-2022-41132,0,0,0021f0455ec0c801bddfc18c16a84c11f48d6765338ebb1892496f988aa9539f,2024-11-21T07:22:40.620000 CVE-2022-41133,0,0,ab83932016bc2710fa33a83a4af239bea65fc8ffc549c1152d8cb884b7c238a9,2024-11-21T07:22:40.770000 @@ -207506,7 +207506,7 @@ CVE-2022-41343,0,0,d0ae95b40436fa24be988b15dd0d1de91272426bd16bd6d0a6ec7efe5f0c2 CVE-2022-41347,0,0,c1ae4e52909df12e3153c5905945c510bcde0625e0b07038ef7543fa563d23e9,2024-11-21T07:23:05.503000 CVE-2022-41348,0,0,46415c7cb21ab8defecca377846850e75cd15d2f1879f3b1c7404748495f9e64,2024-11-21T07:23:05.680000 CVE-2022-41349,0,0,f37e912a4b114c1184a1865bf9d5da62dec108ec18e1599ba0fc601bb7455233,2024-11-21T07:23:05.830000 -CVE-2022-4135,0,0,b855be7c691705b47a74bee35e6ede2f679288f324d7acc09844fc7c8bd89558,2025-02-03T14:15:33.897000 +CVE-2022-4135,0,1,2429bd4b9399d4e51512f2a0d2d276df40bfc13036dcf667ea27828a36ee9903,2025-02-03T14:15:33.897000 CVE-2022-41350,0,0,07c59b26e4298d985fa1356786d58d9eaea318e5fb01099dfd2f0c684cb7fb9c,2024-11-21T07:23:05.973000 CVE-2022-41351,0,0,0e738e1029fa2ba786b692581f7ba428943e32cc9bfd63b89b6f8436bd389f76,2024-11-21T07:23:06.113000 CVE-2022-41352,0,0,4c883efad9dc10eb9e9d7a906cad5538534094b827135b099e1838f18870bc51,2025-02-25T02:00:02.097000 @@ -208795,7 +208795,7 @@ CVE-2022-42960,0,0,c7fcfa49ffcc1cb01539369f93e4befb435803faa642efe0122fc14364b33 CVE-2022-42961,0,0,7eed0c145b8de8fa0ef2b8dc53359e5a697f5cab307d59a3e3cf0f0620d4d7e7,2024-11-21T07:25:41.433000 CVE-2022-42964,0,0,d043d925d69e366330dc43ef210d84600f05ad36ab527caf15498e6da28afc40,2025-02-04T14:11:18.270000 CVE-2022-42965,0,0,2582f2e83102690cfe5fc6a061f59ec9c4bd93fc318d83dbbb569797ccc2f7cc,2024-11-21T07:25:41.780000 -CVE-2022-42966,0,0,ffba4565ca985fb5a74bb5971af239e431f7e3e2bce6bbf65bdf82da078f9a60,2024-11-21T07:25:41.930000 +CVE-2022-42966,0,1,3b650110b12b5fa9a02de56994b30970b76192f4b0662bf2a966e8c3c3b4ef77,2024-11-21T07:25:41.930000 CVE-2022-42967,0,0,acd40bc3bcc7040819f5a4c846d65dfbca6e100e8cda5ca0a59c1627b5a86486,2024-11-21T07:25:42.080000 CVE-2022-42968,0,0,c5dcb28ac6bc2b264092c3e3c88cef161a50f86a91c6cd7ecf62e024d89dff7a,2024-11-21T07:25:42.220000 CVE-2022-42969,0,0,a90da1fe3791307aa51b77cbb2a7a980be76361a02bf3c0ade2c4799ed29ddae,2024-11-21T07:25:42.383000 @@ -210473,7 +210473,7 @@ CVE-2022-45370,0,0,4907ed149400d63c6d5de32f7df9bcebcf2b1af85dababb2e37616643f8a9 CVE-2022-45371,0,0,200a10e2f12748affeae99c75c475e18d6c87ee4a27bfe4445b4f7eaf9c2173b,2024-11-21T07:29:07.890000 CVE-2022-45372,0,0,bda53e7fe6324c3cc7f923c999dd52ca15fcab3bf6a9ea9352ab3d57c6ae4c3d,2024-11-21T07:29:08.010000 CVE-2022-45373,0,0,eae05f58df456d3e21e9dece4ab6591f743254e4d4ef07d1768e6fe2260aefc6,2024-11-21T07:29:08.157000 -CVE-2022-45374,0,0,73eece7725297c85b34bbe89d73c907e5e9cb1e8ae3d75485080fb6bb8ce3da7,2024-11-21T07:29:08.287000 +CVE-2022-45374,0,1,df095b4895a610e416594e6d040892089ccac0de111eb4d6fa0dd6236ea98232,2025-03-05T18:25:53.837000 CVE-2022-45375,0,0,b87cc9b9b046bcfeb1c8873bf86f1473a75dcb842c896a6022567674a3828220,2024-11-21T07:29:08.403000 CVE-2022-45376,0,0,5862f06be75b41eb43c74d609ffd65e7d43e3a6c5730888307a26b04ad0dfbcd,2024-11-21T07:29:08.533000 CVE-2022-45377,0,0,12ff570f8446adf412a920c461671c0d25d119cabe090ae5cf9a32a2a2153751,2024-11-21T07:29:08.660000 @@ -212248,7 +212248,7 @@ CVE-2022-47951,0,0,481e357c755abcd47148b16b7b723bb646738cb20fb8e6121dbb931406f4c CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000 CVE-2022-4796,0,0,56d14c71fffb78b2873b1d8a825236ed65f48496e5c8739756b40cba27fa5ead,2024-11-21T07:35:57.490000 CVE-2022-47965,0,0,e13f03af61110d5d88bf9b0758fc287c18c6e313089390eab76658b679a74adb,2024-11-21T07:32:38.080000 -CVE-2022-47966,0,0,6054535be60dda9d0cd902196506603d11ddb09ea5bfe8057a7f61f860dde222,2024-11-21T07:32:38.233000 +CVE-2022-47966,0,1,e6a3ff71845eb2635efc6d531104865c23c0fe4acbe3cb33fcbaf60b80d847b0,2025-03-07T17:12:53.023000 CVE-2022-47967,0,0,2793000f39004c67dc1fffb725488b70c75e83182393e59dd6cbbd0ecaf93f21,2024-11-21T07:32:38.803000 CVE-2022-47968,0,0,fbfd0fc29dc6cfc00a81735c42dd0c98796d3a965d4e5b40116df9801ad9ed7e,2024-11-21T07:32:39.003000 CVE-2022-4797,0,0,a27cced6eac5a731883cbe37489a46dc85c4d0b1ecdc2a6fd51e9745d876e090,2024-11-21T07:35:57.617000 @@ -212259,7 +212259,7 @@ CVE-2022-47977,0,0,d1a9e24b194ed74f36e23bc6ea7dcfea4a1d976003db4ae8605e79221222c CVE-2022-4798,0,0,9a7fdd7c96e66f053d03f32d4700f8f6a54d08b4345dae12758f42e0722537c0,2024-11-21T07:35:57.737000 CVE-2022-47983,0,0,5fa56113e2db33f06dceb61139a45518a76260cb2166d074bbfc2e002b4fbefe,2024-11-21T07:32:39.890000 CVE-2022-47984,0,0,69faea42143b374b42bb1073a5ab377ea711504f9c1a02b21ca77dbd23463506,2024-11-21T07:32:40.067000 -CVE-2022-47986,0,0,b01bce8ecf42874c2274646da94db365b629ba554b7507706ba8fb0775fc4110,2025-02-13T17:15:49.797000 +CVE-2022-47986,0,1,6784a52c931b211a7aa5945737e06909812806200d5f9dffbe4c7917a7d6722c,2025-03-06T19:48:51.880000 CVE-2022-4799,0,0,d8adfba9212661d399d68907e6055576a29a9f48a62d0b6607b21376a8851106,2024-11-21T07:35:57.860000 CVE-2022-47990,0,0,18cb2a978fa8aa0898f2795e6159d13b42c436a17e524d1b78789fc11e58d48d,2024-11-21T07:32:40.867000 CVE-2022-4800,0,0,ba106e13c41c51cfd7b012fca8bf8c05e15d3017934fe4a86355a316d8cb5b7a,2024-11-21T07:35:57.980000 @@ -212368,7 +212368,7 @@ CVE-2022-4820,0,0,a28308e9604fe393a645a3631999800c5c32ffa058b49458b3d3c5ec3942d2 CVE-2022-4821,0,0,8e04207f6cc1551a9362550e24776179293ffcdba96303d97e46215325762ff4,2024-11-21T07:36:00.727000 CVE-2022-48216,0,0,983a2ffa8c3cfc40e00b466fd5c452a723c595903b0f859afe5b34f576592433,2024-11-21T07:32:58.530000 CVE-2022-48217,0,0,2db66377450a2693874a7822c694ae856a4d238b3dbbf8a1729f58effc577066,2024-11-21T07:32:58.693000 -CVE-2022-48219,0,0,1e0a9254f8a4ff75cfb5e8f8a9952b48af204b78dbe1ccd97aec4e82c9b9b99d,2024-11-21T07:32:58.903000 +CVE-2022-48219,0,1,f689cf98ec373938f084d774d0c24f530b59978def179b5dc0ad2c2099cf5f0f,2024-11-21T07:32:58.903000 CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bdae,2024-11-21T07:36:00.857000 CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000 CVE-2022-48221,0,0,ca8042206acf8bbe5ab8d06da517e03935b23ac2553b8f50a7556beb4c4b9a24,2025-02-18T17:15:15.380000 @@ -212717,7 +212717,7 @@ CVE-2022-48629,0,0,61e95796ad26cabbf634a5891e412934a1a901a2d9e6e15e591b6dbf19398 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 CVE-2022-48630,0,0,c1c0b149824310772dd2a34eccec1464745f453029fe1e494c66edf69e66a0b2,2025-02-03T14:09:55.317000 CVE-2022-48631,0,0,07cfa709b2311dbd1149137d694e3cc56dbf7ee50a39f3e8764d7c810d0b445c,2024-11-21T07:33:39.040000 -CVE-2022-48632,0,0,66abdc309d3834a4b661e2dab594271d93cef084aa30fb48ffd0f3d68b15568a,2024-11-21T07:33:39.170000 +CVE-2022-48632,0,1,0103a31906de366044ee486d6e570b49d9d89321c272755bc31caca6a70f9235,2025-03-03T17:47:59.260000 CVE-2022-48633,0,0,39061c44a5a7b00aadebb280c44e2a7295bff9ff4a64448f966add5f4258b8ef,2024-11-21T07:33:39.280000 CVE-2022-48634,0,0,9d7770733ad763ed4c16d45c8c2b4bd495e52d6e5954da3752caa03b7c0f2546,2024-11-21T07:33:39.400000 CVE-2022-48635,0,0,bc742bcda5fe3f51d86129e333f38c25dd591078a136bc3b820e011f5475740d,2024-11-21T07:33:39.583000 @@ -212733,7 +212733,7 @@ CVE-2022-48643,0,0,ab9b649f55ad96816c2493c31f5a05b2eb566c44703b1f0180a6a102d8ac6 CVE-2022-48644,0,0,c5039b46b0d136554ba427d83c4470091587ebeb56eef158e382b1a908e7e2d6,2024-11-21T07:33:40.817000 CVE-2022-48645,0,0,4d8ec773eaf2c6a6981744ed20ef9fe75b117903e4fb588c647780c2e96ceca6,2024-11-21T07:33:40.933000 CVE-2022-48646,0,0,9e9b16cae9443a1a8f7fd4df9deccab6cb495e92598824862ef68bc74e753d97,2024-11-21T07:33:41.050000 -CVE-2022-48647,0,0,78f47ed53f52e8f0e7be004f1f4eba101d8d36f71674551043a7b49c20ddeca7,2024-11-21T07:33:41.237000 +CVE-2022-48647,0,1,673aac27cea8018f1acbfcfecf3c080f1a304ef84320627f4095018915f4c6c5,2025-03-03T17:47:59.260000 CVE-2022-48648,0,0,9a846fbdbad309d97836e69fabd5197db1c3b2910cc6f57468045df41e3f2876,2025-01-14T14:52:07.293000 CVE-2022-48649,0,0,2ab33e79ca9b4194d6d75677c978f0f9883b10a83b196d871b3a9d72b7c8b216,2025-01-10T17:49:53.747000 CVE-2022-4865,0,0,18e0a04c007aee1df9befeaf56e83e037df0050950a376d12b247ab05acba711,2024-11-21T07:36:05.920000 @@ -212805,7 +212805,7 @@ CVE-2022-48713,0,0,dba52de96f36212e00e3f48911b9901b8a56b45e7b0246c938f59444b875b CVE-2022-48714,0,0,58a367e8e2a2b8b403513dd3431efff25f4b14846b4d8a855f1b8d14ac3671d2,2024-11-21T07:33:50.707000 CVE-2022-48715,0,0,93224e8d22f349fe51e81b99199774a1a821d5e47ca2fb81a3cb0bf5abbe6a22,2024-11-21T07:33:50.820000 CVE-2022-48716,0,0,f27a2156bb6379d407ec84f56d1b8f7df26a9cf53b0bba61b16172565a529844,2024-11-21T07:33:50.933000 -CVE-2022-48717,0,0,1486745cdc50be60eab35bae7ba75a28fd6dfa788f8de343ed1dbc07720d1084,2024-11-21T07:33:51.117000 +CVE-2022-48717,0,1,74b934a24e9bf9b7c0b2e2ba429c4a62a0b2f7eb46e0d60ac52983e5db8ff595,2024-11-21T07:33:51.117000 CVE-2022-48718,0,0,56ecf471bcba13fb47d5f3ace85ade27dab5f6ff3be1a1b50c6e21a26de8e9b1,2024-11-21T07:33:51.233000 CVE-2022-48719,0,0,1ec83493267c5a3396d0c5845cc4a1abca73ebaedabef02e084a478b98384c5a,2024-11-21T07:33:51.357000 CVE-2022-4872,0,0,00fc85406553c04853b32f2013f13e2f4ccb8b4c71dfb9ca123bfcf41333ced7,2024-11-21T07:36:06.757000 @@ -213162,761 +213162,761 @@ CVE-2022-4904,0,0,1d0b55967e86b1295bf3f96c72699076a95bf24673221db4e4586532e40411 CVE-2022-49040,0,0,7c1631b8e82470f3fb0abe0b727113e6db8e2f90e0ba3793feff44556a8e1dbf,2024-10-08T16:07:11.210000 CVE-2022-49041,0,0,a98f649e96ac9b0759657a1878fe20db3a57b93d993dafffc5b04e911a2c6299,2024-10-08T16:06:51.067000 CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21 -CVE-2022-49044,0,0,87e11112e05d607c865d63fe94d99d6e2791458f497309c2a6ed1cfce98d7f84,2025-02-26T07:00:41.680000 +CVE-2022-49044,0,1,6ed32926adedba89f126484c75e18cfdf819ac2c1ea9dd886f1ccc61fd4776c5,2025-02-26T07:00:41.680000 CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000 -CVE-2022-49046,0,0,152256c493efc2a2b5b605660bb04f41c607235ab596db80244258078dfd0936,2025-02-26T07:00:41.890000 -CVE-2022-49047,0,0,7d1778a660a2d6b6fcbd30662171589ccad6a73fa527f91b3cd6e7bfeeca8f42,2025-02-27T18:15:23.557000 -CVE-2022-49048,0,0,30ba31e289eae907a079f1fc58d7af0c6f37213dbb97a2d01e7de8118c89cc45,2025-02-26T07:00:42.073000 -CVE-2022-49049,0,0,722111ccca38bc18ef51f112cb387a7361912e7f10f18236d81883c6df4b9cf2,2025-02-26T07:00:42.170000 +CVE-2022-49046,0,1,a86f90a0132704c8a09702a816a4e36d87e8d02e4fd95ef94ab928fff9ad307a,2025-02-26T07:00:41.890000 +CVE-2022-49047,0,1,8343bca271b17d5976324c6c5cc1454199c28b2a0adf5e994957517365c5f838,2025-02-27T18:15:23.557000 +CVE-2022-49048,0,1,6b0293b39167cefced476c56c5a719f8c6f3031bdc41a90b543af091df2cd564,2025-02-26T07:00:42.073000 +CVE-2022-49049,0,1,a0e2a6e75b995dc29c6db9bafbfc88733666b9ff79fe3f9825a45d83ef498b65,2025-02-26T07:00:42.170000 CVE-2022-4905,0,0,71313ae270fb5be33f7aff9db48d95ece499a953689009ab679dec981b993cf5,2024-11-21T07:36:13.077000 -CVE-2022-49050,0,0,1c723cd2cbfa1a579e091d5fd2eeb4a5a41187b486c951be380b49ca7119d3eb,2025-02-26T07:00:42.270000 -CVE-2022-49051,0,0,217c9e26ddd735deb9723e649c86251a0766a74e9d5bfca6966e8396ffdb9357,2025-02-26T07:00:42.363000 -CVE-2022-49052,0,0,6fd99907d326ad88eac2f77a3758eeff67354c5a24ca9006c4fc4c526515361b,2025-02-26T07:00:42.463000 -CVE-2022-49053,0,0,31f7eedcf568c51249c2c854957cbfca5a677f41384e21ad06fb4587fca7c79c,2025-02-27T18:15:23.733000 -CVE-2022-49054,0,0,aa129ca5adcb24a60daf42fa3434036a8d2350b13136f31a5470b3eaabd8cbc8,2025-02-26T07:00:42.667000 -CVE-2022-49055,0,0,180fb3321cb72a79d35991fefab47024a5b24b2da04e0e12942492847fc0f942,2025-02-26T07:00:42.760000 -CVE-2022-49056,0,0,3f519dbaaf812b3af3084aca1a49410607f9e60d2137c960b676b1d025766f09,2025-02-26T07:00:42.863000 -CVE-2022-49057,0,0,fcb58a8cc43cde208227d9d25928570f783a92c0c8232dfc253f30150793ca2c,2025-02-26T07:00:42.957000 -CVE-2022-49058,0,0,1a985896ce90812ec996f00d10ae5b86552d5e19375e79f701b2e701e0a6a214,2025-02-26T07:00:43.047000 -CVE-2022-49059,0,0,149e7a7b8cef0a8c5f3ed0f1703d5bd32ccaf156f0526bd1e4a3bea5b7fdb3d1,2025-02-27T18:15:23.913000 +CVE-2022-49050,0,1,081b63fd5aab6c112784b26ef5519779007cd6b990ebf4c454584999bf2f98b1,2025-02-26T07:00:42.270000 +CVE-2022-49051,0,1,cb43140b092e07e1d1e08fd40e8d1e6723561d814d0dca64fbd37ea8c67bdbae,2025-02-26T07:00:42.363000 +CVE-2022-49052,0,1,cdf2fc81f660b7f7b3a723cdea9f8859bf23d7cde38aec70ef0f6ca101ccb94a,2025-02-26T07:00:42.463000 +CVE-2022-49053,0,1,e6196f61161513d4b0e645a295b1e0139bd4138b962688b902635facc3103686,2025-02-27T18:15:23.733000 +CVE-2022-49054,0,1,679c44903bbbe010db59866d81777676e7f8c21f4de04a3b06c32a954173da90,2025-02-26T07:00:42.667000 +CVE-2022-49055,0,1,ff43301fa5164f8141d54f583f4f862025338a9da417a4ff72d915e0e5bc7c2f,2025-02-26T07:00:42.760000 +CVE-2022-49056,0,1,fed64502dc27bb1de8303e848b7450268568790cee1869dc1c89b6131d3540a3,2025-02-26T07:00:42.863000 +CVE-2022-49057,0,1,de32aeecbb24bf5500247582d7bf028e3ba28cb6e3180566051705509e9bba0b,2025-02-26T07:00:42.957000 +CVE-2022-49058,0,1,00d2b2de2acfb26c002e206b9cb40cf76e0b14c7de6b10995a36208ee0e1c727,2025-02-26T07:00:43.047000 +CVE-2022-49059,0,1,8dfc37fbb3bff68dd057b25bbde7fe9273f5148200ab1a0b89def00d6c36afb9,2025-02-27T18:15:23.913000 CVE-2022-4906,0,0,a823b4bbfbbc923f2df028a42581e18917821bc8c8d60008f8440a61828e4ecc,2024-11-21T07:36:13.207000 -CVE-2022-49060,0,0,c0c79806b27c60e8cd421c008dcd47bbd6e668094124d21f1d0512de7c184a7c,2025-02-26T07:00:43.257000 -CVE-2022-49061,0,0,0687c7a6b8605eef71453089f8b238f18d5a1ab745ac4233628842251c258b17,2025-02-26T07:00:43.353000 -CVE-2022-49062,0,0,ff175883bab3b5f21b93753864e8137dc1a09f6f221d27e2dbd907b8c2eac443,2025-02-26T07:00:43.450000 -CVE-2022-49063,0,0,2f12e34370bf7c85c19bcaab2ed2b991f00af7b953da0ddd12a84c17daa8f6b9,2025-02-27T19:15:41.070000 -CVE-2022-49064,0,0,08cf17f6751fa83168c0d284ab99f7df1dcb2ed649ea66b09119214a41f11948,2025-02-26T07:00:43.637000 -CVE-2022-49065,0,0,ceea3e6cf5eac3c025ece868fc9344257fe81fb1dac7f329f7efa848f836abcc,2025-02-26T07:00:43.723000 -CVE-2022-49066,0,0,e56dedaecf9918b1c5cb114a6e94c4d6c504ef29d745c55a96e5e54b4e75cd43,2025-02-26T07:00:43.820000 -CVE-2022-49067,0,0,f7df494d7b6555b329a9db43e4d317ceb008413271c0ec066f6d631288a48103,2025-02-26T07:00:43.927000 -CVE-2022-49068,0,0,35ab206199c14330aae29c92719050fcfeda2f4489389874b731b71a878240e5,2025-02-26T07:00:44.027000 -CVE-2022-49069,0,0,55b2fd2f7b1839d0303bbd481483fbc5629ca952f45cf62b3d3e12d1f1684f44,2025-02-26T07:00:44.120000 +CVE-2022-49060,0,1,ee25d7b2c9aff5f5604ab0fd5e5bdf664267f337ed4e2facee5c2f5cf5fb1bb3,2025-02-26T07:00:43.257000 +CVE-2022-49061,0,1,6dc7d1f2f6b0b17c0142d13cf46deaa49d4344fffee7c57c23bf279092a6d4d5,2025-02-26T07:00:43.353000 +CVE-2022-49062,0,1,df127146ce2009260c362547ceb88caab9d37a5c7e89d37a62354e6d32610873,2025-02-26T07:00:43.450000 +CVE-2022-49063,0,1,b565e3045e5ba5441ceeb92ef03a52d5fef74829c67c76d217f84c12c8cf8b96,2025-02-27T19:15:41.070000 +CVE-2022-49064,0,1,7db35e2188f9d0c1f0ef7fcb7f262240667782c20fb0c4b8464d2083b4af498f,2025-02-26T07:00:43.637000 +CVE-2022-49065,0,1,a325d3ac5c899fb79ba72d43983fa573160870943b151bb9fc26d8c88f7b29b8,2025-02-26T07:00:43.723000 +CVE-2022-49066,0,1,1d2ad6081ff8a9bca47b57172c754cbf231fc57b746aa17f2831fd618104a426,2025-02-26T07:00:43.820000 +CVE-2022-49067,0,1,a8f2f882eba49e1063e17a541dda6968eeb1be91f46062d34abe2f03ea3843d7,2025-02-26T07:00:43.927000 +CVE-2022-49068,0,1,446b28b3b2ea102e283c0aa8ba949756e1390f5d27c0d16227c31aa6b658651f,2025-02-26T07:00:44.027000 +CVE-2022-49069,0,1,4f628b68533f7eef6b59a775ac7375fdffd486af5334ab23841d74b13dcd97cf,2025-02-26T07:00:44.120000 CVE-2022-4907,0,0,0196061cf6e3e0458ba6dde85cf42a89e1110c92e69c62feca2776c69370599d,2024-11-21T07:36:13.317000 -CVE-2022-49070,0,0,7354b4cd1368499fbc374236ae05220ced27006278b4823e232577af74492558,2025-02-26T07:00:44.217000 -CVE-2022-49071,0,0,07af30d8cc81ddae8c84d3ede37224d76490abfa9347429d73c26ecca149ac45,2025-02-26T07:00:44.323000 -CVE-2022-49072,0,0,a710c19b053e1c43c0e065c37f039dcaaca80989cf64ba23af9b8bc4fd5fcbed,2025-02-26T07:00:44.423000 -CVE-2022-49073,0,0,a3b24d90c55d0c335255c77ba42e802ca5ebd6f6b5e00c166edc880ce3ff25ba,2025-02-26T07:00:44.647000 -CVE-2022-49074,0,0,aca7764dea8f01d2c58c4a8e742ade8b463d38e368737a4add78f4b79adfe599,2025-02-26T07:00:44.750000 -CVE-2022-49075,0,0,1561954ae2f03cec51ec718529f01cff690f9c4ef301bdf468d64eec59d1ad94,2025-02-26T07:00:44.847000 -CVE-2022-49076,0,0,f99f45adbf51e6e5f03b26f3f09534e5233c1511be722a10480f66c61a4ff671,2025-02-27T19:15:41.213000 -CVE-2022-49077,0,0,7540d88b947d83085d485da7f0aa3474696cef9d937bcc34dbf3e3741e28154a,2025-02-26T07:00:45.043000 -CVE-2022-49078,0,0,59c353940c9ac703c38116322d815635185f119ae62f9a1e1f5b3d647bfef23b,2025-02-27T18:15:24.090000 -CVE-2022-49079,0,0,f54681b5930e0a6c4fd7dcb8f0cd48d002907009284b24d07f112ce571c21b56,2025-02-26T07:00:45.250000 +CVE-2022-49070,0,1,1c18e1fe56e29998946ab09ac6a4b15bb42ee59f64c5f417af09304056500a3a,2025-02-26T07:00:44.217000 +CVE-2022-49071,0,1,96ed8e75eaecaf7df999f68eab6e8bfa35b8aa359d8e5af66301748587b8f2ea,2025-02-26T07:00:44.323000 +CVE-2022-49072,0,1,055b7bab4edfd6238cbf3b5ecb69bb6118f17b2ebd5e3970390f8bd3c1934b20,2025-02-26T07:00:44.423000 +CVE-2022-49073,0,1,fdfd2d8e79228f94bb41d988713691482bed424c1397c9745971f237aec65573,2025-02-26T07:00:44.647000 +CVE-2022-49074,0,1,76421d6902e397a51d31434b832460afbd8898e1b2c84222cb9ccdc7e1eb3537,2025-02-26T07:00:44.750000 +CVE-2022-49075,0,1,2d31b6e74eef79ea0bab45a94fdcaeeb8a15e588d3070707cf2cfcb6f24dec60,2025-02-26T07:00:44.847000 +CVE-2022-49076,0,1,c918552a69f1c3e65fcbe926d0b1cd5f849ecdc7a8995f3b35079e8db3df846b,2025-02-27T19:15:41.213000 +CVE-2022-49077,0,1,16f318af5bbea72bb305cb6e8d1d041a907669857d9566b460caa439ca1cfcbe,2025-02-26T07:00:45.043000 +CVE-2022-49078,0,1,c0528ab405d27d37ea1331df0d09bd5b4c9de76b23acdc2095537e4d8d3e85aa,2025-02-27T18:15:24.090000 +CVE-2022-49079,0,1,6ea7caae039cee2af0cc0122eac04b2aa1d89d49f2daadef7f40627237c62d82,2025-02-26T07:00:45.250000 CVE-2022-4908,0,0,383323d7ed3fc2aa1cb27670a39714ac299a31d311bbc6cad999a9d72854959d,2024-11-21T07:36:13.443000 -CVE-2022-49080,0,0,f0a4bc2d4b4ca586626ecc94a7a66e670845212a322823e820c3d30b07db7258,2025-02-26T07:00:45.347000 -CVE-2022-49081,0,0,be72995fd454f9158d1e3e5fbc79804815d29c27de934898ba0b18cee2d27da9,2025-02-26T07:00:45.450000 -CVE-2022-49082,0,0,13c05f545b73ccc4dc2e9ef5b0df626c4be1cb4a6a99de51ff0312e6e9d7356f,2025-02-27T19:15:41.353000 -CVE-2022-49083,0,0,6e8d4528dfecef5083a89318b335b40847168527522b84f0959c9f19bc918946,2025-02-26T07:00:45.643000 -CVE-2022-49084,0,0,06d53b46ca89c4e42970a2216ef3c778abce71eec75921c660abbea5691dc290,2025-02-26T07:00:45.737000 -CVE-2022-49085,0,0,53522bf6db469dbf0c1beee8c1f5710d93802f712a48a599c1cb79dfaad38e86,2025-02-27T18:15:24.270000 -CVE-2022-49086,0,0,e21b8f67a427787413a1935bad1027e8db71fa1000e81de7bf324eb7c6708cb3,2025-02-26T07:00:45.940000 -CVE-2022-49087,0,0,0f0474969e0f9cf7ff3a4493d2c67524869b1e48b29f3fffe71d40895dbec01d,2025-02-27T19:15:41.493000 -CVE-2022-49088,0,0,a0eee1c79c00d33fc14bbbe2810f776506b290f07ae6718399bc421b58f1b22a,2025-02-26T07:00:46.143000 -CVE-2022-49089,0,0,29c4fbe8361ecc022d9c33c66a7fd5135eef333ec19dc345ca40edc0ea82857b,2025-02-26T07:00:46.240000 +CVE-2022-49080,0,1,329273879b54bc0b26d00f4fc74193a99c2293a13915178b882fb8fb88d598f9,2025-02-26T07:00:45.347000 +CVE-2022-49081,0,1,6930278c92e5b416bd2285dd932e2716e1ca4cdd0d4620ef8d957185ae56df66,2025-02-26T07:00:45.450000 +CVE-2022-49082,0,1,ad081f43f56955d5da4f3145369423416b624788955141347333e8b6c585b391,2025-02-27T19:15:41.353000 +CVE-2022-49083,0,1,c280af7fd0e476390630d01b8f5380e69adf8a89e920a43dad9dfdfc340b5d6d,2025-02-26T07:00:45.643000 +CVE-2022-49084,0,1,3a813e3673ba0c7a64840ba9197b7385b87a1c268ff1f619fef2224c4ad09c31,2025-02-26T07:00:45.737000 +CVE-2022-49085,0,1,5817e79397f153713d1bdc561f19b14d0b96838349307e94bdee3ae29eab6ca2,2025-02-27T18:15:24.270000 +CVE-2022-49086,0,1,0bf20b9a1a92b8605255d31e7bb4b1d3e24e2136e3622c56738752a51037ee1b,2025-02-26T07:00:45.940000 +CVE-2022-49087,0,1,6cee75f9a36f0da9ab58bfa4c6b1e17eacb54de8e135a34c6b1e9d4b8c3be2f2,2025-02-27T19:15:41.493000 +CVE-2022-49088,0,1,3c5e2e57581a34b4181ed6d9fa4b435a053b89caee6deb4d3f57f188e2019624,2025-02-26T07:00:46.143000 +CVE-2022-49089,0,1,41e9735af0cbb19bf47cf581545b384a99e49e0d1aed42628b42351351d5758f,2025-02-26T07:00:46.240000 CVE-2022-4909,0,0,28e150195670658dbb597d2ae16b58acadec9146b9a0e6f41e387727d58a210b,2024-11-21T07:36:13.560000 -CVE-2022-49090,0,0,0ac1cc20d9fa5f6fe8602689f3d099ac1e3447545669e2c5d22c2d93fb2134be,2025-02-26T07:00:46.337000 -CVE-2022-49091,0,0,cb82605b162c57e3526b328999ecfb8a5e18f850c7fb7b0c71c5b829e308f578,2025-02-26T07:00:46.430000 -CVE-2022-49092,0,0,38b7be740f383b64430a295b56e1bbfc830bd1a4a396a5450a6f6b174f604c29,2025-02-26T07:00:46.530000 -CVE-2022-49093,0,0,e2ebba6c8d7652acd4ced5cc3169efe99c09593cdb4a270bd01955e1a6a77f78,2025-02-27T19:15:41.640000 -CVE-2022-49094,0,0,45a4a00c20f36c99a6f0659f801e1de0926fd90a08e033ddd1402c8300ce8400,2025-02-26T07:00:46.747000 -CVE-2022-49095,0,0,83dd2c6aaefaeaa349d31a2c757b650c6400cb07877580f15b44e62f267422e7,2025-02-26T07:00:46.887000 -CVE-2022-49096,0,0,e9b74dbb697dec5dc0bb652c612eb261b8a6342f7fd7ea4e64b57372ab41bf3f,2025-02-26T07:00:47.010000 -CVE-2022-49097,0,0,21556ae71c810df88a00fac1b66f3bb94ddaa294ea1025d82769d921261c0766,2025-02-26T07:00:47.127000 -CVE-2022-49098,0,0,10e7b23dfe71ddd9807c78215bec00a9cb332fc76ab30e51b34e8bdf6f1eeb8b,2025-02-26T07:00:47.247000 -CVE-2022-49099,0,0,3420971d3f239af44fe153d922430053593e4861cd495cf512e8555c8dc3c8e9,2025-02-26T07:00:47.347000 +CVE-2022-49090,0,1,54c2ed6f05af5bbc5bfaa4b5b5744e017b664a9a8e835c5bae1af5e0df43c82a,2025-02-26T07:00:46.337000 +CVE-2022-49091,0,1,1e931a8de167a9f61da0b2fa020e234ce3eafd1528a3271e03dfead157281e20,2025-02-26T07:00:46.430000 +CVE-2022-49092,0,1,93148954c45bc1067ffef956805a3139ff97ea1e393a1dd1dcb925557e181e0a,2025-02-26T07:00:46.530000 +CVE-2022-49093,0,1,442a72b4065f3bf8aaab6083123eaf8de2b19207ca2408815b5437123bca1ba0,2025-02-27T19:15:41.640000 +CVE-2022-49094,0,1,1ee21cecd56513d5ece34189eeb61c810ddd3e0839b5c9778881e5023914605c,2025-02-26T07:00:46.747000 +CVE-2022-49095,0,1,3146827ced5a4eb85bbf2ca5f03fc70d61928643cccff076dfd6b4241c1983dd,2025-02-26T07:00:46.887000 +CVE-2022-49096,0,1,c30cbe7551f55d0f4997354d6c4bb1d05443ef18fba1a86862fc3a2bee475629,2025-02-26T07:00:47.010000 +CVE-2022-49097,0,1,6635e84ed7a309c53842c463566f5ddcf97b5d133e5c925476fe5252ee63e18f,2025-02-26T07:00:47.127000 +CVE-2022-49098,0,1,12e46ce0778b4dc7d9f872a9bb5c1630c6387c4950d5d554f09a1057cd591313,2025-02-26T07:00:47.247000 +CVE-2022-49099,0,1,f41b09c2f3e5e0ee4b73b9529727932f802b23fc099ea78b33e745f9b44f7f89,2025-02-26T07:00:47.347000 CVE-2022-4910,0,0,0578d222e37c72ba1a57588b55149e801184b5443a4d394ba72ee7d1ccf12f02,2024-11-21T07:36:13.667000 -CVE-2022-49100,0,0,941998d6a6dd024c5a823041b3d6e09eb747cdc81dbb7538a46f05b264f7be27,2025-02-26T07:00:47.437000 +CVE-2022-49100,0,1,6d79ea4869cc96059c5d659fb7c3658e3961b2d526d6a68733cf8299a46d8ab6,2025-02-26T07:00:47.437000 CVE-2022-49101,0,0,935c63acf95eb88709eba4f596df2fabdee6ea4912a035181cf00d16b7fc76c4,2025-02-26T13:15:33.977000 -CVE-2022-49102,0,0,ab38c008844ac1c9917b53f367a0256673563fe61fb0446280c4191a5b1d2b98,2025-02-26T07:00:47.633000 -CVE-2022-49103,0,0,4e3df204b8a37cc242b7fcaf4fc4e32bc66fb24939c10df06805c52f4f9ef6e3,2025-02-26T07:00:47.723000 -CVE-2022-49104,0,0,4dab31d3f8cc785e6d19abc86d88c92c576657b491686e23efe06365be7ea2fe,2025-02-26T07:00:47.817000 -CVE-2022-49105,0,0,5f4294a095ab0d2b68aa78c6b658036214fd35fed2ed0a8c993b1a66f7037800,2025-02-26T07:00:47.910000 -CVE-2022-49106,0,0,1d4aa0fc3eefa22a0231cfe4909ceb2544bd224ae9611c455a35f65348ca0663,2025-02-26T07:00:48.003000 -CVE-2022-49107,0,0,acb273594e818a615281dc18c4d9f45cf62ea61a3ee07a4ef1fce2f531a045ed,2025-02-26T07:00:48.093000 -CVE-2022-49108,0,0,998e64752841e5df3d5b0f334a5f424edc25c3f37f6906452109378b7e9a0d19,2025-02-26T07:00:48.183000 -CVE-2022-49109,0,0,54a65a7489c1b816fd923f743b58f67deac1bba91d25ae8f2b5623499192b727,2025-02-26T07:00:48.273000 +CVE-2022-49102,0,1,cef2c3969f5d67dbe6c9496886d55e9f84d888189e0bbc296796186d3175e0ad,2025-02-26T07:00:47.633000 +CVE-2022-49103,0,1,a5240fc8e97f0dd032ce113afa26cb8b009f24af8bd595935ad4900b2ac71f0b,2025-02-26T07:00:47.723000 +CVE-2022-49104,0,1,e298305a8a31242fa283d9185f87283103d6744726ce28ef06247a2d2cbd641c,2025-02-26T07:00:47.817000 +CVE-2022-49105,0,1,fd6db438e93c53620e513ac8c7b37ef3a2b9673b40a79b49dfbc65bf77c4526b,2025-02-26T07:00:47.910000 +CVE-2022-49106,0,1,5ba60fb822860db032a3fe28d8a6c4c5c2e44179cac01b7408a7663f2fedfd73,2025-02-26T07:00:48.003000 +CVE-2022-49107,0,1,22cf037ce9d663917b2f566c790b859133946c08ab7ec0eaa72b1a02fb5da32a,2025-02-26T07:00:48.093000 +CVE-2022-49108,0,1,b6ffaf09b610cb55a0f2027c908c11df62c906fbd22db83e6c3ffca129b45f41,2025-02-26T07:00:48.183000 +CVE-2022-49109,0,1,df9f6a705664b8d24cac89449baeba3172dc90dc71eb73f341bdab7106fecbeb,2025-02-26T07:00:48.273000 CVE-2022-4911,0,0,584ace30c9064e713cd09c96d4db8b9174c37337aaf32c92be96843fae8619c7,2024-11-21T07:36:13.780000 -CVE-2022-49110,0,0,5103555fcd11a5bf199fd33baab0d617149db9851329b3965ac253a8520ab5c3,2025-02-26T07:00:48.363000 -CVE-2022-49111,0,0,0f73ff8884819a3d31422b81d543b4b48c8e71296c668745b64672b525f0720c,2025-02-27T19:15:41.783000 -CVE-2022-49112,0,0,3f89b3060ac2c9e27a6960ab3f5c3defc2cea3fe5d522fa573c1592379e38bdc,2025-02-26T07:00:48.577000 -CVE-2022-49113,0,0,95a432f029e3467048855426f584a077c7500c916716068e6f0c98bdffa00d8b,2025-02-26T07:00:48.677000 +CVE-2022-49110,0,1,6d279d09a850759a72b81474b832ce6e9d2d11fe62edfe1c18c409c7c0e42ddd,2025-02-26T07:00:48.363000 +CVE-2022-49111,0,1,df4c9eac7e8d10182bbbd1f13ffff9a736cee5b1368b7410c0a7b73d36e28b04,2025-02-27T19:15:41.783000 +CVE-2022-49112,0,1,156f241cd3676faa132b5aef3871b88cb89d885964a18c914d50a336ca43f202,2025-02-26T07:00:48.577000 +CVE-2022-49113,0,1,495425433597f613a5ae2b3d567d84d520c8b96244d03f3e423343e1509d250f,2025-02-26T07:00:48.677000 CVE-2022-49114,0,0,a219b9bb24f6df65546aaaceb5d717da949556e470de3d544cef3d51184cb52a,2025-03-04T18:15:21.570000 -CVE-2022-49115,0,0,c937c4341d31ee3c2c6f7df41443d43292834dee62fe1e5f7dcfbde1cf86b47d,2025-02-26T07:00:48.873000 -CVE-2022-49116,0,0,685da781059ed88dd0ea8fceb53acd10c5eb252ca9de8661761424cb06797c75,2025-02-26T07:00:48.967000 -CVE-2022-49117,0,0,bd5f9c0c823d8b9e51459dc8f0b0c3c51729f6482fc77c31ad31b3be5334d483,2025-02-26T07:00:49.057000 -CVE-2022-49118,0,0,ebb806b7f9b80cbfaf7d3eecec134b4eb76c06449b6eb61768d4c55d4b1c80a6,2025-02-26T07:00:49.150000 -CVE-2022-49119,0,0,0cb3d393360615503cd61f5f0ed0b8b979140798965afb5d983ea7206b54766e,2025-02-26T07:00:49.250000 +CVE-2022-49115,0,1,85bb753de8aa31e2258bc56e69f17c6634d700237941b695dd605379afc3e741,2025-02-26T07:00:48.873000 +CVE-2022-49116,0,1,b4f01c4a0ac19a8c3fb13dcfd69239b5da39f2828bbe2ebf79444e41f608f175,2025-02-26T07:00:48.967000 +CVE-2022-49117,0,1,c31c29f18870ec89fb94f1735516274f114fc505340bf372d8236371d85fd4d6,2025-02-26T07:00:49.057000 +CVE-2022-49118,0,1,953eece259ac61d24a6b3c75e308a3cfa565271a73999d32f98fa5eeb33eb76b,2025-02-26T07:00:49.150000 +CVE-2022-49119,0,1,215d9d33bf885049aa39d6f9253873aec69fc7d16f25d0679ba3c6ae5b2c087d,2025-02-26T07:00:49.250000 CVE-2022-4912,0,0,f31c2366ccb5db0b2edeef2656f7822d272d2a0015b283eecc00bab9f788a0fd,2024-11-21T07:36:13.897000 -CVE-2022-49120,0,0,a593dc46a5896892bf4cd57e8e75e87b75c89d0731d97c7dd3a0036ce1dce3cb,2025-02-26T07:00:49.350000 -CVE-2022-49121,0,0,f0d97406d5babb813d5d39a5183471b1d8b492d031c9a90455e47021d784a6c4,2025-02-26T07:00:49.450000 -CVE-2022-49122,0,0,9933f5f3a79b16fe7ba0859ebe0619815942da360b094b3db26b2e9dc6a1d251,2025-02-26T07:00:49.540000 -CVE-2022-49123,0,0,e03cddde64b1c316c06254c902cbefd8bac3852ebbc79351585d14c1f24b985d,2025-02-26T07:00:49.640000 -CVE-2022-49124,0,0,790ece687ace90b65ca8ae9b1f6f6c5d5cbb6acd2438075f79d2e102a8e499b2,2025-02-26T07:00:49.740000 -CVE-2022-49125,0,0,f8c4d5279b3108620e3394c4ca48dc73a808822bdd1dd641992da6baa079cf3f,2025-02-26T07:00:49.837000 -CVE-2022-49126,0,0,f73ecf80c26c1deca185c679c75fc454384ebde78a462ac4ee40b96d530cf638,2025-02-26T07:00:49.927000 -CVE-2022-49127,0,0,0f14f07abad44a51f4357653458b48dde0405fc8ba1991360113df0a509dffdc,2025-02-27T19:15:41.930000 -CVE-2022-49128,0,0,171aff95c34e7bcac6ccd30e46f31d3ba3682520f06822b59db2669b7199a202,2025-02-26T07:00:50.113000 -CVE-2022-49129,0,0,f5f268d9b5d63fba967494e4b0b5d0439395ecd47f9a4c088b38db699c83d921,2025-02-27T19:15:42.063000 +CVE-2022-49120,0,1,e53f533be7175b8b543426f7f8c6ea20796294fb1b787a1eba47c4350f5902d4,2025-02-26T07:00:49.350000 +CVE-2022-49121,0,1,d2e8053354dc53af4c44507890b4084b87a5cc20248ca64b84085c79fb7a46dd,2025-02-26T07:00:49.450000 +CVE-2022-49122,0,1,fb97e2d1654e3d8e8758b0e9802e04115626c40ca987f9c55e7c0f14736efcc4,2025-02-26T07:00:49.540000 +CVE-2022-49123,0,1,e91f627cb71f422fe834b0f1825c3f498063f422f950323030b32b5d813de24e,2025-02-26T07:00:49.640000 +CVE-2022-49124,0,1,79ec0da07da32de303a4bbcbcc39e875d08fdd1c3f43e2520bfde43238b10c25,2025-02-26T07:00:49.740000 +CVE-2022-49125,0,1,a60139186d6e019e2ca930ddbcc7619f6d0d2b3296267b3ff36c598899937503,2025-02-26T07:00:49.837000 +CVE-2022-49126,0,1,f0c216a412c59445e8c76935e282b9adda68662f56bc17ca2490c651b630ba48,2025-02-26T07:00:49.927000 +CVE-2022-49127,0,1,1341b160783b3d96fd49819f5d5c5427cf4cfc9ef757f58655b527ed4c538624,2025-02-27T19:15:41.930000 +CVE-2022-49128,0,1,c98c24c994b3152f688840ca868613ad3ad31de160baf64db40908736cfe46d5,2025-02-26T07:00:50.113000 +CVE-2022-49129,0,1,0ef178a55d8cf9a1f0af7652ce63cd2a962f68e4da528a89d6fd2cbac676913e,2025-02-27T19:15:42.063000 CVE-2022-4913,0,0,e8dbca49e3518f819fca949d98a7bb3175c26403fd3fd8fca017d6ea88f023bf,2024-11-21T07:36:14 -CVE-2022-49130,0,0,3cd19efd4653d97471554e5679e030af7d08534cfb914492bfb3558cb3bea68e,2025-02-26T07:00:50.300000 -CVE-2022-49131,0,0,f85c280b240c152764a94f76fae3b425fa7f9b3707646daa29630e445d9ae8ec,2025-02-26T07:00:50.393000 -CVE-2022-49132,0,0,b1e1233c7570efd220534c02e8d268977ca7ffb33d1e6776aa39c628c6839345,2025-02-26T07:00:50.497000 -CVE-2022-49133,0,0,cbc7bf66ad6ea8d29fc7db588aca88892c606197257b2df650a8e6f4d146f5fd,2025-02-26T07:00:50.590000 -CVE-2022-49134,0,0,599465f61547a054bcff6b42e9563cd19ecc08fb91825f670a4097d76f447a96,2025-02-26T07:00:50.680000 -CVE-2022-49135,0,0,2f199fbebb9c6aa82167b8e383d662fbfcde77347c48499c9d7bed4fe34be73c,2025-02-26T07:00:50.770000 -CVE-2022-49136,0,0,588bb1a550e08f7325417c3529b5d863eacc8bc55ddb53dd9637118fba2b6e7a,2025-02-27T18:15:24.457000 -CVE-2022-49137,0,0,1b47864daa3a3abbbcdbfd8823d122faeecd6cac29da72e03b6ad2617108e5a3,2025-02-26T07:00:50.953000 -CVE-2022-49138,0,0,a2c7ade5c9296e3698515ce1d53343ba11d19e4174548f30d51e88215bd96b77,2025-02-26T07:00:51.047000 -CVE-2022-49139,0,0,be9e73e1f14eac46d3239c00494be0d6eb063797350770b24e8354c740ec843d,2025-02-26T07:00:51.133000 +CVE-2022-49130,0,1,172bdfa42cac17dbe9e4444b599a5074b571c909977748bc8657c0144c11f5db,2025-02-26T07:00:50.300000 +CVE-2022-49131,0,1,bd314ebdca72d4eacf3f1b6b5a700104e8b11bda9946f268baa575441a8d1f70,2025-02-26T07:00:50.393000 +CVE-2022-49132,0,1,b7f203050fbd61896bb46d9ce98f8cac40ab85f43df56f33bd02c4c2a9cff088,2025-02-26T07:00:50.497000 +CVE-2022-49133,0,1,92f80c9139e780ec88c9d8d963718b309465e4ff797d25533e5b1b4c7ff5f02b,2025-02-26T07:00:50.590000 +CVE-2022-49134,0,1,1519b400b501992b71babeb301c8d52f1e7cb8b906a32f5f48a1137d70ce8a2f,2025-02-26T07:00:50.680000 +CVE-2022-49135,0,1,65264a0f7ace86e233b38572ca6d49a5d0d177c09d7ceed0975dbe897f186a4a,2025-02-26T07:00:50.770000 +CVE-2022-49136,0,1,60c4ad7f6a282af7a1b252e98324a7d35650b60b170c34014002bd85721d763f,2025-02-27T18:15:24.457000 +CVE-2022-49137,0,1,80ec87ce19d0e6f96a6a44e6d0b92e37e988af554c71a185b8d1a971a320c40a,2025-02-26T07:00:50.953000 +CVE-2022-49138,0,1,adf9fecb5e5cd3ff93b58119ed77292cfdb4675ced9292196bc7f4d7cd275951,2025-02-26T07:00:51.047000 +CVE-2022-49139,0,1,14cb225d053c2ea6b5ea156c0492db2841bb160058e4ff0df383d7e27978eaae,2025-02-26T07:00:51.133000 CVE-2022-4914,0,0,b1a3bfb604bc94d6f8d72a9a472ff2a255c53e356f5955922fa3b7d4adc587ee,2024-11-21T07:36:14.103000 CVE-2022-49140,0,0,f4d1e91386090c2e01112e4e4121046421d90ff161aba63bd8c46b345861e54b,2025-02-27T02:15:09.193000 -CVE-2022-49141,0,0,a573fe5aa942c8f6bc21d05fd45fd142c32384b3d5dd155b8742015d6f91dc13,2025-02-26T07:00:51.327000 -CVE-2022-49142,0,0,f25befb0bbdf6da4304a51a73cd50dccc0580c082830e3890fb68ce672542c66,2025-02-26T07:00:51.420000 +CVE-2022-49141,0,1,3194b560a69df9e70378d4d234d59a410ff2b0bd3beff749b5a77e925f578415,2025-02-26T07:00:51.327000 +CVE-2022-49142,0,1,46228e8f6dcb7b3226e91caf98b77438b3644cd57658fa0f8deaadbfec0abf17,2025-02-26T07:00:51.420000 CVE-2022-49143,0,0,715c3e9e10466e960c8f40210c1260495316f9d05ddb956ea2e6e6f055457d25,2025-02-26T15:15:15.857000 -CVE-2022-49144,0,0,941050240afd309d045fee6a49218aad62137f5866718c410312b6f93671e44e,2025-02-26T07:00:51.600000 -CVE-2022-49145,0,0,ad80b204f4fc5d87024dc9285a16bc735458296d8241021daafd332a88046acb,2025-02-26T07:00:51.693000 -CVE-2022-49146,0,0,3ac142bec1f890086b0bfce91bfbc39e29e2e6b32903067760cfc1da4b2af225,2025-02-26T07:00:51.793000 -CVE-2022-49147,0,0,f60121d2aa35dd987f7b8ad5997fe4bbb435a7741fd9978de3c5c2fcae0d5ad5,2025-02-26T07:00:51.887000 -CVE-2022-49148,0,0,026e647afa8ae8927f30856d55066152df9c00f802087ff039b71d0f3ab8538c,2025-02-26T07:00:51.973000 -CVE-2022-49149,0,0,28fe4a4c1cf8c06c831356b2cc2105cbf37d5240829e77352b3dd4c5d965efe5,2025-02-26T07:00:52.073000 +CVE-2022-49144,0,1,3a45b37af08432de15b757032c2f28af98aaec35e3d9062797983e1b04febe2e,2025-02-26T07:00:51.600000 +CVE-2022-49145,0,1,323c99968a4c685f3687611f9510307e66dc152d100b7fa775d654452175c907,2025-02-26T07:00:51.693000 +CVE-2022-49146,0,1,ee5250cc1b2641da0ea5cd6fd8bbe648077c1e8b830792aada24190f73efefc5,2025-02-26T07:00:51.793000 +CVE-2022-49147,0,1,0de4e1650fa3987512c7527c08a9a7ecb8c4376a8821a4bbe1eded2c87c07143,2025-02-26T07:00:51.887000 +CVE-2022-49148,0,1,4e025c72143a0484364db37e6e7de62a7e57ddb733057ea527295f20ec1e750f,2025-02-26T07:00:51.973000 +CVE-2022-49149,0,1,8297fdf184d8a7e40f01ea0d5664b49cf40330e7583bc4ef95ce788771a41ad6,2025-02-26T07:00:52.073000 CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000 -CVE-2022-49150,0,0,e4e4513b4cafaf91a105606dc17bf5f10fe7bae2659ab965803aad17673d47f8,2025-02-26T07:00:52.203000 -CVE-2022-49151,0,0,d483e93246720a744deae2e3307cd509d9737252cff7f1697c637c80ddcb1a93,2025-02-26T07:00:52.330000 -CVE-2022-49152,0,0,c671b97ee9f6537f370e03519a4bc7e8a29fd7e89188eac63596559681d9620b,2025-02-26T07:00:52.440000 -CVE-2022-49153,0,0,e8c5a88dd5ff7fcf19aebe4c71e8d7c67c34c4fa5308ab4c027cfb8648913761,2025-02-26T07:00:52.533000 -CVE-2022-49154,0,0,d04fb9f1c983f1f8fc824e2ed3f7e3f257235172a6a654f35f99d880f5141c80,2025-02-26T07:00:52.627000 -CVE-2022-49155,0,0,398bdbb2546ac3e54668839827b5a64902252361f603b9edcb57b94f2c8126c3,2025-02-26T07:00:52.717000 -CVE-2022-49156,0,0,3536414b82cd3a1d4e39af51f12fdb53cdaef6954227bc895d155e41b65a4dc4,2025-02-26T07:00:52.823000 -CVE-2022-49157,0,0,ac54d2d1bf81705b5acfb6dc2378a97e8257b84aeedefd81bf5cc2265de8447b,2025-02-26T07:00:52.917000 -CVE-2022-49158,0,0,b72bede7b9126c89e937524dac01077cf03607f8441b68696efe71d9c771621f,2025-02-26T07:00:53.013000 -CVE-2022-49159,0,0,43e3c6bb16ee50611b4448e1435eec0fcfa0990d50720e193199d0e24a75cf4d,2025-02-26T07:00:53.103000 +CVE-2022-49150,0,1,15d0e3ccf1d33a5af0104e73fce22f7dbc17d0281d93588fba2fe5e6b0a9840c,2025-02-26T07:00:52.203000 +CVE-2022-49151,0,1,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000 +CVE-2022-49152,0,1,8ba9a12fa799a42a8a23220763a2f1d1b4a2567b4ec883d59d55b3250ca6a92f,2025-02-26T07:00:52.440000 +CVE-2022-49153,0,1,ef4c77a0b487901498edd37f19988f92b9ee67019ea354613069155fb3ae2d1f,2025-02-26T07:00:52.533000 +CVE-2022-49154,0,1,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000 +CVE-2022-49155,0,1,672a96cb2888c8aeccef90262da9d3c2761937be8e382fd9561cc275a3c0e346,2025-02-26T07:00:52.717000 +CVE-2022-49156,0,1,ba19e8d0d1d0bede6df769ef7edbf16cb0c614c941e26b914c02740bcf530018,2025-02-26T07:00:52.823000 +CVE-2022-49157,0,1,4ecac6b5e036214ea335d4ca1cf9d21d9e85d7ac15e06b98fa87c23e8615dcce,2025-02-26T07:00:52.917000 +CVE-2022-49158,0,1,b3fbfd4cf79d9700cec6ebe380bfe05185ffa912f74b4de2ab33baa95b822618,2025-02-26T07:00:53.013000 +CVE-2022-49159,0,1,7602eae1cd766c4f3472938809ba0be56ff2d48c47a7f7c4e4f0b6e9e700649a,2025-02-26T07:00:53.103000 CVE-2022-4916,0,0,506155fd081e87d1f14db90edc228c7abea923b78f3efea545f8566eb768dffa,2024-11-21T07:36:14.323000 -CVE-2022-49160,0,0,7b793d57e4f8e60988516ac0a227750388a3f1ab3eadddf301a2c7bf1dc4472c,2025-02-26T07:00:53.190000 -CVE-2022-49161,0,0,2e1b252de9d94cfe5ea1843f310feacbc7b5c38dfb373e4f6a96a23add08670b,2025-02-26T07:00:53.280000 -CVE-2022-49162,0,0,3973b722992a666583e47e8ca94d647061c3ffc5289b7af7e18a0f6ee2792fb6,2025-02-26T07:00:53.373000 -CVE-2022-49163,0,0,4c77a85d60a863e50dcbcfd96d6b25ba512cfb9dc7e304162de88a1d3f627996,2025-02-26T07:00:53.473000 -CVE-2022-49164,0,0,388781357b8b05371769f46cca032fb0b0dca9e7e1e4560cae01bbd4393e868e,2025-02-26T07:00:53.563000 -CVE-2022-49165,0,0,2557d06dd04d98c8d86321dace711bcd57aa884d64661ce5161bf3e6b2ab8134,2025-02-26T07:00:53.653000 -CVE-2022-49166,0,0,9c92cfd97673ae48992fc3a6aec6e533b4d99fa7677390bc2a6aeb5aba4dd786,2025-02-26T07:00:53.743000 -CVE-2022-49167,0,0,ce10f9e1257f406d7f1786833c266277dfb23460fa6cd95b22f9d444db8469a2,2025-02-26T07:00:53.837000 -CVE-2022-49168,0,0,d9c35e151a31859d9c8f6f551203a08963bad5b444e00c889f0dde6e0bc60aac,2025-02-27T19:15:42.200000 -CVE-2022-49169,0,0,6c04578eb133dcde00947e40c0b2e3a4ae094b987bc398491ec2e01b45d55bd8,2025-02-26T07:00:54.017000 +CVE-2022-49160,0,1,ddd1e15ce31f900a25e032ab3930ab340f0308eb8b5af5024264bad2b8c0b7c1,2025-02-26T07:00:53.190000 +CVE-2022-49161,0,1,69a2ba370fcdf9084f0a81f8356302412d9f7c4dae76be4ffb42cfd0f4b77307,2025-02-26T07:00:53.280000 +CVE-2022-49162,0,1,08aeefacec1f93ee6aa86144b0cda0fea1e5f04e75b5a518194b9ca1c51e117f,2025-02-26T07:00:53.373000 +CVE-2022-49163,0,1,b514a75e320cceb7ac770f894a75c8c403497ccf80b6ed3be4b8046f18f6c688,2025-02-26T07:00:53.473000 +CVE-2022-49164,0,1,a39d4b245fa01cf534838bf500645736fa8bcf4454d7e14fe505c96c81393114,2025-02-26T07:00:53.563000 +CVE-2022-49165,0,1,0655d9718d5c64668a03a720bfa6f84b4537de974abc89fb84067edbe148c074,2025-02-26T07:00:53.653000 +CVE-2022-49166,0,1,e9a949f54ee4112bcb1f85288ce5643787258acdc5d8154e1fe06ce15b3fe528,2025-02-26T07:00:53.743000 +CVE-2022-49167,0,1,728ab6e9e81825332514b6163f94a410a60abbf09dbb3dac5cc9717660cc7996,2025-02-26T07:00:53.837000 +CVE-2022-49168,0,1,905a17da12bbdc8efbe4ef0f32bf7ce041993def4f04724af913d77942edeae6,2025-02-27T19:15:42.200000 +CVE-2022-49169,0,1,b5c3127a64e2aad5492644899812cf7a7cb7ac098f742587ae1390c8c7552f05,2025-02-26T07:00:54.017000 CVE-2022-4917,0,0,632226f8b02c5f8d00ce4b404529b7905bf41638914202b70d798cef2843a50d,2024-11-21T07:36:14.493000 -CVE-2022-49170,0,0,0d71f1835ebed769ec401f2fb5cd109af1608c0282b3e06c8dbe21507b1b7690,2025-02-26T07:00:54.110000 -CVE-2022-49171,0,0,401a4663786d23ca14eb2238f16204759f5106f859f31e139b9d899ef2320e71,2025-02-26T07:00:54.213000 -CVE-2022-49172,0,0,46899dc37d61e080086fcf51a837cfadc15ab5afae0c8856a6167eeb99301b7e,2025-02-26T07:00:54.313000 -CVE-2022-49173,0,0,e238751b8af8539ac3577cd6aab01d31c698d1a7e8ae340dd47789b287ab3141,2025-02-26T07:00:54.407000 -CVE-2022-49174,0,0,a4e345c2f72cebbf2c0346d60946356aaf7838ea31c5cf5441929358a2d18829,2025-02-26T07:00:54.503000 -CVE-2022-49175,0,0,1fcd5ecd19b58ce201e7765c04716cba303c5f374796cabbcaa2462344c8e56a,2025-02-26T07:00:54.600000 -CVE-2022-49176,0,0,b81ae777d90c35f0314b51bc3f2474acf453da949102f5ef4fc6cf37b72344c2,2025-02-27T19:15:42.333000 -CVE-2022-49177,0,0,2e59217f98cae2fa2329fa7e21f15cefd7703931c64b6f4ad874ec5bee178342,2025-02-26T07:00:54.850000 -CVE-2022-49178,0,0,39bd88b645cbeb5ad48ed01b245cef32c8177cf399632a6a0021d367645d023f,2025-02-26T07:00:54.947000 -CVE-2022-49179,0,0,f809abe75024c89c1be081dc7b98f0457500eac5eef524ab67f4b1f5d8bcf446,2025-02-27T18:15:24.623000 +CVE-2022-49170,0,1,02e38944eace2c1c7d7560cd2ce1a8cdcf9c190023da844b5542e43e13b93218,2025-02-26T07:00:54.110000 +CVE-2022-49171,0,1,7b19172e64b47509c268bca1e89f2531883f87b1e1d99a1a5888311892b3d65b,2025-02-26T07:00:54.213000 +CVE-2022-49172,0,1,28f5a5a5c6031ae28d00bf2cfea9afa237774140a838d497fae92111f3414cb4,2025-02-26T07:00:54.313000 +CVE-2022-49173,0,1,5fc3f4e56cf4e52ec0407bffaa73f2a573c3ef47036d268f702dd074ca37c0b7,2025-02-26T07:00:54.407000 +CVE-2022-49174,0,1,54869273b759fc09873e4ea003c128380ee3aaa687da0a8c7c4f84f5eb7adeb6,2025-02-26T07:00:54.503000 +CVE-2022-49175,0,1,e194ef51c05df0b3f3e713099026805655f48faeed3a9dc83d762a8eb3eceaea,2025-02-26T07:00:54.600000 +CVE-2022-49176,0,1,09ef2f0e766c05d89e4699f20111a9cd667c6046e478b235ab4fcca2ae85e944,2025-02-27T19:15:42.333000 +CVE-2022-49177,0,1,aee991f8be523138a4a57842066afd101aac92c13fa816313629163aa4a94841,2025-02-26T07:00:54.850000 +CVE-2022-49178,0,1,09d02e39e46a89569521eff920d1a49f269981421454796d0289cc76522783b8,2025-02-26T07:00:54.947000 +CVE-2022-49179,0,1,b383c1d5265838f36c9e14d60bc58070e826c3f0fb1b648002f73b481561c528,2025-02-27T18:15:24.623000 CVE-2022-4918,0,0,c4f03a0a064390463bddfe1751a6538e5a2ff20b187ebaa73606b1a29097d2ab,2024-11-21T07:36:14.707000 -CVE-2022-49180,0,0,fd553303e08653bf133e223a7c533e3966a8e2a5e8a3f3b1caf0d5833967408b,2025-02-26T07:00:55.137000 +CVE-2022-49180,0,1,7588e5a70dbf40de85be8168b477c19992029c8482e02bed1ecdb6e420a7ccb2,2025-02-26T07:00:55.137000 CVE-2022-49181,0,0,8a4c3e6b9ca8dc4d9b8f15b356b1ef8d9d688badb48456bd7a0c47c0d7df2b88,2025-02-26T13:15:34.087000 CVE-2022-49182,0,0,883287071792b936302c7d47daae023b448598e117a22190aa402e63bc20fed2,2025-03-04T18:15:22.983000 -CVE-2022-49183,0,0,f8c53352b1fd47ee782723bb12ae6c3cf1c0cd537eba665131cd013a2c68de56,2025-02-26T07:00:55.427000 -CVE-2022-49184,0,0,5498f6de59582de3111a051889e69eed6c724077540b5b7fb7e8b696b6088c6c,2025-02-26T07:00:55.520000 -CVE-2022-49185,0,0,7ccf9d278019a34828ec6c364b91bca76db62defe14c95fee1843f641619636d,2025-02-26T07:00:55.607000 -CVE-2022-49186,0,0,667c4410f783e56f4ad67f027275d659c2686d28d9749c07fe9396bb91a5f909,2025-02-26T07:00:55.710000 -CVE-2022-49187,0,0,cf6f5cfd9c4cf8839fc11c2c7586fe145d9e39b126926874461d0ddfc761830d,2025-02-26T07:00:55.803000 -CVE-2022-49188,0,0,d5909c0cb5cea8609ed7d0ceb13e17ca1c6460e70e7efe54879f667805428a08,2025-02-26T07:00:55.897000 -CVE-2022-49189,0,0,1f223c90ea2090ac192af922b6369769a85e29b2905f9e1ac247bf2dad4fd97f,2025-02-26T07:00:55.990000 +CVE-2022-49183,0,1,870a96190bdfa088ba2eb70ba1f6c9284324e3ac785b43299856989061fa2731,2025-02-26T07:00:55.427000 +CVE-2022-49184,0,1,c32e36c79cd67851186bfe8050032522d86d61510a8095def76bcbf31798d112,2025-02-26T07:00:55.520000 +CVE-2022-49185,0,1,9f7c48f7e1f3241daed6ea5de3439e66438a70b3f89a4fd985407aa20f5e4e1b,2025-02-26T07:00:55.607000 +CVE-2022-49186,0,1,97b5e2d73f1d25419a5231e8fb16bcca7abb617305c370e1dbe06fa301396873,2025-02-26T07:00:55.710000 +CVE-2022-49187,0,1,ef5ad17e40b91104354d9a166aa1aa83081447875f05ce2fa517570ea220224a,2025-02-26T07:00:55.803000 +CVE-2022-49188,0,1,05eaaa0fbfec280a18d3a9263bd1d8d373df323af9da6ae0212951f63568884e,2025-02-26T07:00:55.897000 +CVE-2022-49189,0,1,6d21206609d284d9be89faf6badc9489928bab546ffb8dd9b914dfe044f1f19b,2025-02-26T07:00:55.990000 CVE-2022-4919,0,0,98cb93515b7aa4f8c3b1d5996b5569b16bc03402364c91cf633e9a3eefb9bd48,2024-11-21T07:36:14.903000 -CVE-2022-49190,0,0,42256d189e00ffb2b949e0ae87e1a2a6c58d64711621cb9e7150bd456278be2a,2025-02-26T07:00:56.090000 -CVE-2022-49191,0,0,428882c6b96806196b96d18f2027a1c632389bb38f78d1e30161c04876164a3b,2025-02-26T07:00:56.183000 -CVE-2022-49192,0,0,232d007c5973ec979d2064ddfc9f7f8fad4388ac5b241d3da39ed36e264e6ba1,2025-02-26T07:00:56.287000 -CVE-2022-49193,0,0,fcd9f06c4e7ea186f63178e22c84ab3b524fafeffdfbe20ddca2067c0296a2de,2025-02-26T07:00:56.383000 -CVE-2022-49194,0,0,2597ebb9d08da19d1ad95aa8673d9018b9529e2e6541e81ffed37bc1bcc751c6,2025-02-26T07:00:56.483000 -CVE-2022-49195,0,0,67b70760ade9b68f909e922fcac1d573e66925e4d731c7ac526b4c6a1644355a,2025-02-26T07:00:56.580000 +CVE-2022-49190,0,1,1bd7d8138969e8d023b5c528db7c26e5da188d096f955f0599811650c473ce4a,2025-02-26T07:00:56.090000 +CVE-2022-49191,0,1,5db8c34e08a9244164731b1be489e233dec1042715f9481ae6886d56397b831b,2025-02-26T07:00:56.183000 +CVE-2022-49192,0,1,c5cc15311110742b3423959e5ab8b3544ab5fef8f28ae5f9dcd69faea23b7a33,2025-02-26T07:00:56.287000 +CVE-2022-49193,0,1,6da02f2068a6fd8fd315443624adb972d9dea58ac5b58526b0b03159a82d2a09,2025-02-26T07:00:56.383000 +CVE-2022-49194,0,1,8fbe10a6a425f7b2d0bec76654063fb8989f5dccf3f862246c7db0d56d643fe4,2025-02-26T07:00:56.483000 +CVE-2022-49195,0,1,d16a24f4e2163bca5d38d28b34402e792bb2fce51306d991d7f0f087bb41536b,2025-02-26T07:00:56.580000 CVE-2022-49196,0,0,fea9ee81b9383a9695877d11e16f2099abc180a823bf9cb71581438e5696f2fb,2025-03-04T18:15:23.177000 -CVE-2022-49197,0,0,753e7429090ac7b3503114c8f3ad832359194131c3c881c0f853e6c2b26f8ac0,2025-02-26T07:00:56.770000 -CVE-2022-49198,0,0,39ad1fa40e3f5d1353ac484e1ae5f1fda3580cf943f4ce3bc8998be7569a6c47,2025-02-26T07:00:56.880000 -CVE-2022-49199,0,0,3a0cf9906d86cd5f9d045ed3812d2fdc2d09b3474c9c0fb9d1b366b764b20b39,2025-02-26T07:00:56.970000 +CVE-2022-49197,0,1,a856d6b5c565255df6726f904b8145d56826f628d3b499ae2ecbd2ac9f22b10f,2025-02-26T07:00:56.770000 +CVE-2022-49198,0,1,7ad2dce146837f424c2220192bcc20d4e5219672c8b6fe8ef03306d099eb65e7,2025-02-26T07:00:56.880000 +CVE-2022-49199,0,1,8cae6cfe82f17813337b88ee17bb74790d7df5d44ccbf22b7659cce61888bba5,2025-02-26T07:00:56.970000 CVE-2022-4920,0,0,6d91084fa28049e94d0212ded35971c929fba3ddd5aefbde0fa3ce59a47f5d1c,2024-11-21T07:36:15.140000 -CVE-2022-49200,0,0,2bbfa3c806d28658a401f7afaee563a102859e04953cd8f02224ed7e7e3c720e,2025-02-26T07:00:57.067000 -CVE-2022-49201,0,0,e5b38cd97b436cb6ea02421ef374a1c971a61639fe14c6f94b653c0f8340fe88,2025-02-26T07:00:57.160000 -CVE-2022-49202,0,0,a28c7d7ff92828513cb2fa0b37abc7385ff3b44fd3d4c4a977f800e599a84ec3,2025-02-26T07:00:57.260000 -CVE-2022-49203,0,0,536b74e6f9a7c76c21f9479f23af92c7404cc9124df31fb20d944127a80d9e51,2025-02-26T07:00:57.357000 -CVE-2022-49204,0,0,900eccaa427bdc3f15672ca55e42e9152ba1f90070291beeb9e3be508f789cc7,2025-02-26T07:00:57.480000 -CVE-2022-49205,0,0,c5fb0346b1a93b7d2c8553ef67c83b82e0d8233ee916ff7f6a61f09852b6f47b,2025-02-26T07:00:57.620000 -CVE-2022-49206,0,0,d54a61012985404263682dad8885a2e69004c9e55a2e74982f746d5c3448bcd6,2025-02-26T07:00:57.723000 -CVE-2022-49207,0,0,e5351d303ca5db4b006366dbbdb03108eb02a0fcf99fbd9b0df8af53b070537d,2025-02-26T07:00:57.817000 -CVE-2022-49208,0,0,928dc7701054f6c1532cb2eb5abfe613efa1d79a6805a37979607582ce3f3ae2,2025-02-26T07:00:57.910000 -CVE-2022-49209,0,0,70ed87eb4afd800a90822f052e52ea683827efd5f93ac4964695d07eb5b03221,2025-02-26T07:00:58.007000 +CVE-2022-49200,0,1,b7145d48d9b31a33fa88caead27fe123ef8165915097d5d0bfe6239fe6b8688c,2025-02-26T07:00:57.067000 +CVE-2022-49201,0,1,a3b37c517cb153e02a7178ea9b9d19e48f188168df361b526099b6612102000a,2025-02-26T07:00:57.160000 +CVE-2022-49202,0,1,e32c4cd1087a4c8ffbadb6fdbd6faf3bd63f0333eb0038fd4edfa049d237a82d,2025-02-26T07:00:57.260000 +CVE-2022-49203,0,1,54ffa9f9d7c16a07f8a3c242a5292a8d3400f3e4b37d70a606fda310e30ab5a3,2025-02-26T07:00:57.357000 +CVE-2022-49204,0,1,c67d3c569022038ea3e9a7fee3f53b25e31b55e9df154fead0c5b263179c18e3,2025-02-26T07:00:57.480000 +CVE-2022-49205,0,1,fb71f1ab9bcde1c6d1d1bbe21aaeef96cbfc437965a476ea7a0405a7f2ec0c6c,2025-02-26T07:00:57.620000 +CVE-2022-49206,0,1,1700aaa08a8bbaaea3c9fc61f2dc3d1ea04d8729ce86667703d3c20534411e03,2025-02-26T07:00:57.723000 +CVE-2022-49207,0,1,561dfd49864fd63c3e93342c5a8faf8a6ef95c1f9955691b2e768c1723a5fdc2,2025-02-26T07:00:57.817000 +CVE-2022-49208,0,1,31fc4256b99c94dfead77c44bf4566027452bc18f01cc5ca6c648dfb8470efd4,2025-02-26T07:00:57.910000 +CVE-2022-49209,0,1,60fc396f50a6866667d07e14b8fe22baeb68dfe2d1b392fe28753a078b427986,2025-02-26T07:00:58.007000 CVE-2022-4921,0,0,abb8970108be08849e8b46c4d5bb6d517f02615a1ad9856e3cef3142736ec36e,2024-11-21T07:36:15.330000 -CVE-2022-49210,0,0,65e4ff7195d45ab35e49fdfa0699fd81bf8062f674a04e47e0f2afe99937abd3,2025-02-26T07:00:58.107000 -CVE-2022-49211,0,0,4748b86d436f883dffc22003691c20b2301fd4427157c819e2e401b5866a82ce,2025-02-26T07:00:58.200000 -CVE-2022-49212,0,0,8cf29a488b514e5556cda4b5bb5432443dfa82117b9c5c11cfc08e727f529541,2025-02-26T07:00:58.293000 -CVE-2022-49213,0,0,24eb59af79e2b39c7212d9cd1f04510a5b52a48db9235ac9423b7c820ee894a9,2025-02-26T07:00:58.397000 -CVE-2022-49214,0,0,67d041541d411b5269c262ee5d5a9c03610b2fcd9594cee3728ee749c79cbba3,2025-02-26T07:00:58.490000 -CVE-2022-49215,0,0,fb3c1f057b74864452969fcd69635984d83226c5647f26fada5cc8465bc4c70d,2025-02-26T07:00:58.590000 -CVE-2022-49216,0,0,dac1495919e0d232f5a3507ac631ffba4ed79aca046577e8f14cbb73b8ccc307,2025-02-26T07:00:58.687000 -CVE-2022-49217,0,0,06a5ccb437deaa2683080d563e7e5a141225d0f8c51eaf09d70d4bcf06a79602,2025-02-26T07:00:58.787000 -CVE-2022-49218,0,0,7c5fcca9addcba41ca1987fc6a4e586243735d68e14882b0b12d375da56f9b2b,2025-02-26T07:00:58.890000 -CVE-2022-49219,0,0,4ed41767b0b60e3918b5fbfd7db6404da62696f8eff086d6cbe08cf846722996,2025-02-26T07:00:58.977000 +CVE-2022-49210,0,1,8c91e65edce4f372c24bf4ea3838489061b8d3607377115020725e8c2e992f71,2025-02-26T07:00:58.107000 +CVE-2022-49211,0,1,17c41a48296604a82d88f9c52e0d0902fa1e44f6de3aa1aef32287d816271d7d,2025-02-26T07:00:58.200000 +CVE-2022-49212,0,1,2e559268c076c3789515e39255e21e1cf293e7cb58366ed23dc210374ad5e1a2,2025-02-26T07:00:58.293000 +CVE-2022-49213,0,1,c1a1c5cf3f5be8c37271bd989ac75b2644cf8d72153b9a1b7af951c0676b7d54,2025-02-26T07:00:58.397000 +CVE-2022-49214,0,1,1fd7b7a4c4f4cfdd5b2336ab57575883e05b81a7e797d93abee1d5b5eb2a9001,2025-02-26T07:00:58.490000 +CVE-2022-49215,0,1,7334b8938fab577133b1a8f590256577c1c3f458a449f2c8e9a495ac731bfd1a,2025-02-26T07:00:58.590000 +CVE-2022-49216,0,1,c1c84449535a886c5cf51f1d508633ad48e5a117abe2d8df56bcd0a5a64133e8,2025-02-26T07:00:58.687000 +CVE-2022-49217,0,1,3fafc1f3740f31a3e33ceccfbc11ed5cac8b9a4e90bfd5a0e3ec4d856bdfcb1d,2025-02-26T07:00:58.787000 +CVE-2022-49218,0,1,515a020a27360c62521e7779bc4e1bf3dbfe2ba08a2a9b138d0df81e148318f9,2025-02-26T07:00:58.890000 +CVE-2022-49219,0,1,580ba9f75ddc7b94bd799685f8de2d25b81da5099e83b19a25804f0b66ca3e59,2025-02-26T07:00:58.977000 CVE-2022-4922,0,0,845ac042dcd4b5ec74159a973e2efc3ff642abc4a48ec290dcd8ade6154e85ef,2024-11-21T07:36:15.513000 -CVE-2022-49220,0,0,b8dd4fc410f667a5e93c795ac13776fa96621bdbd48575151bc9c4093ce09012,2025-02-26T07:00:59.070000 -CVE-2022-49221,0,0,ecf696f524fd49f4f78744ca25f53e10e1345b0f535dd32d83a90455bb9ba3fe,2025-02-26T07:00:59.167000 -CVE-2022-49222,0,0,ac19828a267ffbf4a7fca78cee4071b3e12f04cbc36a970efadf4051ddeb523c,2025-02-26T07:00:59.260000 -CVE-2022-49223,0,0,34ede652672e7aacbd318245aaa1cb6152a68de63882e902faf9e671d2f97d13,2025-02-27T19:15:42.473000 -CVE-2022-49224,0,0,a4d692978c3b518c523049d3c59f0199772c89c29f0a3dfc9fbcac070d42c3d1,2025-02-26T07:00:59.457000 -CVE-2022-49225,0,0,50f16797fcebe1c818ed997d8c855c33398779ff21349c03fa5184351e3e1f9b,2025-02-26T07:00:59.563000 -CVE-2022-49226,0,0,4655964d1c05476db8c5e8affea6f464493613f5efa73669677602306affd880,2025-02-26T07:00:59.650000 -CVE-2022-49227,0,0,e55aa3f9a7747027ae031f5e9df43f8fa6cfa47ff13c4fa8764757f7d951ce30,2025-02-26T07:00:59.747000 -CVE-2022-49228,0,0,7fcd138e361cf80918e615a42e72eb3e37242c1ceaa00a200b3e4f3e4675fcb5,2025-02-26T07:00:59.840000 -CVE-2022-49229,0,0,21f9278f13864d8965f2d934f99adb220b27950c8e707cb08e544fe3445df4ce,2025-02-26T07:00:59.943000 +CVE-2022-49220,0,1,88165699fae73b6a3da1d78aa3c50cf1c52f7a1ae5e11459d80fdb98f6c93f82,2025-02-26T07:00:59.070000 +CVE-2022-49221,0,1,1f5e0f498e4ac4e10a5060b31c194dcbfa45221b80a62fda8812f4ea5d5be0c4,2025-02-26T07:00:59.167000 +CVE-2022-49222,0,1,0285758520dc11c8bf1e234cca1543eced4ec0f14b382628cf2d20007112c17f,2025-02-26T07:00:59.260000 +CVE-2022-49223,0,1,4d7a4a94ce3f1479d17f615bc9d73ed9d5fa019820d95eb36c0bb37a5e892d39,2025-02-27T19:15:42.473000 +CVE-2022-49224,0,1,d712078c0a7c024b544195752145e84a31d2e1dcb41b32f1cbdc45507676658d,2025-02-26T07:00:59.457000 +CVE-2022-49225,0,1,51feb559dee5358bba52f2af1f7a290ac0282164e4bffed4b4a7645b0daf97c9,2025-02-26T07:00:59.563000 +CVE-2022-49226,0,1,cf0a71052eda333aeabcc4ec842bdbebce73b6970ab06a15f035253d92584385,2025-02-26T07:00:59.650000 +CVE-2022-49227,0,1,8997d726839f2d1ef56103bec67b0d40ebbc8b4c42fc385f013fcd46b9216e05,2025-02-26T07:00:59.747000 +CVE-2022-49228,0,1,6ee75e48e0de59ecb55e13a30cc9192916a6844d951ac87a4596396e737c2827,2025-02-26T07:00:59.840000 +CVE-2022-49229,0,1,9d956a60b7a30bfb6484b355f4da2e305fd49c54e674eedb3def2a6818757cd6,2025-02-26T07:00:59.943000 CVE-2022-4923,0,0,41664ac8b2df2573b9f33a9b7990a9913a2c441bb6eccf7450f8a6f553a54573,2024-11-21T07:36:15.623000 -CVE-2022-49230,0,0,5d41c50031938ee227c929ba16ed41a877448b447f5583397fda2b8154ae180a,2025-02-26T07:01:00.037000 -CVE-2022-49231,0,0,4c4f03384b569b44c7633a2419b3b3a8315ab1c8ac0186f3d47b8e99f60f587b,2025-02-26T07:01:00.130000 -CVE-2022-49232,0,0,4d29fe82f65192ecdde81e6dbe4e887731b0bc863e5381b8cc56538841c361ae,2025-02-26T07:01:00.217000 -CVE-2022-49233,0,0,f87758e05af46b23346819bcf8eceb816fe14c973482cb90fe639e6ffe26cfb2,2025-02-26T07:01:00.317000 -CVE-2022-49234,0,0,d0ff62d0edb7dee352a3575bb9fa753d3dfcacc3fc62052d9e69cad78ba29e1b,2025-02-26T07:01:00.407000 -CVE-2022-49235,0,0,23fdc01023fe49fb644b09bf3096818dd1c562363b1b4a6f85d3d69a27eafd59,2025-02-26T07:01:00.500000 -CVE-2022-49236,0,0,7facede7f3cc9382323172663b797b2b8ef6a9542596f6a1e9cf3acfb6fddc29,2025-02-27T18:15:24.803000 -CVE-2022-49237,0,0,1fb424acb903e4f709b63b7eefee6d4976d0f81fe6578189e1a4416ef52f84b6,2025-02-26T07:01:00.700000 -CVE-2022-49238,0,0,5e5b8445d7f3df1a9c9b91c4af5e2ffbf6eea2659115c2c3d750b73c2511038f,2025-02-27T19:15:42.610000 -CVE-2022-49239,0,0,34c1d4332ec9c8f9a9a1e708b0f3c0edd8caea530940611f9ca49f1a83de524d,2025-02-26T07:01:00.887000 +CVE-2022-49230,0,1,2841f872c21698a6ba868bdeeb2002945f8d40f164807d0813f9e64b22dff66a,2025-02-26T07:01:00.037000 +CVE-2022-49231,0,1,e0d658818382986cc9d4eeae67e75204e79cf83edc5e464a5fe092f915c6b0b2,2025-02-26T07:01:00.130000 +CVE-2022-49232,0,1,176b81f9b7fee311991b08da7b80d3d8bd5b71eb46543fcd6fe93678ddd12376,2025-02-26T07:01:00.217000 +CVE-2022-49233,0,1,4e11768e814920db62265129f89a3bd21fe1c60d998d8e2373ad2de6d56fb26f,2025-02-26T07:01:00.317000 +CVE-2022-49234,0,1,e7a182f5d1698fd791aad9c170df973e0ebad3984b6507ef619a7d2b4d04b42b,2025-02-26T07:01:00.407000 +CVE-2022-49235,0,1,0dd7a8b83e74ba4b4a61b77433b16031121219a436b4fdae96691012ae8797ca,2025-02-26T07:01:00.500000 +CVE-2022-49236,0,1,f5796beefedea654847809046849165e9ce63a42d8f4393a85d1470594d7b6ee,2025-02-27T18:15:24.803000 +CVE-2022-49237,0,1,77f54b0e4a33faf8ec28f4115929621b05e879fd836912fdce263019e85a315f,2025-02-26T07:01:00.700000 +CVE-2022-49238,0,1,0ebfc3d3a1acf7a52e2c7f7f92fb614ea9fb35f824ab6e88c1c07a2c42b347f5,2025-02-27T19:15:42.610000 +CVE-2022-49239,0,1,f75d26905bc913ac5211f5e021b2b5086d1bfe74858c6a9c98e08c3f490e7004,2025-02-26T07:01:00.887000 CVE-2022-4924,0,0,478cd65cc39d1a4a12365dd984816c2000e169260e72489e81fdf56aab2bfb16,2024-11-21T07:36:15.747000 -CVE-2022-49240,0,0,e8688dd6765be71b6ca1323bef9887fcdef062f955ac73cee04f1cb4207611fc,2025-02-26T07:01:00.977000 -CVE-2022-49241,0,0,c319bef57422467e2ec96735d6ce51f470e6abc081715bbeb7fa874615bebfaa,2025-02-26T07:01:01.063000 -CVE-2022-49242,0,0,abbf8608d679521e716208f8d96995a7b1c1b26e2666dd786c7a3764a7fa71ba,2025-02-26T07:01:01.153000 -CVE-2022-49243,0,0,2fad38ac440534490df8743bb5d272189abf6321c44a4b7fc86ed58c803a7d13,2025-02-26T07:01:01.250000 -CVE-2022-49244,0,0,1797cc6d948eb73f867d3dadb11396309d0171ad44ec196953f9208786bc073a,2025-02-26T07:01:01.350000 -CVE-2022-49245,0,0,c5d60bfb3e442e3598d84416289a27932bbae899cbc951c513e469cfbafa49ff,2025-02-26T07:01:01.450000 -CVE-2022-49246,0,0,6b991b2db57b28a19ebbd6de3b8378311adc69c97dbdbce8df29e69c7f5ae6ab,2025-02-26T07:01:01.537000 -CVE-2022-49247,0,0,86462c2839e98227b6018408e33f5ac40e7846d91893f26274f81b617e782da3,2025-02-26T07:01:01.623000 -CVE-2022-49248,0,0,ec7c7546da08ab7f2dccebddc94743b949948a4d49bf9541fa2dfb9c9d615eec,2025-02-26T07:01:01.727000 -CVE-2022-49249,0,0,c97436fde65d4792b87b2f5f5f4d56ba2f8c9d0bbdcb5bdb371e741a29a6c4fe,2025-02-26T07:01:01.830000 +CVE-2022-49240,0,1,a29a86eeddf8c5d0b46af8a7d4542caf86a45013c43f83d870a41b5cf71ad150,2025-02-26T07:01:00.977000 +CVE-2022-49241,0,1,a94457731b6d422c768675fb8bcb8de11f378302ff82f31a446d1b82394444fe,2025-02-26T07:01:01.063000 +CVE-2022-49242,0,1,4b5bec73c809bc1f574aba1bb8da01055b0811b031ce53a96f2f3284796f95fd,2025-02-26T07:01:01.153000 +CVE-2022-49243,0,1,812791425bcc5320de69a6e6c83d050988807e67fbf2cb453bc28c1587c6cb38,2025-02-26T07:01:01.250000 +CVE-2022-49244,0,1,fd618acbf8f6690b682ea1c2f158b0a6575233221c101691fbcfb64f817293c3,2025-02-26T07:01:01.350000 +CVE-2022-49245,0,1,0ee8cd4bac35d48ba0e22cf1ea867af860c0634be6f3709c2c64bd0b4e1238c9,2025-02-26T07:01:01.450000 +CVE-2022-49246,0,1,9c38f58d1e677705f7fab0fb4923956bee4b99714f2a57b8a4f0b4fd455f6c19,2025-02-26T07:01:01.537000 +CVE-2022-49247,0,1,b624b5994f0de5c5d1031c4f1c6b2fca6387dd5bec211ba493ee00fe76c13d98,2025-02-26T07:01:01.623000 +CVE-2022-49248,0,1,855263d4ea5abdf7eb6aac8edc43b8350c17060e9081a1486f966af3e9fce72d,2025-02-26T07:01:01.727000 +CVE-2022-49249,0,1,7d0438957c9d6127262333d2e559f79b20a0def638c9e98a53786e67af37e402,2025-02-26T07:01:01.830000 CVE-2022-4925,0,0,883abcc543d22f24dfb5afedfff08048c863049c7000143c7e9a88ee1850b7f3,2024-11-21T07:36:15.857000 -CVE-2022-49250,0,0,cd5fa4cc5f20de802034b7b0eecaae68c99b30f10e24e3d40a2defe03381aab1,2025-02-26T07:01:01.920000 -CVE-2022-49251,0,0,f995bb19278b977183f07c563678664592d494b9902b8d3529b68fb7a9c18c08,2025-02-26T07:01:02.013000 -CVE-2022-49252,0,0,b3505ea8375e4b39447a02c0b486651c8e872de7ed34f666c749bb18a71619ba,2025-02-26T07:01:02.103000 -CVE-2022-49253,0,0,05a153c42e060cfad47d23746cea6cca16eaeee48abf3b659f5e0cdd21ecdecb,2025-02-26T07:01:02.200000 -CVE-2022-49254,0,0,537dfd147e1beafccbbe94ef7844b8b93b806fab90817772309e91972366f9a6,2025-02-26T07:01:02.300000 -CVE-2022-49255,0,0,083c097f8f35560a8ca99e6c986bd0df29bfdf638a5e0a12b0623105f5ad66a8,2025-02-26T07:01:02.397000 -CVE-2022-49256,0,0,6c9a8f927eff9213b2707e94b28db36fc49661914b193b842847742ac31a6ffd,2025-02-26T07:01:02.497000 -CVE-2022-49257,0,0,f15d3d2c0d3d03e66aa151f7c91086ca33ac81e69ae43b8014169ac07aba11de,2025-02-26T07:01:02.597000 -CVE-2022-49258,0,0,91cc71872aea2edb4cf47b42ab3f172b7e9ddff87c12cd8045dd779c00269ffa,2025-02-27T18:15:24.983000 -CVE-2022-49259,0,0,642c9da9739fe6197cf62e01550652b5f00d9864cf7f3054346657bc814e6143,2025-02-26T07:01:02.850000 +CVE-2022-49250,0,1,9f15ad918c1ddfe72b832ca97e65590b2c00b2d5e4fe4e1c4f3494feefdd1ff6,2025-02-26T07:01:01.920000 +CVE-2022-49251,0,1,594baeb51050a97c0782b67d1de67d66645b646ddbb303e462d97153007160ce,2025-02-26T07:01:02.013000 +CVE-2022-49252,0,1,627b7d9b68839c233b90d096128ca49f01dc53dd60c0b92ebcda29cc1ac99497,2025-02-26T07:01:02.103000 +CVE-2022-49253,0,1,cb65a8c9757382c6c7c8cd8b189c8b355726cc095aa6351f3f2fc4b2912f7a47,2025-02-26T07:01:02.200000 +CVE-2022-49254,0,1,93fd8946f17d60dba255fc7f379285abd1761869bea5cac54d5ece69b991a1b8,2025-02-26T07:01:02.300000 +CVE-2022-49255,0,1,0f7936cfeddc38a482487350059d9fc7f5ddcd3c51837470e33dedaa0e8923dc,2025-02-26T07:01:02.397000 +CVE-2022-49256,0,1,db7154b8a85634c267a5be820d6b18282b1db1a345647b45bcc4f14b17a8d7e5,2025-02-26T07:01:02.497000 +CVE-2022-49257,0,1,c63fb4af7e8d7a28abc56994fb1a500b7ced408f36c791d217056c4bd632d9d5,2025-02-26T07:01:02.597000 +CVE-2022-49258,0,1,a702f09b5bbb280f704daab898c3774e5366165f760955bb4c3480bf7f8496f3,2025-02-27T18:15:24.983000 +CVE-2022-49259,0,1,f9fcea300c7aaf5013eb4461aa3f68b250a1879d7e8c3e9769299b3404965819,2025-02-26T07:01:02.850000 CVE-2022-4926,0,0,97f811d640cb5b71af561412ae9269e091dd51730c3d06da7203d649f9e5797b,2024-11-21T07:36:15.960000 -CVE-2022-49260,0,0,105148ba3bd4a4b1339a7cb8997d257c68930fff3cd99ea6662391bb6aa266e0,2025-02-26T07:01:02.967000 -CVE-2022-49261,0,0,030308329738ca3ecea91945fb733cb82ed1639f5aa3e4bdbe9c3cfd9979bdcd,2025-02-26T07:01:03.057000 -CVE-2022-49262,0,0,a601e2516e9923c44499b1e4b2a009ef93e9bd1b7979ff5556bb932f5e653ab2,2025-02-26T07:01:03.153000 -CVE-2022-49263,0,0,82329ec73d4827c531d595e99cab9c93384bf4c6dabfc0d063d63335ab3a24e9,2025-02-26T07:01:03.243000 -CVE-2022-49264,0,0,7e94dfb650612b3fe5b79e8868c13782707161ca0fc94fbe64bd0dfc6453e50a,2025-02-26T07:01:03.337000 -CVE-2022-49265,0,0,d17b2fefe790b434eda33c2ca11738c512af22621735579674cb594d2309b8db,2025-02-26T07:01:03.437000 -CVE-2022-49266,0,0,f852e4936a13e7a3f22948ae24ce876f7b0353ca068e98ac026b7247a5b0fe97,2025-02-26T07:01:03.527000 -CVE-2022-49267,0,0,9a0994705cd3e43ef0b112a6016ee3582b7262015643be322c163fe308c452f3,2025-02-26T07:01:03.620000 -CVE-2022-49268,0,0,da096703422862a2f86e77ebe131307b0f2bb94df3c779ef152d096e7175f7bf,2025-02-26T07:01:03.710000 -CVE-2022-49269,0,0,23d07cb43ea866c6b2162994373bd00e723ba49e1fc4f3b49a4ac5369334463c,2025-02-26T07:01:03.813000 +CVE-2022-49260,0,1,14c4dfceaeea6452dd8f976cb9fe5be1a2ff8c4c55390d98f330a9aea4960cc3,2025-02-26T07:01:02.967000 +CVE-2022-49261,0,1,b2a5224ad763c5daa7dd3f160f0c04baafb923b73d9a298b418a4f6068f04035,2025-02-26T07:01:03.057000 +CVE-2022-49262,0,1,cf8ac6a1e6724b02ad4eda8dc1648b477bbf398a39232c4191aea09fa60a4c2a,2025-02-26T07:01:03.153000 +CVE-2022-49263,0,1,4150485add94abc8819ad5ee5c419c6325f2ba1592979769fdfb35e0f6e2f9d8,2025-02-26T07:01:03.243000 +CVE-2022-49264,0,1,a1336603935e61f26c7ffbc70da6cd12b4c62a5bf9f34b036b5420d30c5ef2b8,2025-02-26T07:01:03.337000 +CVE-2022-49265,0,1,079bc0991ee90c34553262deb560d4313468fcb346f883af915459f06bba4bab,2025-02-26T07:01:03.437000 +CVE-2022-49266,0,1,6fce4d67945f4153f2793cb732d700b69afeadbcf502edaa3140da05bb98f4f9,2025-02-26T07:01:03.527000 +CVE-2022-49267,0,1,3a4bf4e9fbd802967190fb9725857105c90b6376e6f1fe76b98b62762943f2ce,2025-02-26T07:01:03.620000 +CVE-2022-49268,0,1,57570c025d9e3b04cc76aa608f421e35e25920715f03cce36fcf79a23514fa5f,2025-02-26T07:01:03.710000 +CVE-2022-49269,0,1,62d62dfb99c6e9109af2dff80cd612484136bbad8890a0b0c8e0dd271fa3c6d4,2025-02-26T07:01:03.813000 CVE-2022-4927,0,0,38cabefc86faa21ef7a71fd3b17ce17fef5bf62f0a9bf16de2aec372df1e9418,2024-11-21T07:36:16.143000 -CVE-2022-49270,0,0,8b75d34bc23946c6623e2fcd545316d78ba94c34f208ea96d1a1e7b816eb6243,2025-02-27T19:15:42.757000 -CVE-2022-49271,0,0,5145c273b897ee14b5804578d6e18152dece157f29871f62a6dd96935ee75da6,2025-02-26T07:01:04 -CVE-2022-49272,0,0,0156f88ce8df73f0c2db70893af230069eb9cadf3220d92ec2ab7d1960f864e1,2025-02-26T07:01:04.097000 -CVE-2022-49273,0,0,c2e118b7c24de13e599e1f2cdb24f879f758e8adfd6e61cb1b7736918fe9ad40,2025-02-26T07:01:04.190000 -CVE-2022-49274,0,0,c79889ef5ea39b0927c0120a06849e008c9bea7f9988bbd89134df912f527698,2025-02-26T07:01:04.280000 +CVE-2022-49270,0,1,288bda4b9cb1446fba9c146ae501b051f598150fe1299adccba5ca171abfd241,2025-02-27T19:15:42.757000 +CVE-2022-49271,0,1,1f8e1b0fe3f01130f736aca9a2a9f2ed2865517403bdc4b7f9ff9c036d9cd42a,2025-02-26T07:01:04 +CVE-2022-49272,0,1,151e203229ab139eb318b81978b09105f741454ff0dd3d97aec672d68b695245,2025-02-26T07:01:04.097000 +CVE-2022-49273,0,1,df759d427d4e6ff5873183b3a7062dc9e0efb2c135e170ac49ec6d411a13b377,2025-02-26T07:01:04.190000 +CVE-2022-49274,0,1,9ec33cc59e99a91b61b867d2cefe88ce024f8725163a88ad07bf9e9c94e7c4e2,2025-02-26T07:01:04.280000 CVE-2022-49275,0,0,8237c164fae950391ee554fa669f82ddb70248843715c5c4bd185fa576bd08c1,2025-03-04T18:15:23.383000 -CVE-2022-49276,0,0,e3c6fde16cc3d9c90db3a0a2e4638a8a4f03c67b7b06202e4d7dd19795df5c35,2025-02-26T07:01:04.470000 -CVE-2022-49277,0,0,8085b16635c57e27c2bdc3f0f64d0ff93ab427839d779c4f4d856843061c6d37,2025-02-26T07:01:04.567000 -CVE-2022-49278,0,0,9fb36fb1aa810994731cef6f92c562e1cc42167b3eea65e0837a1007a791ae09,2025-02-26T07:01:04.660000 -CVE-2022-49279,0,0,81aed3e927ae0ecca0e851ab360c8921ee2cbbfff34ef82e4211f2d41db22576,2025-02-26T07:01:04.750000 +CVE-2022-49276,0,1,c4317cfcd9a815f66880de04db91439d70254f9ffc36d7c44aa0118e0460f6c8,2025-02-26T07:01:04.470000 +CVE-2022-49277,0,1,111c5b4e4d37e8db44e2dc8305a4d46361733d8aa31c2eae8aadd5fa88561bea,2025-02-26T07:01:04.567000 +CVE-2022-49278,0,1,af52dc7d43fb9781db25d217d1748af441e05a6dfb58604baaf82adf7ba57075,2025-02-26T07:01:04.660000 +CVE-2022-49279,0,1,4a64a2f4ef64d467cdd657f388bf4fc3d7ddc4cd4cd56aaa2cf28b5cf22ba846,2025-02-26T07:01:04.750000 CVE-2022-4928,0,0,55113902c03503fa1ab1a487ca9bd5c82e2b7a386b6bdc538a9776f2c4eb50bb,2024-11-21T07:36:16.280000 -CVE-2022-49280,0,0,70da97716c777316d12ab5b92295770cfac0141332e3c6d882b5c078badc6704,2025-02-26T07:01:04.840000 -CVE-2022-49281,0,0,f0edca6846bc1f34284c5ff38f2a57e2f6de7154ed8b999baee19fee52703051,2025-02-26T07:01:04.967000 -CVE-2022-49282,0,0,2c372d2341c366fb3de677643e468345bfd3bdecd78052431bf2d6c194858cf6,2025-02-26T07:01:05.073000 -CVE-2022-49283,0,0,3f71364e52f8c3166b9a43d68dcb33941d2c331baf1c96477cda30d3efbe4e81,2025-02-26T07:01:05.167000 -CVE-2022-49284,0,0,de63ff7a339f8e9a3b60bda34e8ff4f8281a399809de0c6b28347ff4e3992737,2025-02-26T07:01:05.260000 -CVE-2022-49285,0,0,0d1fc08bf27e62f7929f0a7ec13199eafd86fa3c9cc3850ef88e065aa5164870,2025-02-26T07:01:05.360000 -CVE-2022-49286,0,0,04137e4f84032e520f31f8f802407239fd050323902bb10a4bfbb9364ab36aed,2025-02-26T07:01:05.453000 -CVE-2022-49287,0,0,3086a7ddaab1158ace5345f53e6d3709439d1b5b75f5d8b01343c4b205f88655,2025-02-27T19:15:42.893000 -CVE-2022-49288,0,0,9cecf00c55d569961b07cc12f960bc72e36f91e3f188ab145ac04a3493906706,2025-02-27T18:15:25.140000 -CVE-2022-49289,0,0,d016a9081a20ebbc684cf447a47ac2adcc67c313ba5454062ba183efb3007438,2025-02-26T07:01:05.757000 +CVE-2022-49280,0,1,60bb9fad4a4a2cd0f95b601ac3e1fb3663f694ad5c472d1a706e06f9d0f6cbf6,2025-02-26T07:01:04.840000 +CVE-2022-49281,0,1,2cde64f5cb08bca1d94db2cc4970cb2cedc3af811d83c91f70d951918da98c90,2025-02-26T07:01:04.967000 +CVE-2022-49282,0,1,eae6cca505b2399599b6db9dccc94dabfd395be626f1c626e9d08b0ac9072ef1,2025-02-26T07:01:05.073000 +CVE-2022-49283,0,1,029d72c4a6cb1e2c30de3d3092e336a9ffe1acb90f14d5d1a41dc808b9f105ce,2025-02-26T07:01:05.167000 +CVE-2022-49284,0,1,d026e3f01d581dce80aa6fa20b429c7f6878fe9dfa2e3e65d6c68f9dbd0ac6e9,2025-02-26T07:01:05.260000 +CVE-2022-49285,0,1,5922ad9a420d14b1337f226fc2f070cdeb4f856c19c80013063c6550efed7799,2025-02-26T07:01:05.360000 +CVE-2022-49286,0,1,2c63027f649efb87b11001287f2f4f5f5d125eb58e2063f34c6dbd910e413e32,2025-02-26T07:01:05.453000 +CVE-2022-49287,0,1,ddbd9d60f03894c12854292cd1101a840c5364d83097d6d264a4c76e0e5f1b59,2025-02-27T19:15:42.893000 +CVE-2022-49288,0,1,35f81ad6278d73cc4f1615f35a7b7f1945bbd8c634a57fcdea9f574090a57d2e,2025-02-27T18:15:25.140000 +CVE-2022-49289,0,1,0500a720e0e52021b7174ee90f803145babeda7efe950ae97ad3a5272fb1f9e1,2025-02-26T07:01:05.757000 CVE-2022-4929,0,0,44429f972431c9add0abbd71f7b863649b7649f353d704d77271ec361956d7aa,2024-11-21T07:36:16.417000 -CVE-2022-49290,0,0,1223dea5324391bf24c702aae88af8a5e8ee3a82e4a4fc2424e8c93c82a865e8,2025-02-26T07:01:05.853000 -CVE-2022-49291,0,0,aae502db4f801ed53665ec228f9f6d711addac458f2ee1a6193236d4c0c4b278,2025-02-27T18:15:25.323000 -CVE-2022-49292,0,0,76c362b4609981aaeb2004f58cbe4e8372c52a463bb4eb4490c9b84c88c75f8f,2025-02-26T07:01:06.047000 -CVE-2022-49293,0,0,55fe888feeac7e586b673a8937eb6872e9487e62626f79addb8a09b7720486e7,2025-02-26T07:01:06.140000 -CVE-2022-49294,0,0,46ac8d5c7fa10ff7907ff5fee33bbb9dfada330b7e984f3c4c6db3981241c925,2025-02-26T07:01:06.237000 -CVE-2022-49295,0,0,cc1afcf779b4e6214d60c38503aa9384e0204ece87c29627f0bf9e48c39d1ca8,2025-02-26T07:01:06.333000 -CVE-2022-49296,0,0,8fa3342ab15c7f52fac7c5739802ff8d14d6b059df8279a379dcb362b805497e,2025-02-26T07:01:06.433000 -CVE-2022-49297,0,0,dc9adacdfac3b68c809058976508cf135b1ad37ea96caf0380d33e4356769f18,2025-02-26T07:01:06.527000 -CVE-2022-49298,0,0,eb2531dfbcbfa2b087d57a157816b93a3e410aec4b0a49e5c893d660e9050be2,2025-02-26T07:01:06.630000 -CVE-2022-49299,0,0,ea3a72fa50b3daa42a622a14a0718d8e196d99d234f34de101244009fd496143,2025-02-26T07:01:06.727000 +CVE-2022-49290,0,1,58514a42c251f31b220bf80d9fd071ab2263f87d800418bb2fdb09818309b5ec,2025-02-26T07:01:05.853000 +CVE-2022-49291,0,1,ebd30a9f57341fc454add3783a037c79840564a4918fe7b7d64ec41c524bf2c6,2025-02-27T18:15:25.323000 +CVE-2022-49292,0,1,da31cd76534e44b212e4c35fe66b3a5c707bbfce6f55562f1d81273028ba74ec,2025-02-26T07:01:06.047000 +CVE-2022-49293,0,1,c871046027f6fb106bd0ca30ceae4d566888e6a43410eccaa04f8b4c07ec0c8a,2025-02-26T07:01:06.140000 +CVE-2022-49294,0,1,fa9a2616e3b5b2c3e9593229c6110d258d8a2758dbd9cc7ee667f63c6b6d7fa9,2025-02-26T07:01:06.237000 +CVE-2022-49295,0,1,380456ec8ed75bee76e717e7750599dc72462df32c61aadc774662fc21c6721f,2025-02-26T07:01:06.333000 +CVE-2022-49296,0,1,ec572c25a8e7ef5ebb5a08b08bcb48938c3fb818f04b625dd1bd4645d4359b6a,2025-02-26T07:01:06.433000 +CVE-2022-49297,0,1,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000 +CVE-2022-49298,0,1,851b5aa1fd0fddfb5eb61f96e9f8096e384a4e7d34b0dfaaa58625947d029025,2025-02-26T07:01:06.630000 +CVE-2022-49299,0,1,1ab2245d227943f7f512538fa06856d48795a396e6479aba24a11b1f8c0c83d8,2025-02-26T07:01:06.727000 CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000 -CVE-2022-49300,0,0,b19335841e80ab3a287b48c15fe82059cb82b4a738b235ad0127832bbdec09e4,2025-02-26T07:01:06.830000 -CVE-2022-49301,0,0,93ee51e8fa4de07cee72d75b2e2957c52a0349d2812da876e9b1d603fd5c4aa3,2025-02-26T07:01:06.923000 -CVE-2022-49302,0,0,da6ac3058bbfcefe7951422c3ed5fe83cb79b1531e476ea93a7a0c450df0574e,2025-02-26T07:01:07.027000 -CVE-2022-49303,0,0,19dab2a70a2ce6ae0cc916094ceed632399007c4e481a719c6c65017a2446697,2025-02-26T07:01:07.123000 -CVE-2022-49304,0,0,53478d9c73581e86325c984843ce7d0534ba9f1de9ed94d473e281a68af3063a,2025-02-26T07:01:07.213000 -CVE-2022-49305,0,0,169835a02f04ea0c4d4f408884af7f347c74264e353063b2590cb153f715c238,2025-02-26T07:01:07.310000 -CVE-2022-49306,0,0,acd2cb1caf1a3685be5bda4cc2ac16324a30884b28c7d1342f4ea0c8202d166d,2025-02-26T07:01:07.413000 -CVE-2022-49307,0,0,3a153767383005d855ed21103ee64996d71b579f4295198f48d631926c9599f5,2025-02-26T07:01:07.503000 -CVE-2022-49308,0,0,374fc93b0eb9b0598c65d622c8cb4d6e602413a9c6e1120489e0796f9232b2d1,2025-02-26T07:01:07.607000 -CVE-2022-49309,0,0,d6f32930bf8c893c9e56f300eddd9dba43b591d62eee3378fe401daf6cb0dac0,2025-02-26T07:01:07.700000 +CVE-2022-49300,0,1,5ff24caeb4f9047b46fc35c02eec5c6a447128e511949c6b1a98f67635fac7dd,2025-02-26T07:01:06.830000 +CVE-2022-49301,0,1,3d112d4f467242fcc0497c0d534e493e065f8bf531bb48159d1e114a75e8a5b1,2025-02-26T07:01:06.923000 +CVE-2022-49302,0,1,9fc15673982ae8af6ba255985804dce9c27685c7e7467f194bd2b4535c1afdc7,2025-02-26T07:01:07.027000 +CVE-2022-49303,0,1,2858cb6c09d6ac7805e97c4b49761979af1eeac0b1c1a280f93ce2ffd679d7cb,2025-02-26T07:01:07.123000 +CVE-2022-49304,0,1,9b51ad694a8b7adb43e5643457467003beaef47439663ba63cdefe997ebd45a1,2025-02-26T07:01:07.213000 +CVE-2022-49305,0,1,f3b03156733f0e0dc19e134e0680aee76841a6b9a000210099eb5f7f57f7028e,2025-02-26T07:01:07.310000 +CVE-2022-49306,0,1,baac3cf22b414b88b5c20a86bcea700edb3e4893a35e5066f690a543cfa6c5e1,2025-02-26T07:01:07.413000 +CVE-2022-49307,0,1,07ccf5cfb1857d3b213da741de4db06081f87dacf16c513505eeab44c6a2b877,2025-02-26T07:01:07.503000 +CVE-2022-49308,0,1,dc3d076ffa84dcbfa2890e99ae0f259f2be16c54a8b6e9a226cb82df100ad443,2025-02-26T07:01:07.607000 +CVE-2022-49309,0,1,e0f14531f47de3ca9395b99894e061aee2a0bda95ae13462098931b9ea1f5cf8,2025-02-26T07:01:07.700000 CVE-2022-4931,0,0,a532fe15470676bd43e3e554e3755fa6ea4f32eaed39a0989b1e4aa5acb9c67c,2024-11-21T07:36:16.680000 -CVE-2022-49310,0,0,5cc366142bed8ad94d9b122f0b751b6f23cd73b4137dbf9a1568b983bb858857,2025-02-26T07:01:07.793000 -CVE-2022-49311,0,0,6d18fcf2880bf00a813b39f03496472143fdde40c6e9daae87ffd387754b9eb3,2025-02-26T07:01:07.887000 -CVE-2022-49312,0,0,313e676ae50b4c0738641b112b4b77e590ea8cdba597a65d173845a76bd4a5b3,2025-02-26T07:01:07.997000 -CVE-2022-49313,0,0,4dfbb2bdde6e357a10cade5ad8c9be95e657eb129560b42d07ec254771718fcb,2025-02-26T07:01:08.143000 -CVE-2022-49314,0,0,9f01a2daf5b809716833b01cc1843ba69a69e17029ee6cb4d851ca3faada6413,2025-02-26T07:01:08.270000 -CVE-2022-49315,0,0,0942c0c83198d86a639946fc1c3678b7841314202cfe4810afa63d4b788d8fae,2025-02-26T07:01:08.373000 -CVE-2022-49316,0,0,dc76f60ace80801b54efd99b4fce134138e907bfedf3c680a5d6af31a540ca04,2025-02-26T07:01:08.470000 -CVE-2022-49317,0,0,fe9e849f4156a5845101bb3c77523ff51c47c570ffbc724c4d130f69458fd24d,2025-02-26T07:01:08.567000 -CVE-2022-49318,0,0,616d28b5cdb2c3ce0160faa1679dc4cdb7c588f8b115bd0f8d17750df6e1afc1,2025-02-26T07:01:08.660000 -CVE-2022-49319,0,0,2b097f33bfb7999d30338329dc0b2edcbcc857a20f194c6483bcaa6e16be6e1d,2025-02-26T07:01:08.750000 +CVE-2022-49310,0,1,be996b3371da24f9c74e88cdab78177d60f74d7f205c32c677dd35439057bccc,2025-02-26T07:01:07.793000 +CVE-2022-49311,0,1,083fd8117533388caf8b2b21db4f6de0119b305fbc98820f6dce3cb95d224568,2025-02-26T07:01:07.887000 +CVE-2022-49312,0,1,736628d204e97e50a135d0dcb4298d9e1c64154ae3e43d7cd253eb644599a60c,2025-02-26T07:01:07.997000 +CVE-2022-49313,0,1,96a9ff9b40d6cfb30dce33649b2b0f9c9e28289af09918f91fab964529332b86,2025-02-26T07:01:08.143000 +CVE-2022-49314,0,1,1acbfc59cdbc5e0d07406ec534e6af329435b1dd173965856c8bf82c4fee90ac,2025-02-26T07:01:08.270000 +CVE-2022-49315,0,1,c9323d5e8da5ffd76059afaf88bcc07c2875d02519fe0609a9ff6ff20da1a117,2025-02-26T07:01:08.373000 +CVE-2022-49316,0,1,f241f5d2825c502c30a70536a462ca6d587944abac670206b7d70b9cf8644189,2025-02-26T07:01:08.470000 +CVE-2022-49317,0,1,9bd630deffae0783e7df1fb2f6129d1d02b73badae48b6e7ca881c20a3d3d036,2025-02-26T07:01:08.567000 +CVE-2022-49318,0,1,e7d272a7a59caef367bc5392116e97ae19eaf71c574393ab020909c03333cc4c,2025-02-26T07:01:08.660000 +CVE-2022-49319,0,1,88bf225e5d6fbbe72ee2d10b3fa1d933f915146f2bd3d98dab1b1d4df37e08b5,2025-02-26T07:01:08.750000 CVE-2022-4932,0,0,38277e45881755a1bc9fb65d6b419499ee923a7cdcbdaea771e44bb51f547438,2024-11-21T07:36:16.787000 -CVE-2022-49320,0,0,a3985a90e44e5c9d2b08027083eac324f0ef6cc095355dc96ef0b7b17fc976f0,2025-02-26T07:01:08.840000 -CVE-2022-49321,0,0,0cd21f700d925f3295bb9e4084e0c80cc61d0744dfb142154ce967a5aa8d231b,2025-02-26T07:01:08.933000 -CVE-2022-49322,0,0,f681ac7ffd3519e6d5c7341a6d5ccce59343e11c2cdb272341a221c1aede7e1a,2025-02-26T07:01:09.030000 -CVE-2022-49323,0,0,9623982a715f72f22bb37cadd01c1cf22317bfec148e5a9e791b31a63788f68f,2025-02-26T07:01:09.130000 -CVE-2022-49324,0,0,609e08f11707ab3e9378522957a8eb5d17ea4e15407985425465f42db3e52442,2025-02-26T07:01:09.223000 -CVE-2022-49325,0,0,9aea9b7d3d6e15d01e6c11b6fa63003c17c62a453d4de04ddf5ae433dca53749,2025-02-26T07:01:09.323000 -CVE-2022-49326,0,0,6d1756db507112f05697d1d5ff77bba132077f61831ab9d35855ddb7e90aea8b,2025-02-26T07:01:09.417000 -CVE-2022-49327,0,0,11a5aed283874975f17ee612c5a2ed47940273fcd5d41b203d6d55679f4e0fba,2025-02-26T07:01:09.510000 -CVE-2022-49328,0,0,8490153f767e354854cd114b39dfd66ee73d88c6c03e783164bc6c5ef916ab0c,2025-02-27T19:15:43.047000 -CVE-2022-49329,0,0,2b1b231f49a3e1fcb93aedd8a8f37a8d1181da2e287e393cd821fbaa0b953261,2025-02-26T07:01:09.703000 +CVE-2022-49320,0,1,33bde134630cfc099524044c4cd60e1dea70026c5fb8a4d348c31af2c73e3dc8,2025-02-26T07:01:08.840000 +CVE-2022-49321,0,1,4e9f6b7f340cc4cdf2a31de917b64b28ea48c719092a5b9a1aaa99f751ac8645,2025-02-26T07:01:08.933000 +CVE-2022-49322,0,1,8472ed46f20f119b0ee22963b4bc90256d8275b6ea69bc4720c88388123a50b9,2025-02-26T07:01:09.030000 +CVE-2022-49323,0,1,cac8ac551be34b9ee874c35d9d546cfabd734012d399cccdfbfbbfa3ccc4162f,2025-02-26T07:01:09.130000 +CVE-2022-49324,0,1,ef5798c491d05bcd923d75077018801a918f27b014c2f065f2307ac078945b11,2025-02-26T07:01:09.223000 +CVE-2022-49325,0,1,8e4448ade57ef3d4e97c2054783a8008b327325c8e5dda9360ef1442a07ec18b,2025-02-26T07:01:09.323000 +CVE-2022-49326,0,1,8514d4c65453c8ded6a167d933d967718109a39825e5a3bcebd0f2541c1fc0a0,2025-02-26T07:01:09.417000 +CVE-2022-49327,0,1,507205e4d65be07ddcf3583c18a3699299a46fb15bb5a922d337b5402f38d00d,2025-02-26T07:01:09.510000 +CVE-2022-49328,0,1,0b884a9365ff164cfd637f6e7abaaca9211d1f831a96249d4b729886ee7ef4ad,2025-02-27T19:15:43.047000 +CVE-2022-49329,0,1,7e639ced7e7a6d0ab258a57a3e712f3593fbb4b6e6516f3b27163bc852e0b550,2025-02-26T07:01:09.703000 CVE-2022-4933,0,0,d122e5bd0202c57480b45e5b80ba8ba9aee30fe0686b6e4b51d4527b501848e9,2024-11-21T07:36:16.890000 -CVE-2022-49330,0,0,1b51ef3bb53a4f7347d7318391c5513dc18094dcfd95859f231f4c87ec1041a0,2025-02-26T07:01:09.797000 -CVE-2022-49331,0,0,5014a262e6b1fba78c6112eba2b034c0a3d564d18de920112df4820c5a4e527b,2025-02-26T07:01:09.900000 -CVE-2022-49332,0,0,0f160b799e3796b26da82e68dc4a399ec1f849b999c18b89ce3e9a83c30fb05d,2025-02-26T07:01:09.997000 -CVE-2022-49333,0,0,6bc8d56893d96036668e1fc35f866528971474def5acb5c7955be674395e1414,2025-02-26T07:01:10.090000 -CVE-2022-49334,0,0,ef1080126cdb89902fcda82258d2e08217d38d09a92ea02318c6cd651ac36b09,2025-02-26T07:01:10.180000 -CVE-2022-49335,0,0,c50bd348414790ba59443f5d558f4bb9d815568caf278c144f8a192c31f46941,2025-02-26T07:01:10.270000 -CVE-2022-49336,0,0,41ad321208e66da154990c9f4899ec4a5f31a634f9318dbd5d3bb9048c5264a4,2025-02-26T07:01:10.370000 -CVE-2022-49337,0,0,73e12bd629aa50c4cc2134d04c780f2420458a9260de182dca1304db3c7b9b22,2025-02-26T07:01:10.457000 -CVE-2022-49338,0,0,85ffe9938a373fbcd8219c47e78015d84e7efa6cfa9ca67dcda102c103097312,2025-02-26T07:01:10.560000 -CVE-2022-49339,0,0,289976352495e520d0ddf64d6a840dd9eef090813ae4fccf7cb9336d356de0be,2025-02-26T07:01:10.657000 +CVE-2022-49330,0,1,59ed85d19e597f4fe4f9eac55e31319f3cd9e3a68fd47b2cb1f6ebbef79ef06b,2025-02-26T07:01:09.797000 +CVE-2022-49331,0,1,94dbf8d33a29e7871623467603918823979c6ead029e95cc63aa7cf4c594a785,2025-02-26T07:01:09.900000 +CVE-2022-49332,0,1,d7329ffb5ec2df4961633317fd9d1c173ede89945758945061e442c36d748113,2025-02-26T07:01:09.997000 +CVE-2022-49333,0,1,87078385d39973b4120d5cafc6bb25568a078495fed65c66be34d5555b7d7dd7,2025-02-26T07:01:10.090000 +CVE-2022-49334,0,1,893920e4f11fb43110066de1f2455c9f56e1d8fb0c5b269eade665d389f4cf31,2025-02-26T07:01:10.180000 +CVE-2022-49335,0,1,414e538cf09d506ba900c85d5f51cc5c21089486510c33843c7de0a89a18e2d0,2025-02-26T07:01:10.270000 +CVE-2022-49336,0,1,95cf031653d3e23c756400663e97a36923c3d638e4a33b8a654d956b85447123,2025-02-26T07:01:10.370000 +CVE-2022-49337,0,1,6fd5282bd0df6c8514075897fdeb8a36866b6bf502bc9cd9a428956939e16f68,2025-02-26T07:01:10.457000 +CVE-2022-49338,0,1,0f78030b666a1e9a926686fa1e522fa918ed1098a80989e00b881db0f537a919,2025-02-26T07:01:10.560000 +CVE-2022-49339,0,1,34ec0636cbab33513923a7fe7cc899a2742e8ad25c683659245043d35d3eb792,2025-02-26T07:01:10.657000 CVE-2022-4934,0,0,56ce5ce2e2af34c46b4bc4a41f82652c91d66b92f181e703a04356d294695edf,2025-02-11T15:15:15.590000 -CVE-2022-49340,0,0,beb9663ae72475827ed4c2296c587fddf1b226d63926e26e324edd21dd5b5636,2025-02-26T07:01:10.753000 -CVE-2022-49341,0,0,328b74a69544eb6c8eb0621911fdc7e3d3a6cd6dae4f2da5e81304b04d000b06,2025-02-26T07:01:10.857000 -CVE-2022-49342,0,0,af86c5f9689cc0f1805628ce17ed853d15b750e145061f0c59e82375993d01ee,2025-02-26T07:01:10.953000 -CVE-2022-49343,0,0,db7096025985739ed600320681a439f6cdab970484201d5e5b33b57f93df1b84,2025-02-26T07:01:11.040000 -CVE-2022-49344,0,0,9abcabfe3cc0bfb27c0b17b504b7f148e333485fcb3aeddb942c31c5809eade1,2025-02-26T07:01:11.140000 -CVE-2022-49345,0,0,7303690f57f65a564ad7e67d6eaf95f208650905cbbc04d92ce7869741c01b91,2025-02-26T07:01:11.237000 -CVE-2022-49346,0,0,c12a52f037c105a9dc26bd75cfff8e776e3c1b537dac98cf444fa27e1eb50a16,2025-02-26T07:01:11.340000 -CVE-2022-49347,0,0,ebbc71fa1530e2b037d60bd8ba20cdac9fb8e6e5bfdbaf7d1a9726b5af69ca83,2025-02-26T07:01:11.433000 -CVE-2022-49348,0,0,06cbba15446a0b6a0b0f91dbe65f59583f88055b232621d3f8415742de5a37a8,2025-02-26T07:01:11.533000 -CVE-2022-49349,0,0,c473173fef70e76d33e08e7836ca02257276b380d3c8061f796f80c1fc0b5b90,2025-02-27T19:15:43.190000 +CVE-2022-49340,0,1,c90db6d99a01210831cbc231978736b2166eda4e759d06bb192fd6e777487a40,2025-02-26T07:01:10.753000 +CVE-2022-49341,0,1,67f1564f60af02b44a20481bcbbf84409aff294b24daab3aa48cc08e1d336c1b,2025-02-26T07:01:10.857000 +CVE-2022-49342,0,1,e7f2b08bc192b0ed0005fb38eddf4d2d17fb51f85b262f5f4ed5d6faa0c0c5e9,2025-02-26T07:01:10.953000 +CVE-2022-49343,0,1,5c70fbee4a7bf8c0c50f24633a1fba9535b73a0a4d51f84461a387cb2825f514,2025-02-26T07:01:11.040000 +CVE-2022-49344,0,1,a1303ddb944136c02405e64e83b54561a71f43a493ab1f885e9bb93a22b9955a,2025-02-26T07:01:11.140000 +CVE-2022-49345,0,1,d6a577d50be897ab4cc326d2cedced55a6d0fc9e52a8bad6d8abdd58aacf287d,2025-02-26T07:01:11.237000 +CVE-2022-49346,0,1,88f198e253ee0cb63c00727cc1eca4fbf50a0981e7033514e1dc6f27a78d4d0a,2025-02-26T07:01:11.340000 +CVE-2022-49347,0,1,875f447f25fe0b22da262ad577f87160659c778e431e53313746017d81dc0ba5,2025-02-26T07:01:11.433000 +CVE-2022-49348,0,1,6c2cb9b9c185d7e6582ef01658d9e891cd3a6d7fa7a7ce81fa9f0fda7b37d7dc,2025-02-26T07:01:11.533000 +CVE-2022-49349,0,1,7356245cc392f31a71ae00206847e8a8422cda887b7d8f94ab3a5783f58460e2,2025-02-27T19:15:43.190000 CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000 -CVE-2022-49350,0,0,d8335f25b4fd2b16f0714a8ed0b8d48dd10b95ff58e0bef49c376f0c4e05be0a,2025-02-26T07:01:11.723000 -CVE-2022-49351,0,0,5704bca415d4e1f5442db64f62a40f98d9550b6301053fec9f1bb4b7a84048db,2025-02-26T07:01:11.823000 -CVE-2022-49352,0,0,3a29993de589544553d966365871e02253235324b859d5f468e15c0e917460d1,2025-02-26T07:01:11.920000 -CVE-2022-49353,0,0,cea1d4fba7a3acb037d726e6cef65e062bcaacb7e8533b4a3511a09bac4d5d1f,2025-02-26T07:01:12.013000 -CVE-2022-49354,0,0,835c220621ae68e74f764f8fcadfa589dfc20ffd83772986d2ca70d21f39087f,2025-02-26T07:01:12.103000 +CVE-2022-49350,0,1,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000 +CVE-2022-49351,0,1,4eeeeeae654c20056896eb2e71d7e4730ecc4073202cdfbf3de859230d859c83,2025-02-26T07:01:11.823000 +CVE-2022-49352,0,1,9a85d620d7b8dd9928721b30c4d4e2b4685cf494c863d70f759767330dbda81d,2025-02-26T07:01:11.920000 +CVE-2022-49353,0,1,dd6d4b6d2e77d8d6214c171f01672e490a0e42393b3e6dc3bbd63145fbda7265,2025-02-26T07:01:12.013000 +CVE-2022-49354,0,1,6d45ff60d2e7ebdd6c366f3c160891a2d7ee445f8201f2f83ed84a4e29463bd1,2025-02-26T07:01:12.103000 CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000 -CVE-2022-49356,0,0,945ec97fd584be20b4ed5790ca1d0aa5f5996077aed8ca6a62e6588f103fc4da,2025-02-26T07:01:12.300000 -CVE-2022-49357,0,0,42df7f14e16ead2e40fa62b91de274f4732e4d05eb08b50a347ec406bf3ab2c6,2025-02-26T07:01:12.390000 -CVE-2022-49358,0,0,0ee56f48e97b3dacea157676ccfcc724818f2a89497e9f0b5a8a13088ebacf84,2025-02-26T07:01:12.487000 -CVE-2022-49359,0,0,bfcbe8484d3769dda387b0ab0a3082d8d3d84d3c30a4fb62e2ad9463e2f47485,2025-02-27T19:15:43.347000 +CVE-2022-49356,0,1,69a79f3405e3fcc6bbe03cb0dc1ec5148dce71753a0254d1854098f2f95da1aa,2025-02-26T07:01:12.300000 +CVE-2022-49357,0,1,4c05a89d1fb039be9907925130b399696bea0bfb8e04a1ad5943d062299034dc,2025-02-26T07:01:12.390000 +CVE-2022-49358,0,1,eb2bedc766be807bfe5e1d6137513f8a69c144d5c49d62f43ffcff34ddbd61a8,2025-02-26T07:01:12.487000 +CVE-2022-49359,0,1,0d8334382c1c3bff2efe1945a030f087f109397856ef1244e0c380f0c42736e6,2025-02-27T19:15:43.347000 CVE-2022-4936,0,0,65f80b05cad36259fef0938d250fce71f92bdab50ccfcffc0c93e77961d09f04,2024-11-21T07:36:17.243000 -CVE-2022-49360,0,0,1c100dcbf3516aef06e426f51117b0fe457758a8effa92247958173ea3269158,2025-02-26T07:01:12.677000 -CVE-2022-49361,0,0,2ed83040271eb692a2d075bebee2a00991d820f3e43aaa6c795723fafe2cc183,2025-02-26T07:01:12.770000 -CVE-2022-49362,0,0,729e0ec1f0b81ba47126d7a9568f200c00148f13bd044819c782e6e8b2c31868,2025-02-27T19:15:43.487000 -CVE-2022-49363,0,0,2b63d91ed47107b260175291a6193ff692e4bd89370f2db6826b3b44be88d9ef,2025-02-26T07:01:12.953000 -CVE-2022-49364,0,0,4dbffd4bfcfd7903fafc9c1fc9c759370dacce5e2894c228b06efd72de97e379,2025-02-26T07:01:13.043000 -CVE-2022-49365,0,0,9ad1455a7baee2488d8a31601f6a92c1eb7820889a55169479d76b0c1d0c56d9,2025-02-26T07:01:13.140000 -CVE-2022-49366,0,0,00056a2df6ad2e7d1ce6cf3ca416026157f623b2d9c0b1ff54b0650b99bba73f,2025-02-26T07:01:13.230000 -CVE-2022-49367,0,0,58d591d688aec911a9b591e8a7ac6c66625268f214ead504f7bca4497b7c31bb,2025-02-26T07:01:13.353000 -CVE-2022-49368,0,0,151f14035ed30f85e866fc0cf0039e0167fef8f5a9eff1fb18c648ee0322264b,2025-02-26T07:01:13.483000 -CVE-2022-49369,0,0,7e30d23e6f5641399e7ecc562b13dd7346be3478dd38346bdeb3d3101787678d,2025-02-26T07:01:13.583000 +CVE-2022-49360,0,1,58f3ba0214b9f1a09e065f063c4fa146ef93da07e466a19b24783e6e58458bc1,2025-02-26T07:01:12.677000 +CVE-2022-49361,0,1,6de22060ff6180a654b5816dec787b12181feaacec850414380b3679a1d56061,2025-02-26T07:01:12.770000 +CVE-2022-49362,0,1,2cc67e9d3c99766ee48708af702c3b1329f3903828ec9d6717b690c765f83c25,2025-02-27T19:15:43.487000 +CVE-2022-49363,0,1,6e8694933c5611870046e45012eae7390bb9b1b83cdcdd51716ace57dc279e0c,2025-02-26T07:01:12.953000 +CVE-2022-49364,0,1,2f69d299a1a99a96a5ca8c2029234e8effb0c54e7032f7150bbcbf55f1987595,2025-02-26T07:01:13.043000 +CVE-2022-49365,0,1,ae9e7f1df27dd9fc9e90d460df483cde08179a492f7f8c57ac9c36296597844b,2025-02-26T07:01:13.140000 +CVE-2022-49366,0,1,369a892c3b761a4a238ee84a4c88bf9f5d0bf486b0fbb94b38401323ea237f2c,2025-02-26T07:01:13.230000 +CVE-2022-49367,0,1,1609963ffc5ff40e2c18f86682d5cabfb50a665393f3b531c6c43fa8ba205dea,2025-02-26T07:01:13.353000 +CVE-2022-49368,0,1,0122bb803341d6a7f7d46b5d1e819350d623ffcbed2972453c21b8f919f60ca9,2025-02-26T07:01:13.483000 +CVE-2022-49369,0,1,03c8cf71ea92e26c3e764f4521dc8e0ee29f56f6fd8e7d6d0e416705b2af88d4,2025-02-26T07:01:13.583000 CVE-2022-4937,0,0,07302c80f5a7c2979805d71a80cb3053942460da65e6d67dc85b7bf9334a2383,2024-11-21T07:36:17.353000 -CVE-2022-49370,0,0,c4ab026061b114dbc3fac0f2126ec2479f8e190ef38e805441d2660c8d809bb8,2025-02-26T07:01:13.677000 -CVE-2022-49371,0,0,443cf94a36764948b1b95bae6d8b4c5d86dc445130ad1c89cf3d16a14c6cc7d5,2025-02-26T07:01:13.777000 -CVE-2022-49372,0,0,2bec0397b43f45c7286c4f6ad948a8b9418a2483b2f6a63b0f9a45d0431bb1fd,2025-02-26T07:01:13.870000 -CVE-2022-49373,0,0,cf5ccea58c72be624696fbd7bbe21863d2a7fc7865fe9574564a8596bc20176f,2025-02-26T07:01:13.970000 -CVE-2022-49374,0,0,f0daf881c3d1882bd5e6ba429fd7a94ddbc8bcc3e8f980467f977d13c6611d5e,2025-02-26T07:01:14.060000 -CVE-2022-49375,0,0,75a60d3837f1b2f91b4434896d29a4b02a0dd7a29740a950d25656231ac212fc,2025-02-26T07:01:14.160000 -CVE-2022-49376,0,0,6f6a748358393768c186d17a6997a2be3e635a42edae79b2bc0bfbf299e21577,2025-02-26T07:01:14.260000 -CVE-2022-49377,0,0,be7d665e4399bd4107f1c54252e574c6b240411710d1279ca6df4e8b9cb980a7,2025-02-27T19:15:43.623000 -CVE-2022-49378,0,0,a32ed2308c63854e266ffcb5d732f91d756c26e41f569da8ac89ef94248a9cf5,2025-02-26T07:01:14.450000 -CVE-2022-49379,0,0,8f6c62cf611a02d9cb8b0edf93d3727d4a52ca370cc7aa56559c838e5b0a277f,2025-02-26T07:01:14.543000 +CVE-2022-49370,0,1,4ea90ddd0a51b00d889dabe45c3b59d1cc2affb4d59cc04cd9f1f14155093c53,2025-02-26T07:01:13.677000 +CVE-2022-49371,0,1,debc53b1057c13c98abf1bd2e6f3b1a40dacab64472f9b84e9f28130a7f8ba82,2025-02-26T07:01:13.777000 +CVE-2022-49372,0,1,7da91234c72ad69adb7f1c55eb45ddcbd51ed0bde4ed89f4f202f5fbefef0946,2025-02-26T07:01:13.870000 +CVE-2022-49373,0,1,3780b5825b2c9176f6cfa89b6402171904943aef708e2b37dfe5af7da429183a,2025-02-26T07:01:13.970000 +CVE-2022-49374,0,1,83fd5580fe21671cdeaad9ecb908ab41681d8f3e18388382f539095e40ea9f90,2025-02-26T07:01:14.060000 +CVE-2022-49375,0,1,d2548a9f7254b6861c8567c1a796b6c7429066a4af2de305fe0e13ed88bead95,2025-02-26T07:01:14.160000 +CVE-2022-49376,0,1,0ad74252a5e7fb081b421fe396c463aece1d37b3b75cd50b7080eed00cd2ce03,2025-02-26T07:01:14.260000 +CVE-2022-49377,0,1,2d20654476ca3dc123226883ce090bcb3b63bab01cfb717ba2ef5d7a0503cdb2,2025-02-27T19:15:43.623000 +CVE-2022-49378,0,1,1aa04c73a795153edcbb7db52c7df062b7a4f83333b34714dfe5271a1684cdef,2025-02-26T07:01:14.450000 +CVE-2022-49379,0,1,1f36875562cd4c8261746a84975fe6f41f22ec67d40acc751f5f2fbb072dc364,2025-02-26T07:01:14.543000 CVE-2022-4938,0,0,2332c28f2266da2838561d3fa8517b8e02799844e68fbf6d1d4046cef0e62add,2024-11-21T07:36:17.473000 -CVE-2022-49380,0,0,06140ec674ec380928473e9ced19dd499f33997d8ea8c66a0bbf9ce881d9216b,2025-02-26T07:01:14.633000 -CVE-2022-49381,0,0,e80b20c2b70e1d4bfde6746655c7be1a0ffad7ffe08dda8ea339011343ea9ca1,2025-02-26T07:01:14.727000 -CVE-2022-49382,0,0,bf82d02106456f75cba291b7a6b25b2ac0b38a8a6fefb310c3508015d8959ae9,2025-02-26T07:01:14.823000 -CVE-2022-49383,0,0,31ebb6febf7e8fa95cdf3df0fba2bcbb4434aae04f3a7d7a52ae076f9869ab95,2025-02-26T07:01:14.917000 -CVE-2022-49384,0,0,5cbbbfcf4cc45f187e92330cced7657eeb069ae836cc3a75bb52d1cdb73c33f6,2025-02-26T07:01:15.007000 -CVE-2022-49385,0,0,990a983590144f382d9dbc1eac7aeca983844e8745777b179849862f63b370f1,2025-02-27T18:15:25.503000 -CVE-2022-49386,0,0,6f941f7ab4d4d85905c42beafb5ae15af7ed96bb2ba65acc2cc56221a266e38e,2025-02-26T07:01:15.233000 -CVE-2022-49387,0,0,8b6b1df55402fda76b7b86f605ad09a4149072e270a6ac14400f8c571dd4023c,2025-02-26T07:01:15.343000 -CVE-2022-49388,0,0,ba2021c04b525bf2efd134ca4726f99aa9e92ab0f9c6c108d02003d1bbfa5371,2025-02-27T18:15:25.670000 -CVE-2022-49389,0,0,be9f9d79b10dcc5e23eb9cf3fd50079b0da5db549d3980f574193e01c4c8ede3,2025-02-26T07:01:15.527000 +CVE-2022-49380,0,1,414f725861f611f40d4ac99f30415ebe25a770f59b11307213e96a8b0537670c,2025-02-26T07:01:14.633000 +CVE-2022-49381,0,1,72b2275412f5e3302b54542ff3ff83acdf6493917c312a5d99fef9710ae33717,2025-02-26T07:01:14.727000 +CVE-2022-49382,0,1,a6a26eecab20f4e36cc52b3d2ca9ffa63cc0e211679b2edf84a4d82d86eb6ed7,2025-02-26T07:01:14.823000 +CVE-2022-49383,0,1,9335dc06cf7cc2f7be35120f1a7cd7fd49bad8b59bd4f8fb43c8dc15aebc4d00,2025-02-26T07:01:14.917000 +CVE-2022-49384,0,1,4ddea2fb81eb6cb7de6e1baf1d2dd2f42ff61f3b8f06edbc98e503565c0c27ae,2025-02-26T07:01:15.007000 +CVE-2022-49385,0,1,9bdb0fb04c08912d734299e2eff20e94832bc744bcfa69873b66dd598018de10,2025-02-27T18:15:25.503000 +CVE-2022-49386,0,1,2f0ee3296b202941a8871de54fad7cf75a70ef695b900674c51f259523906474,2025-02-26T07:01:15.233000 +CVE-2022-49387,0,1,d7275715539f49a21b5e2f331cbda3931d276a387ec21fec6daa002977db5e19,2025-02-26T07:01:15.343000 +CVE-2022-49388,0,1,556a95b3579f2fd4da4413b5b89bffe4750ead0c095a07eafb7f31e7910208c3,2025-02-27T18:15:25.670000 +CVE-2022-49389,0,1,f4ad182411d1e42871b2a12b90a0ae97c6fc8115524b31ec6579a449e92c7be1,2025-02-26T07:01:15.527000 CVE-2022-4939,0,0,0cba4e037d925063e40978b79f96a48c7a5c9c275420fe2dbac9dff13a084ba3,2024-11-21T07:36:17.580000 -CVE-2022-49390,0,0,835d822ff1c24c24a48e2fa161dd8dce9b71b835305ac92cb720fba446ddc4ef,2025-02-27T18:15:25.843000 -CVE-2022-49391,0,0,c763e5ef64b9f817b1431e4ac0096c32f217c6d308969d4a05d0908b2d2b50a4,2025-02-26T07:01:15.713000 -CVE-2022-49392,0,0,2f33dcd098126c92f1b193734653368880cc46737791c0eaa52929952a4a6072,2025-02-26T07:01:15.803000 -CVE-2022-49393,0,0,4a6bc3f4460bb0e7358ab25054346df33a3f1f165fd3d8eaf493f7cbfdd91e78,2025-02-26T07:01:15.890000 -CVE-2022-49394,0,0,851e0b32c05b20b32c8944bdee81a554a8ab3d1c249ac1bcf85cf825220f1a0b,2025-02-26T07:01:15.983000 -CVE-2022-49395,0,0,276afdeaa7027d4d8904d65bf72ad363a2892ebddd4c76b2cd37b1e416622457,2025-02-26T07:01:16.080000 -CVE-2022-49396,0,0,c3febf6911825ce2fa969cb044a55f71bb6d9a45ae4af339e2d1fe20841e27b3,2025-02-26T07:01:16.173000 -CVE-2022-49397,0,0,4633ade59efceae66deaa4531eb6064bbcc5c17ba27e8aa1ba7cb9d78bda24a8,2025-02-26T07:01:16.270000 -CVE-2022-49398,0,0,79a91fbc73a787aa0f802a3337b9b9f8ed6adddb4f45ab98cd32809651bde4ee,2025-02-26T07:01:16.377000 -CVE-2022-49399,0,0,69a617c3495a90850f890fe02cada4d4fba63585f83365230770c3e33607a132,2025-02-26T07:01:16.470000 +CVE-2022-49390,0,1,84cc7e0f7b30604c954d488e38d629cdb8db7dedff6833bc98e94774f9f12c8d,2025-02-27T18:15:25.843000 +CVE-2022-49391,0,1,9b35f53261bb8a2db2c987049b5cd98789e961beccce772f7188d21fdd099795,2025-02-26T07:01:15.713000 +CVE-2022-49392,0,1,96e3812f166d3d90d947396f435396226d0c38e19ae7cc6c26dc5d8466a78ee9,2025-02-26T07:01:15.803000 +CVE-2022-49393,0,1,e43a79bf37c48f2aca3ee6b39664f16c4b39bb71f77da85e0a93d3333c94dea8,2025-02-26T07:01:15.890000 +CVE-2022-49394,0,1,ebef65bddf1b012d9967c07974373fa1f5f452d45e504aa0c9f54a2392c30c91,2025-02-26T07:01:15.983000 +CVE-2022-49395,0,1,2720aa7f99134c302258af1633cf576fc87172ccba98a0e0ab21c6789d414f94,2025-02-26T07:01:16.080000 +CVE-2022-49396,0,1,5e182f736a60a81ec99be2eaa5816049d8f9c1bd95bf350f76132a2607740bec,2025-02-26T07:01:16.173000 +CVE-2022-49397,0,1,ba5b58f08aca723c8ad6a3a331408c9f30ecd2117a92ff4d2850e553073356d5,2025-02-26T07:01:16.270000 +CVE-2022-49398,0,1,69b98cd2de26aec87261bdf9bb20f354f83ba2d90a2dec42c415e922006854bc,2025-02-26T07:01:16.377000 +CVE-2022-49399,0,1,e676d1099cdf826e353bf92ce76e5b799f8f7150af0d6742ceb1dddc397d6568,2025-02-26T07:01:16.470000 CVE-2022-4940,0,0,71a9143220b531c495a5a6c3a808eef2946ae15ed7f044ebeeb7369c9a995c72,2024-11-21T07:36:17.693000 -CVE-2022-49400,0,0,dc514473467e59d9d5fafa903d04fc83fe7555669d8602f79946ed80c868bf72,2025-02-26T07:01:16.570000 -CVE-2022-49401,0,0,99f1eb56243adb46cf784dc3231ad2641a8d31279ce218eace625042977f72aa,2025-02-26T07:01:16.660000 -CVE-2022-49402,0,0,eaa96c646470f67ae1ff4bda4fec805bb6eed3bce90657dac95d53109bd579ae,2025-02-26T07:01:16.750000 -CVE-2022-49403,0,0,b3df94c85ae6daeff762e91bf8d9cf029a0b8c43997df11e584add96903af43b,2025-02-26T07:01:16.847000 -CVE-2022-49404,0,0,b6c6e6b809f897850d1e49e7fa929b7a4463b02cc0afc7dbb49e6da35782c945,2025-02-26T07:01:16.937000 -CVE-2022-49405,0,0,b85a88ee13f000dce5808bdc6e481f656805c08c40e44cfa6f66bd15f0a4b1cb,2025-02-26T07:01:17.037000 -CVE-2022-49406,0,0,1be6fd21ff28e15618b70a35365876f710e53098de9300bbf497e4b6a8076378,2025-02-26T07:01:17.123000 -CVE-2022-49407,0,0,a3d52a1cf5be84c25339d021c499b662260f566fc8c62e31834210b794f78465,2025-02-26T07:01:17.217000 -CVE-2022-49408,0,0,3f630e9961e9428352bd3400eb6b1c17b9026d6a4d39ffd25b029cded3415d45,2025-02-26T07:01:17.323000 -CVE-2022-49409,0,0,1403f9424e749837e3589b93ec7654cdec1cc3dbdd6e5cfd051eb019c27cbf77,2025-02-26T07:01:17.420000 +CVE-2022-49400,0,1,7918f024dc0a9c25b9ad9a69def0474924f1ab2962a7adc4cded0bfc9cd63944,2025-02-26T07:01:16.570000 +CVE-2022-49401,0,1,54d8f5d17dfaf0aabf150041073347f47e61010b0e65e35a334be1684351aede,2025-02-26T07:01:16.660000 +CVE-2022-49402,0,1,9d66ca9d35aa9290ffd2cd4a36836caaad46b251367fa35d2e6980e013e3d3e7,2025-02-26T07:01:16.750000 +CVE-2022-49403,0,1,290c28048be23d78f26ff78537e2bf477ff42d98d8dc3db87438e530d8b6d2a0,2025-02-26T07:01:16.847000 +CVE-2022-49404,0,1,8291e81dadc74813105de387ea6a49b8ede0f03110c3ae3f79cea2d59490b35b,2025-02-26T07:01:16.937000 +CVE-2022-49405,0,1,410d11954523755568994a0a4df1f9c09793debc62a80f1fd2a60e7696c31431,2025-02-26T07:01:17.037000 +CVE-2022-49406,0,1,55ab72c95af2a99602c9a5956daee68d5252dcb5120cdee9ad00f785088c036b,2025-02-26T07:01:17.123000 +CVE-2022-49407,0,1,3191c369c1c72a03156fd417499034af5bf08bcef3999a8cbb739ddc8eac1a5f,2025-02-26T07:01:17.217000 +CVE-2022-49408,0,1,3100cccb646f153314f61edeb7d118780ee54ded81c962ce5a6921ec4d36ddc5,2025-02-26T07:01:17.323000 +CVE-2022-49409,0,1,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d70f9,2025-02-26T07:01:17.420000 CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000 -CVE-2022-49410,0,0,c18473af2ca54d8ab7e7b0d50f0360cc1887ae6c728a97a1ceec088f1f818f13,2025-02-26T07:01:17.517000 +CVE-2022-49410,0,1,d676b62acba28e76fb4d3fe840d95d1ed87208de26d2278f0d0d1aaeb9c8911d,2025-02-26T07:01:17.517000 CVE-2022-49411,0,0,9a87687b3917e12a5da60325ede95267e6847db22ab27942e0104f4544b3485c,2025-03-05T22:15:34.580000 -CVE-2022-49412,0,0,6d4ca15780a7cd9a5f121f12a1882d0c233ea095afc5591db73caa6d48b41156,2025-02-27T19:15:43.770000 -CVE-2022-49413,0,0,7f92cdb76e3c2292c0568f99092868df0fb8a3ff3dd65826cb5e2523e437b0f0,2025-02-27T19:15:43.910000 -CVE-2022-49414,0,0,45e06079d8e9a9e537f215e34f1fed2304341cb0e6033235818624411329e401,2025-02-26T07:01:17.890000 -CVE-2022-49415,0,0,57e86d478bdc866b5fdb617200fd9bcbeec7567da55ef4b212cf7fe1b44cb635,2025-02-26T07:01:17.987000 -CVE-2022-49416,0,0,15ed00e17323e2e31708d783021ea4865412d6e5458b1cc3739bc6b7e45bfde9,2025-02-27T19:15:44.047000 -CVE-2022-49417,0,0,9ec90c5c337c3537e3a7818f62a8c625f7e31151fd1a8c9455a52e3b5c9fc16a,2025-02-26T07:01:18.170000 -CVE-2022-49418,0,0,ec9115a2c3a9839d1b4dde1616c1b0c6399379a677064bce352a240dce404962,2025-02-26T07:01:18.260000 -CVE-2022-49419,0,0,293a4cfd6e8be901f44b56626f95acc655545136d1a4d0887133a14b3af1b146,2025-02-27T19:15:44.190000 +CVE-2022-49412,0,1,7780f123d3b234c184f0d9a6db39e023f8a84306e4cf72a439e988b096b987b8,2025-02-27T19:15:43.770000 +CVE-2022-49413,0,1,c69ecf858264c164d13919bbd318745a724436a9e1a15612cabb210562b3fff5,2025-02-27T19:15:43.910000 +CVE-2022-49414,0,1,8820062db3ea39821c9aa0ace703558bdb256184ea252d2e82f5d341ac3de12b,2025-02-26T07:01:17.890000 +CVE-2022-49415,0,1,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000 +CVE-2022-49416,0,1,37e1b1e3d5dfbc6cf63d5478e17759cce9e3fe7d85ad50192dd7cb9c05f429ed,2025-02-27T19:15:44.047000 +CVE-2022-49417,0,1,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000 +CVE-2022-49418,0,1,68702793689d60091827cf296631b3ac98a6cb9e3ad7a623caed68cda3bfc938,2025-02-26T07:01:18.260000 +CVE-2022-49419,0,1,0a6941c657636b02c73936fb69d1efa5494563e27c4926ea510a29793c5803c4,2025-02-27T19:15:44.190000 CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000 -CVE-2022-49420,0,0,e4813a66fd76e70671d252383bcd2b1103de455ca14875623703c2cf262ffa95,2025-02-26T07:01:18.440000 -CVE-2022-49421,0,0,fafdea50f73e30f24d8d23b3e76a2f5d368ededbc73960d9e816f29ce4f1f9e1,2025-02-26T07:01:18.533000 -CVE-2022-49422,0,0,efa10915f5e3f688cd8c646ae218157792a00b898a91f7499bbb09792f96072d,2025-02-26T07:01:18.657000 -CVE-2022-49423,0,0,edf510dfdaad7bf4751d7b1c5f2bb740041bf65368e0e6783cb035ede108db89,2025-02-26T07:01:18.783000 -CVE-2022-49424,0,0,592e4b7ffd2416451299488a5f9f9faac8745be78d58452d73cc4ad981970c96,2025-02-26T07:01:18.880000 -CVE-2022-49425,0,0,2fe5f9c94f0af3842340b8bb10c8c353aa490b4819be0e20caaebe1b7d850f77,2025-02-26T07:01:18.977000 -CVE-2022-49426,0,0,1be5ea1851f9f72868a358440b0fd672b8d08e438faabfaee686ed51d196aaaf,2025-02-27T19:15:44.333000 -CVE-2022-49427,0,0,fc3ef587a33a58b55df5b9b388ede1451451d0a3dca7b2cdbd2fe5a480d34963,2025-02-26T07:01:19.187000 -CVE-2022-49428,0,0,ec64ca7ceae21185131e040165fd2b2d9cb024f90ee316c620d56efd8b86bd47,2025-02-26T07:01:19.290000 -CVE-2022-49429,0,0,c7d47400c007eea05958dd9e7baa5bce82e8c1dc2b9be6b6ea4a6b52eaed3d3e,2025-02-26T07:01:19.383000 +CVE-2022-49420,0,1,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000 +CVE-2022-49421,0,1,7eb57eda82f34d72708247381feabb306d0f46ffad80ab8488ed9027bdc3a8c9,2025-02-26T07:01:18.533000 +CVE-2022-49422,0,1,086ded63719211b39acaa88e5a4d1d2e11d89f1d8b1d2896ecf52f700c493b4e,2025-02-26T07:01:18.657000 +CVE-2022-49423,0,1,6c3f2eedb20a1800c80a7cd5308999b6f8d58b9188bd0a493b16386dff013c3f,2025-02-26T07:01:18.783000 +CVE-2022-49424,0,1,495d24e927920f4593d6b3737ac663171a9ac8f2ae16f5e625b2e978c89a5451,2025-02-26T07:01:18.880000 +CVE-2022-49425,0,1,d53e1cdc7fa21217880892d30a48868e9e440b0540f7087f40cd3b876badc568,2025-02-26T07:01:18.977000 +CVE-2022-49426,0,1,612767e4f0ac05a8410a4a066c4b004de877ff9ca8acf5614df67fef9ff93d68,2025-02-27T19:15:44.333000 +CVE-2022-49427,0,1,b25f5f542f33d271003d85765e71f65d38a0693d4a02783f1d71c39938fe5fb1,2025-02-26T07:01:19.187000 +CVE-2022-49428,0,1,84bcf771462e0ce8018864eeb709e67bceb404379ef9ac71ece4c836d3213587,2025-02-26T07:01:19.290000 +CVE-2022-49429,0,1,6c4f7c5fd4e8c80c812e392b0badda79f16181f3bd02f53e8625fca5fa344e57,2025-02-26T07:01:19.383000 CVE-2022-4943,0,0,fbd7d57d4d1dd683863251f5fce13ef18de52df2a34c1f64d948aac8a5b8e404,2024-11-21T07:36:18.063000 -CVE-2022-49430,0,0,33cc3840bee2fbebc2ae2b289006f94296dc3cac3abf401d5b22b7299855d9f2,2025-02-26T07:01:19.480000 -CVE-2022-49431,0,0,683dd158d298f07b37906004341ac998eae2204733b15e73b4ec589d971d7bde,2025-02-26T07:01:19.573000 -CVE-2022-49432,0,0,690092f98695e80024be78ef72419ecd3363e08bdb3c680f2fdb6440131b49cd,2025-02-26T07:01:19.667000 -CVE-2022-49433,0,0,d324fa4ecb517564e5d64983ecf35fb891ff9c7b95360f288f5254f4fb79b881,2025-02-26T07:01:19.763000 -CVE-2022-49434,0,0,f2b906ce3c8cd4d6ea3042bab6f13de725fefccf2702ebcaf447f9171d74bfc8,2025-02-26T07:01:19.863000 -CVE-2022-49435,0,0,f5146b381296520e54c0f3b7246628e79d7ad9e4130c5132c73503a00d84fb54,2025-02-26T07:01:19.957000 -CVE-2022-49436,0,0,bdba6b28dd8c9a5ef781fc2f106a0d98cfe9ef4c9c7f04cb4ef5073e40d83ffa,2025-02-26T07:01:20.057000 -CVE-2022-49437,0,0,8b0a636d141d0067bbcee3eed55860cc3856fff4c4f89e1cd6a8d3b659e56b19,2025-02-26T07:01:20.150000 -CVE-2022-49438,0,0,88d303f5dcc609d720a0424f6c68c6d46507de1e53dea108aa985879c5be176b,2025-02-26T07:01:20.240000 -CVE-2022-49439,0,0,552249611f9d8d2cdac811dc3543940c8121f29cc02f157cf47473b36afd7b40,2025-02-26T07:01:20.337000 +CVE-2022-49430,0,1,501d0c3f0972eea42924db332496b773c28d71b6f8d601ec264419503f5a041f,2025-02-26T07:01:19.480000 +CVE-2022-49431,0,1,2bd37d5de40b230203fcaf8d7669e60c7a17b98fbe0af90a9956fbb771138018,2025-02-26T07:01:19.573000 +CVE-2022-49432,0,1,8c3cd96d8e9462bb8dadfea5bbcdf286bf6f5f53a83b822404232b6ae0a933d7,2025-02-26T07:01:19.667000 +CVE-2022-49433,0,1,a1beaecdb8dac13bc4dc0ca5374aafe97478f73bb37ef3bc7c2857b3621fc52f,2025-02-26T07:01:19.763000 +CVE-2022-49434,0,1,49c97028a506e4d01b57dac9d044806eb0e486f98b09dd0d369cd21b25dc2f17,2025-02-26T07:01:19.863000 +CVE-2022-49435,0,1,fc8b14a317299c6eb3d4fb90d7448e1f6fc22985fbbf6fb2f7e48ff11d48164e,2025-02-26T07:01:19.957000 +CVE-2022-49436,0,1,70d11b0d927b2f8c31652d10437c08c0fcd60cb1aeead45f5124cc3a2cb7e6e1,2025-02-26T07:01:20.057000 +CVE-2022-49437,0,1,b53db69f4b34728f7d9d2a6442f0e3cf780c7556207340d5cb8a2ad8c754fdea,2025-02-26T07:01:20.150000 +CVE-2022-49438,0,1,60292a32fe3600bd265f2857a3e4138d4123c148db677fb48cf18b53ef539e66,2025-02-26T07:01:20.240000 +CVE-2022-49439,0,1,3ad741a2dc7fe653190749ada79e1ed0ae4a63062779bcf76d9b7c6654ac4225,2025-02-26T07:01:20.337000 CVE-2022-4944,0,0,4f9cb06fff170c9f36034ff3c0e0d5a7fddec2b4f0eb92639847dd2d54218639,2024-11-21T07:36:18.190000 -CVE-2022-49440,0,0,4c75bf8ef5078c96397cf788b1f4a08b736534a2af39be29254517dacfce510d,2025-02-26T07:01:20.430000 -CVE-2022-49441,0,0,267dea15009a2088d761b32eb1220213f1d3a98cc09c2222b4be37b35257686f,2025-02-26T07:01:20.523000 -CVE-2022-49442,0,0,6d0fc743437d8ff4f66228e85578255665cbc9ccd75cd485600d90f98f7cda43,2025-02-26T07:01:20.630000 -CVE-2022-49443,0,0,8c1f1e4cecfc340a87526c830c089f026066c15caa67c4d8d7fe6da5605628bc,2025-02-26T07:01:20.730000 -CVE-2022-49444,0,0,b4271cd5b4031cbdfc08756ed104630b40b8b7522ba91ccfb3e5bbe35a7b1084,2025-02-26T07:01:20.820000 -CVE-2022-49445,0,0,1275cb13a8d7838b75636166d2b073e19f7fde5adad94ca96b4174d1a0d837b9,2025-02-26T07:01:20.913000 -CVE-2022-49446,0,0,dd74de7b081d71d610cf225bd24bfd6d6b344882401d820a559a9c6d40cc5357,2025-02-26T07:01:21.010000 -CVE-2022-49447,0,0,e542fd2bae1a957c65a0c8b23c38297abf3c490a55b2ecffa65adda146c151eb,2025-02-26T07:01:21.103000 -CVE-2022-49448,0,0,9783c1a237fabba4b9cf38392c200cca75355f21027e3f7722f6ac584788ba28,2025-02-26T07:01:21.200000 -CVE-2022-49449,0,0,76de555aef916c012fa903523cceed74b825a946ab6bf8d40d29e1bfb40d97a3,2025-02-26T07:01:21.290000 +CVE-2022-49440,0,1,399b74cc11f80f519e701b62a4251ad7a344cf62daefeff726753eae59d73cb8,2025-02-26T07:01:20.430000 +CVE-2022-49441,0,1,30a2195d738105122c7c64f14ca46cf28bb348b97fc622634b919fa8560f6637,2025-02-26T07:01:20.523000 +CVE-2022-49442,0,1,41292d866345868718998f234c039df183a121383419fe324dde57710e4eb6d5,2025-02-26T07:01:20.630000 +CVE-2022-49443,0,1,c34425dc711b9ab52ae3e3ff965dacf8b2d095811752ef899b453c183af34e8d,2025-02-26T07:01:20.730000 +CVE-2022-49444,0,1,32a63dbc501c11237648dd22d23a930c84002b83762a8ef62b33f59b6c797383,2025-02-26T07:01:20.820000 +CVE-2022-49445,0,1,1a7cb7e0b8ea0eb7c7c20ddcaa0a15501c7969ed78172b524114648beeb70078,2025-02-26T07:01:20.913000 +CVE-2022-49446,0,1,cc9657402c7d9343d426f4c8ae5641e8c2f493b8c7c6683f49be01f8dec9fe86,2025-02-26T07:01:21.010000 +CVE-2022-49447,0,1,7d64a1bab96021fb2047d78eed48b0ecb0138d0f5ef3f38a7fdccd25b16ca39f,2025-02-26T07:01:21.103000 +CVE-2022-49448,0,1,69d2988375e64558a71d5f05067366e7bf8c437a901b7936cbddc9b07c0ab316,2025-02-26T07:01:21.200000 +CVE-2022-49449,0,1,52b8912a3097c0aac4ebc1f65d3c5e956886114c77ae5e7834cbc6ee2dd0c4d7,2025-02-26T07:01:21.290000 CVE-2022-4945,0,0,20784b9d1103172e5d46b8cc80ea749a5a202a1d8d741e78d1464bc851f0caeb,2024-11-21T07:36:18.330000 -CVE-2022-49450,0,0,8837199b86a0f908bd79ae7e5459c1b7a2ec1fe22515eb7798a07ea4f30f9bf9,2025-02-26T07:01:21.390000 -CVE-2022-49451,0,0,5c377251887a76d62012af5b41442f06a71aaedca90584e6876b22e2a264a148,2025-02-26T07:01:21.490000 -CVE-2022-49452,0,0,b582f82d8e27e013a2e0ddb6c34e682b90406536eef2ff98527fc6e402774bf0,2025-02-26T07:01:21.587000 -CVE-2022-49453,0,0,4463398bea1e1cac611a441373e30e8d521ff6328e50363bba9b6a753a88c3fd,2025-02-26T07:01:21.673000 -CVE-2022-49454,0,0,9110cd840f4178d7ad2127d3a503c10f9551d2741db6877acb0962c5f4019203,2025-02-26T07:01:21.767000 -CVE-2022-49455,0,0,3d6ddd3152951994aa22e018908a7cb3bf6464ee7db7b4a67a0c2d9d499c0ee4,2025-02-26T07:01:21.857000 -CVE-2022-49456,0,0,12073575157099c705f5407b87a1df0723c33375365cf1db34a51f7bf42cd223,2025-02-26T07:01:21.950000 -CVE-2022-49457,0,0,31de0bedb38799e3948374eeafad7ed708025381758fdc0c3ab6a1afcac1206c,2025-02-26T07:01:22.043000 -CVE-2022-49458,0,0,21f97ff5a50071fb6cf0e2f0a59700d4347603bd448dbb2836ade28d0ef36071,2025-02-26T07:01:22.133000 -CVE-2022-49459,0,0,5896affef30ced0e74d0be5b1f49a31ceba9a8d4c2dca668daffc7554cbf60c5,2025-02-26T07:01:22.230000 +CVE-2022-49450,0,1,8dc89501ed2a38dff08d387287804af708a9146da2b65d9fd1b8b52abd2310e0,2025-02-26T07:01:21.390000 +CVE-2022-49451,0,1,f052acd8ef898e2e2ffd4a7fb12e16689637087796fec3ab30397a6487b0cf2a,2025-02-26T07:01:21.490000 +CVE-2022-49452,0,1,61c07b4c1e73f1ccfbb4cd1c619553798fff6c54d4db37fb245c3a583cb8e072,2025-02-26T07:01:21.587000 +CVE-2022-49453,0,1,74b39d4bdc86da40db4d6a642bc133b95a99c0bbfcf71b1b1d8e1ec526326aec,2025-02-26T07:01:21.673000 +CVE-2022-49454,0,1,f6f2a03c3ca97b306ac7a0ca77c1e88ab9bcde52604920a09e622631bf5fd849,2025-02-26T07:01:21.767000 +CVE-2022-49455,0,1,254f2287eb13abc25bd20a0dcfeb09c56b068bd98da806b8e5d7cf31cc1e6ad8,2025-02-26T07:01:21.857000 +CVE-2022-49456,0,1,563c3f7f3b0329740dc4fab90ff930206615f045727efaa3740e291c77811a6b,2025-02-26T07:01:21.950000 +CVE-2022-49457,0,1,1b15cecdb52f0197b6e40c41b3555c1f47804f6ef46c6eade0451cc731373113,2025-02-26T07:01:22.043000 +CVE-2022-49458,0,1,7f625f9a4a3446f8e9992368140745edb82f77fe05f8a75544199ad9dc8c1487,2025-02-26T07:01:22.133000 +CVE-2022-49459,0,1,06a7c6a3aa9e8c35ab36b3ce111b5e8a6ce1998fc0228ab200575f2357609061,2025-02-26T07:01:22.230000 CVE-2022-4946,0,0,41fd8dc7f83b35220687a8d1d330ae53710d4c60699555a4ab3f45165abf6e79,2025-01-08T17:15:07.773000 -CVE-2022-49460,0,0,1de4ae8609755a9bbdc8265ea671062d8b7ad5a2601f084973601accac07de43,2025-02-26T07:01:22.327000 -CVE-2022-49461,0,0,528f8e82f72fb151f4976726bc4bc4fcdfaacc41138869bb2ae58722442aa1e2,2025-02-26T07:01:22.423000 -CVE-2022-49462,0,0,cd4445fc7704eb5d0d4c5f2eb1950ffe4b5bdb98d3fe995d1a805cde5493036c,2025-02-26T07:01:22.517000 -CVE-2022-49463,0,0,f4c57fa12b351969626b45a9f651e75b2c19d3a47f09cea478a9dc55cdda1785,2025-02-26T07:01:22.603000 -CVE-2022-49464,0,0,085c7f8b5184ba8a15d6fb0a11e6076b3ee6f5d061db14a441fb2d5769838aea,2025-02-27T19:15:44.470000 -CVE-2022-49465,0,0,2a7d4b24c720789f00037364286eedeb36f888d42bc26abc98055ee846c02159,2025-02-27T19:15:44.603000 -CVE-2022-49466,0,0,a9aff9bfce32a1a4c01bbfbffc4e67675750b193fe85ca9969587d6b8acf4909,2025-02-26T07:01:22.880000 -CVE-2022-49467,0,0,ea3c306ee1d9b1a9ca95b49d615ca8f68842bf14183480c6ab59c09ed2c1656e,2025-02-26T07:01:22.967000 -CVE-2022-49468,0,0,b269c9bd932d0cfadef93a0696e708ca597ea7909592d88412342ac372961071,2025-02-26T07:01:23.063000 -CVE-2022-49469,0,0,62b10bfbfcc44c9bd8407172c461fe518e4b121a8744464758a624882c54f9d5,2025-02-26T07:01:23.157000 -CVE-2022-49470,0,0,d476b896fad896d2d425bdc8eb54592de46c11900270527cfada83bbe3e20053,2025-02-27T19:15:44.743000 -CVE-2022-49471,0,0,bce80734fb1ab7b2384ad8904e6ab7e31f0468e2e1b7da35b3cbf2837c130374,2025-02-26T07:01:23.333000 -CVE-2022-49472,0,0,c9fe54c1e6281d6b5cfe0b7a0318a58e9b413f73653d9b36187b239c17707d68,2025-02-26T07:01:23.423000 -CVE-2022-49473,0,0,360405a8d2a43777aa3dc1fb83fceae79533d6d04363b88ee7b934541f1dc376,2025-02-26T07:01:23.517000 -CVE-2022-49474,0,0,d7769d2d059116c3b5cbd481b0732b5c6fc669ded2dd02ab00272d1ce5e23c17,2025-02-27T19:15:44.880000 -CVE-2022-49475,0,0,dae01059b8fc9ce19a24230eda87a92afd145998b84a3a30645390cd1cdb19df,2025-02-26T07:01:23.713000 -CVE-2022-49476,0,0,919c49977b340db91dd80b07dd5e372a8f2683e01b982b68be7de305e020e882,2025-02-26T07:01:23.800000 -CVE-2022-49477,0,0,2cbcc0d7c53f21e41464b2fd62f97d4d73f8e23c873abecc071f51e222a1f40c,2025-02-26T07:01:23.920000 -CVE-2022-49478,0,0,8a2fdc70b4dd7642c26823175506d683b2edb83539243aa7c2a48407d63dea37,2025-02-26T07:01:24.050000 -CVE-2022-49479,0,0,8279e23c9a3307204fbb3d216a2f4081410ff621f806de285097053a14680d02,2025-02-27T19:15:45.023000 +CVE-2022-49460,0,1,c0ca53f2e7645a9533266d873f526216d2888f488f8ae5c9717450c998061d79,2025-02-26T07:01:22.327000 +CVE-2022-49461,0,1,8708f85204836c800386ceb93d4084d6f6c7c93f018fe44ef9b4ca0028047a17,2025-02-26T07:01:22.423000 +CVE-2022-49462,0,1,2d9ef0c040937485de4fe442495b914388690d785f50452577ae086220f8b94e,2025-02-26T07:01:22.517000 +CVE-2022-49463,0,1,6af664ad1a7dcc2b60242af0970de3a6686cf87502955f6775ca1d53e56d5a8c,2025-02-26T07:01:22.603000 +CVE-2022-49464,0,1,e6ddb19317a9406dcd9a0f90ba2df98503c12a7816cceb250f401a90bdd88fdf,2025-02-27T19:15:44.470000 +CVE-2022-49465,0,1,4f8c4bf67b93c09e09cc2d909a4283eecdc3c3846748704b72a56494a4cea9e8,2025-02-27T19:15:44.603000 +CVE-2022-49466,0,1,1b3f8a91c7c8d4e47da63911f2c35d580794e28c580204b719068f18081d04b1,2025-02-26T07:01:22.880000 +CVE-2022-49467,0,1,22afb8cada5ee61ff2079025f2cfbba9206a88ab3f057fb7c8f4171363b6b8f5,2025-02-26T07:01:22.967000 +CVE-2022-49468,0,1,87a05b1771818597510ab1ef1adef5e429dfb297080c4beb7aea0df8dc8b441f,2025-02-26T07:01:23.063000 +CVE-2022-49469,0,1,b5870172882f87e55113d0c0822fd763e69d1a72fa1006358d53ac85203176b7,2025-02-26T07:01:23.157000 +CVE-2022-49470,0,1,4257c297d46fd3c369f1f6614c21c56d101422144377730beaa4c7fa5cb52ac7,2025-02-27T19:15:44.743000 +CVE-2022-49471,0,1,957447a533bf89a6a41e4a930dc9aeb57eac02f499e3b5c42d6b39ad865d9880,2025-02-26T07:01:23.333000 +CVE-2022-49472,0,1,9ec961e0bf0e680ba8bae89ac1a3d97e51c63b202474d2bd45f4cbdf62e02e29,2025-02-26T07:01:23.423000 +CVE-2022-49473,0,1,60dfaea0099fbccfef518290e5269848b2929db36318a562180510abb9dca853,2025-02-26T07:01:23.517000 +CVE-2022-49474,0,1,c207a9f490aceb5fb050bc3d1f18c5a204816ddea5d0bd3de3457cccec57e20e,2025-02-27T19:15:44.880000 +CVE-2022-49475,0,1,d291860ba9606736f4674dd2add334cfde1f4ded40fdd668ddf5a30838c0ac2c,2025-02-26T07:01:23.713000 +CVE-2022-49476,0,1,9fbc9daafdd34a78d3aa4f30d3e877a0c72e4ae4a0dbdc9bf3b3d834f2f59f89,2025-02-26T07:01:23.800000 +CVE-2022-49477,0,1,ad330ee66e2de43fb9d2177b580661f2ded1bf4eb006e3ae0fa0a04e69b019e2,2025-02-26T07:01:23.920000 +CVE-2022-49478,0,1,66645b176ea7980f8678da14dcf0a80c0a9de9214d0434eab6e952a82ec7acea,2025-02-26T07:01:24.050000 +CVE-2022-49479,0,1,21b4854aef3e3085b45840ef35c4cc4bb542fc111ab30881629f4eab95092df0,2025-02-27T19:15:45.023000 CVE-2022-4948,0,0,3f06e3662375e23afad4aa4576d0c4fd807f6f0a60e20fd1d377539f48f1a48c,2024-11-21T07:36:18.570000 -CVE-2022-49480,0,0,fb62d79d235861a33b731806b90e9fdcd781a924500dcaff8abb8350ccd074a3,2025-02-26T07:01:24.243000 -CVE-2022-49481,0,0,2c9af5a035d28b865aef4d5a62719257a5af79540975ba7a68f5b55bfb72d67b,2025-02-26T07:01:24.340000 -CVE-2022-49482,0,0,f19130eccfd73df9d099e7a8101e67ce43245ab5f04b3d759836247431e2b596,2025-02-26T07:01:24.433000 -CVE-2022-49483,0,0,a3b686769070b38365100ff241afe4bc1320cfd0c657dd7e9f9d1f99fe2a1db5,2025-02-26T07:01:24.527000 -CVE-2022-49484,0,0,e94f68c904f6e9f41550fe4c472da4d2e62988f6fba19f54575577482b5f972c,2025-02-26T07:01:24.620000 -CVE-2022-49485,0,0,55408f62d96c503da8d80d02e172ff89c29e334d29f84b592bf7605d1edca3a9,2025-02-26T07:01:24.710000 -CVE-2022-49486,0,0,92823d7976f50da17cd777fbb9ac1f222f4fc7354d089bfff5d4d2b720d958f8,2025-02-26T07:01:24.803000 -CVE-2022-49487,0,0,670c8e7fd77f420124d9f33151d8db1a1561389191b7671359395e07d83e0a24,2025-02-26T07:01:24.897000 -CVE-2022-49488,0,0,bc4b1661dce83f2333ac1621e48c267bd4dada2757d49ef2469fd051a59d0c8b,2025-02-26T07:01:24.990000 +CVE-2022-49480,0,1,8485bdb0b9a4fff28da292e41c3a7de39e2d89a003fb445f429ef2c979501c07,2025-02-26T07:01:24.243000 +CVE-2022-49481,0,1,29f47cfc7484008104509dffb9000fd0932a7010e7d111079b8d5d99900b1b73,2025-02-26T07:01:24.340000 +CVE-2022-49482,0,1,e18945fcf8a1fc8f56a55fdee868a180317bf9747a9ea2bb29c00f74d0ed007c,2025-02-26T07:01:24.433000 +CVE-2022-49483,0,1,94b1995bca6296fed66f86128846c9a30378e2b94da00adc3fe2d67b02afb743,2025-02-26T07:01:24.527000 +CVE-2022-49484,0,1,9b98b099cd44e391f3981e127c012f44b61589db7277d951ddc51d88a8f3cdf6,2025-02-26T07:01:24.620000 +CVE-2022-49485,0,1,6d1ee6e7b7486881fa384ed7f3d8fd982566095348640d701117cd0354f4c5cf,2025-02-26T07:01:24.710000 +CVE-2022-49486,0,1,5685850e087c5ed0f3d9c6a8439f47c72b24aea5bcc08a5c8c07143ed6ff9775,2025-02-26T07:01:24.803000 +CVE-2022-49487,0,1,7342586d1c88790408a18a2139b5bbeb9ddb0fe84e98797315c35309c086067d,2025-02-26T07:01:24.897000 +CVE-2022-49488,0,1,d4ab7a86aed378d42b8fb4229ee12f1aeccefb8cd2a4be3d8fd9feb72c0c3323,2025-02-26T07:01:24.990000 CVE-2022-49489,0,0,3ae95e28ed50c5f36ebc0501c87fbf6f5b23e2b31eaf5c24145b28a31ca89680,2025-03-05T22:15:34.743000 CVE-2022-4949,0,0,20ecd66c665d4a7df211e25b3128a2f7367a36b316ae054ac00474cadd4e5062,2024-11-21T07:36:18.687000 -CVE-2022-49490,0,0,16cc7f0c1b99ea1efe29c128cae67f5242bed1be9df4b551bc23b2af0ce4d248,2025-02-26T07:01:25.183000 -CVE-2022-49491,0,0,2a9aa1e883e016a3d43e38e6172aada1c5506731d8d72b9fa1d461654a8a6b58,2025-02-26T07:01:25.280000 -CVE-2022-49492,0,0,68222a2d3bffabe06841a3b0c4ce95b0213371dc875125c96e7ff598194b87d6,2025-02-26T07:01:25.410000 -CVE-2022-49493,0,0,886b99f2096eec2dbd5eeecab935eb5a31d5d9941d47b940179dd40f3f9e6f26,2025-02-27T19:15:45.153000 -CVE-2022-49494,0,0,6f96357bca3bd500f8221a2236efa2445d82d07eb72a784168ea89ed144a4763,2025-02-26T07:01:25.613000 -CVE-2022-49495,0,0,dbec526202438da2ecfd46a62a52d15f1c77891841ff96a5bbdac856e914596c,2025-02-26T07:01:25.707000 -CVE-2022-49496,0,0,82269483fc3d8ce2217673a0c31721588c6145e634372cc2552445373aa2c2bc,2025-02-26T07:01:25.800000 -CVE-2022-49497,0,0,c1a82c16edbadf941b5632b5b62d1d7c1c9d26ec1ee50b6377d0211e1274a5d5,2025-02-26T07:01:25.893000 -CVE-2022-49498,0,0,f31b3dec636f0ec701787fdcf1d7b945419a4341b23a8b5966b01abf1c22242b,2025-02-26T07:01:25.987000 -CVE-2022-49499,0,0,c4fdbfd7a96371a5f626a51f4b8b831cb303e81b17bdc781819228a5226f10ed,2025-02-26T07:01:26.077000 +CVE-2022-49490,0,1,270aba9f6e63fa1a86f329a4fe7824becd52a6b355bcf2fe86c51f1659629503,2025-02-26T07:01:25.183000 +CVE-2022-49491,0,1,01ed1c93344fb76cb8435ff5a6133e6a5339653aa7646fc6c4d190121eea8872,2025-02-26T07:01:25.280000 +CVE-2022-49492,0,1,012321950f2d863ed5becc92dd27d67dc5030e26423beaf09f9363f3111707d6,2025-02-26T07:01:25.410000 +CVE-2022-49493,0,1,43d0f027f2a6d088ff6b2d3bfd6e7b98decbad12a385ac576770c70d0114106d,2025-02-27T19:15:45.153000 +CVE-2022-49494,0,1,4f9b6effb4c81426462525f4137bd222502df837711148839dc8e0e112654d6d,2025-02-26T07:01:25.613000 +CVE-2022-49495,0,1,4314c31e99f42611683a103c42c6e94523107c640bdc9a410a4c233b444c0045,2025-02-26T07:01:25.707000 +CVE-2022-49496,0,1,96d86559cb033927ac753c6f4109b8da6288af7a6b4aa1ab23e985f0916bebcd,2025-02-26T07:01:25.800000 +CVE-2022-49497,0,1,82b97e8843b3b1c049575dd74eeaab26a9f802eae143a0f416994c1a979ee591,2025-02-26T07:01:25.893000 +CVE-2022-49498,0,1,e1a728149da06d9b862a3093d15a492d342d7324dcd991bb0ce9782be2ce5450,2025-02-26T07:01:25.987000 +CVE-2022-49499,0,1,00bc99820c27305b27319f8ef9e0c1107907fec62f6838b9f8ef591a9d64bade,2025-02-26T07:01:26.077000 CVE-2022-4950,0,0,553f8616c590a48d9a934a6dc8477b16541d05a5e26a41275fd32eff9d48e9d2,2024-11-21T07:36:18.810000 -CVE-2022-49500,0,0,0d2892e4f25830e9b2d15d1148730e8a5880e93843a30209863f07a2d8a04c09,2025-02-26T07:01:26.163000 -CVE-2022-49501,0,0,ac9b3d6d75a3c4330f4144b8765fb493f22bbfe210830d63c31ababec0378e55,2025-02-27T19:15:45.300000 -CVE-2022-49502,0,0,45d788ea549b513243c6be1bf6900247c9a74d3896b2f45c6b78b722abd13808,2025-02-26T07:01:26.353000 -CVE-2022-49503,0,0,885c12f55cf55399bf900d1e946d10cb29c2702e8a02e3652e712c282371b224,2025-02-26T07:01:26.447000 -CVE-2022-49504,0,0,2c3a72d7f0bc4c29be9d71c87fea38e15492da7bf9d490296d7acf8eb1345686,2025-02-26T07:01:26.543000 -CVE-2022-49505,0,0,f42d6302ddb715c416d4cf80f3e9b0c9836b4e0d1477820b192a0e55e31ad3d7,2025-02-27T18:15:26.007000 -CVE-2022-49506,0,0,2acf4690a231e233026c6542d0f3ef42587620aa4de43f43e0923d37cc5ee863,2025-02-26T07:01:26.737000 -CVE-2022-49507,0,0,7df29c955a8f29d16c5d45760122cffefe8a379955395496d8d2bbe132182f28,2025-02-26T07:01:26.830000 -CVE-2022-49508,0,0,e77be2c475c80f7b13e04e468cad5edc2e3977a43e8852efa0003543c4ec9839,2025-02-26T07:01:26.923000 -CVE-2022-49509,0,0,06eb5db51ceefce82ba1ceeca8f18e6fae93d59f9259b4a865800b0306890251,2025-02-26T07:01:27.017000 -CVE-2022-49510,0,0,5022df4602872b4921e42c88a7485de83078661cfa97c101976d8bd67db06af1,2025-02-26T07:01:27.107000 -CVE-2022-49511,0,0,a4a4aaf0ffce8c97a109875b2a05b492ebb4959c95fe88fb3234291a924bdb80,2025-02-26T07:01:27.193000 -CVE-2022-49512,0,0,b7765efaf5cdf9f1de2fb9787c4d8c0b6384023ebea370676fe4e9fb036141d5,2025-02-26T07:01:27.287000 -CVE-2022-49513,0,0,5518d053fdbb2a0d4b5c9e09924e05c75e6deb7a2b8c461d1558295fae3cc1af,2025-02-26T07:01:27.380000 -CVE-2022-49514,0,0,e653358a5f2b7e4a3f259ee6e1851d8c94d7ab39a41af3f99d102458a0639a80,2025-02-26T07:01:27.470000 -CVE-2022-49515,0,0,39ed3920b199c716906e8bed7e9cf372a3a9737fbfceb1ae2f91d3dd4e4561dd,2025-02-26T07:01:27.567000 -CVE-2022-49516,0,0,08bef631fe5936b96964ec30609387ca6e30835927835554706962f90aef8c36,2025-02-26T07:01:27.653000 -CVE-2022-49517,0,0,c8d5ff0a2e6a7310124447e05813e24ae4b896884e4d57b0f70656c480b47076,2025-02-26T07:01:27.740000 -CVE-2022-49518,0,0,d5027969cb65a64eb4e4d653a6aa42693628552ddbd3fd68f27dde3c92860ee2,2025-02-26T07:01:27.837000 -CVE-2022-49519,0,0,0c9822f381b7de24ab6a2d929399fecf598534635f0415e80d95730e5ab0a9e2,2025-02-26T07:01:27.923000 +CVE-2022-49500,0,1,22aae1b54b346463da818c1f05eb7a354584f5e50ae3e9ebefa32dd67a8f4fee,2025-02-26T07:01:26.163000 +CVE-2022-49501,0,1,c4d2a95277ed3ffaae7e144f0660da36a869b0db08cfb37d7ad841458fb87e53,2025-02-27T19:15:45.300000 +CVE-2022-49502,0,1,ec73027554d1d1ceee0eb94feeac7d45c49485613e74e2727ddd0c774e0b2718,2025-02-26T07:01:26.353000 +CVE-2022-49503,0,1,1b221d569cd7bd716071aad4a4aed8f1bd7d8bc5c4cb56eb1ca65fabf22247a9,2025-02-26T07:01:26.447000 +CVE-2022-49504,0,1,dfc48315117767033b964df565f4dfe03374233694b8757abf6de9bfa239a000,2025-02-26T07:01:26.543000 +CVE-2022-49505,0,1,a92d43b75e8f7f05ebacc5d029bdb0602a5ec909946d07552e56333b6f768c13,2025-02-27T18:15:26.007000 +CVE-2022-49506,0,1,acd402e73d7abe7379b4837433d1bef2274c7587d7334939fc108b29de65c13c,2025-02-26T07:01:26.737000 +CVE-2022-49507,0,1,21ca20782b4c4eaa2a72c25a43e5beeb0d8b04f3242625e878baae5053faebd2,2025-02-26T07:01:26.830000 +CVE-2022-49508,0,1,3db354c630ff60ecbe9c5a72dbdd05fc030db4604d929b903df97dff4d5d3b41,2025-02-26T07:01:26.923000 +CVE-2022-49509,0,1,c42a19e06a551c87f16075cae083c8b6b30f2b4b4943ca0d85cf0b934e347240,2025-02-26T07:01:27.017000 +CVE-2022-49510,0,1,22ab710a58c6156367d30910ff9940198a1c40492d67adaf6967dd6efab93607,2025-02-26T07:01:27.107000 +CVE-2022-49511,0,1,ac27032366a0f2bdc38f6b440db773845c9a1133ab4ffabe062a6277a39fa4d2,2025-02-26T07:01:27.193000 +CVE-2022-49512,0,1,afb1bdc8c2d7d19899150691424c0820237aa728525d470207b9d1aa2dd3b215,2025-02-26T07:01:27.287000 +CVE-2022-49513,0,1,ee2f15eae9aeb0dd25a03d8f2840529cb9b7dee0ba0101e1f301a18af3fad89e,2025-02-26T07:01:27.380000 +CVE-2022-49514,0,1,926a5b2a0ac57e3ca2394d9694a540c33d001ec6c1f058abaf174ef963358fbb,2025-02-26T07:01:27.470000 +CVE-2022-49515,0,1,11f590a0390050966175d7feb25650014e735075d9da87d4d35d4eaf0315d8da,2025-02-26T07:01:27.567000 +CVE-2022-49516,0,1,608c59dca4bb73c50665928440ecd9fe2b087002863ceac7f6aaafdbcd76c6d0,2025-02-26T07:01:27.653000 +CVE-2022-49517,0,1,e12aa52ab55e54563c882e5c2ab099fee7fbab04f9eecf22d84547dec33cd11f,2025-02-26T07:01:27.740000 +CVE-2022-49518,0,1,e2be9645f3105b2d0a168cc97ab53e860dedbbe3e7dbc3867b799d6d0c941f15,2025-02-26T07:01:27.837000 +CVE-2022-49519,0,1,be3203cb79b2a17318b2c43dea6a6e5d8c5384c0354db6652cd09686cbf3bef7,2025-02-26T07:01:27.923000 CVE-2022-4952,0,0,7415f2ca4d823196175a3ec862b711ce8ea62fc540125d8d988ae7bb2051f370,2024-11-21T07:36:18.930000 -CVE-2022-49520,0,0,d7e06b436c9a4dc81db314e8e5b3ba3e903a25c3a7b0017f46ea452e70c0901e,2025-02-26T07:01:28.017000 -CVE-2022-49521,0,0,21c9310031eb8f253cddae6eadb506f92dfb9f4828f4f08e6acb888bc54a1c00,2025-02-26T07:01:28.113000 -CVE-2022-49522,0,0,88bf27151ef29566ad0f5bcbceccecd57efc2721e5651e6d1c075224a40417ea,2025-02-26T07:01:28.210000 -CVE-2022-49523,0,0,65817e67906762c2521196f39b3cea8a913654c59d7b532e2f4660a538ae9bb6,2025-02-26T07:01:28.310000 -CVE-2022-49524,0,0,477629f6736fc255561442ac53fef1f75a20a4431f5c4e3b5a1c135a8a229c0f,2025-02-27T19:15:45.433000 -CVE-2022-49525,0,0,038fed3be6b618c3042636c61e9fe925226240902171def15ee8a3377213ace1,2025-02-26T07:01:28.500000 -CVE-2022-49526,0,0,8c9ecab68225e19d7a4f60437a72153bcd41239d421da0b44ca762cf5cdf9a65,2025-02-26T07:01:28.593000 -CVE-2022-49527,0,0,22e83f125a9aea96fd948ec3681d482bf09238c34adfabc523865e4279d89e3f,2025-02-26T07:01:28.690000 -CVE-2022-49528,0,0,9aaaa251f66fe328e115387261c914d8d759a4fc3804672db34947ef00a6cfd7,2025-02-26T07:01:28.780000 -CVE-2022-49529,0,0,269318cde40a7af4c0389a89170e728b5df4f40db71dbb4e786b99df3dfaa1df,2025-02-26T07:01:28.873000 +CVE-2022-49520,0,1,e5307f9b37880054f4da04ed4cd0256419aa2046ad8ef496d6a57ef085a0a319,2025-02-26T07:01:28.017000 +CVE-2022-49521,0,1,e644a8814ea918f85e8c1694b44f101304bc35ce01d7c832f690b4567f5df3bb,2025-02-26T07:01:28.113000 +CVE-2022-49522,0,1,9488e6ed21b227ba47a49df0934ac9256cfe804214100f332cfe4ec56ad49861,2025-02-26T07:01:28.210000 +CVE-2022-49523,0,1,b94acdf4ed6bf2aef378931d2ef10961bc46d104c08632b6ffb955e53601d185,2025-02-26T07:01:28.310000 +CVE-2022-49524,0,1,0bfed2867487ff92cc56ed47659d7818f127e879b6f8c23632dce55f96f2b788,2025-02-27T19:15:45.433000 +CVE-2022-49525,0,1,981facbe77820bc63be37056597f6bd0c13283c2aefe388263621a35ac5e726c,2025-02-26T07:01:28.500000 +CVE-2022-49526,0,1,5339b66753ad80fb9a756eb170f85cfe6377c30292ade6b3738883eee6d81737,2025-02-26T07:01:28.593000 +CVE-2022-49527,0,1,31456b1b10252a571a0f7523a4fb3b47b0ce368ba049afb0ae01afc209008b1d,2025-02-26T07:01:28.690000 +CVE-2022-49528,0,1,67606282969aaa2b31505ca97d9477cc42eb7b22bad60f6f77b8d75889efc840,2025-02-26T07:01:28.780000 +CVE-2022-49529,0,1,8689026a1d77025340bdb3f3c57743e734124523e8df8834bc5da9018038fe54,2025-02-26T07:01:28.873000 CVE-2022-4953,0,0,e04a15b779bfbe898a916a95d05683f7f5f4c144cc0c5cedf2ea84fbc775f5f1,2024-11-21T07:36:19.067000 -CVE-2022-49530,0,0,95696fdb19983fbe3abf189cb84045edc0b4f9ee434b0c84bc6f81884222989b,2025-02-26T07:01:28.967000 -CVE-2022-49531,0,0,582c6dfc005872598d4359ec061c3f8274e580ae44c7d2a10e31acde9f067982,2025-02-26T07:01:29.067000 -CVE-2022-49532,0,0,c9b2522a845fc20fa63e995b69bc10f096dbf96352da14df9544945fd1747e1a,2025-02-26T07:01:29.170000 -CVE-2022-49533,0,0,8fff25db822bea4b894bcd7118f5fc524baf14467feaa252ed5c2f4a15367055,2025-02-26T07:01:29.293000 -CVE-2022-49534,0,0,5ec57fc4b4069ce2952b134578e59af175eb43589afa7a92acc0194fba55c651,2025-02-26T07:01:29.400000 -CVE-2022-49535,0,0,5b6b09556ffb0c43bff99abc4609745b4c8bb394ab19f2b069eeb8cc6dd02ea7,2025-02-27T19:15:45.573000 -CVE-2022-49536,0,0,af361334bd21a3ebcf1f7058316d324054290417ca89655ca5ba6b07b7e72c96,2025-02-26T07:01:29.580000 -CVE-2022-49537,0,0,394c6c287f8fa561a0954965824399a37e01a1a9883b91a328565a28937634b7,2025-02-26T07:01:29.667000 -CVE-2022-49538,0,0,1ce6463d9f092cfdd61c0f1315a83d4088269e02eb96d466b95a8f1f13a31577,2025-02-26T07:01:29.760000 -CVE-2022-49539,0,0,d05ed6a88d3e6898d357b37af54f29461c43080771aeff9794365ea5a63a5d3d,2025-02-26T07:01:29.857000 +CVE-2022-49530,0,1,47a397e0c01d1145c9e68c4e5fb8ad3d6cf93316839bd849d0afa9de77c4514f,2025-02-26T07:01:28.967000 +CVE-2022-49531,0,1,6f7df9b8ade4346efdbb7009fb0918c28cc6d52db9e2b58402a4cbb94ad977b7,2025-02-26T07:01:29.067000 +CVE-2022-49532,0,1,94d5ff4fc61833102a7b8fbc940fee18275fc1e57c304383247500e2c0ecef4f,2025-02-26T07:01:29.170000 +CVE-2022-49533,0,1,e80337bcb9c0881aa9f0a3bd03f41eefd6c9615b38b434713fc87e091747fa6f,2025-02-26T07:01:29.293000 +CVE-2022-49534,0,1,721ea208289ef1668f018b3eb2dde36e42f39a1e7637063c7f28d8226981c151,2025-02-26T07:01:29.400000 +CVE-2022-49535,0,1,92cab0cd39cfef2a55835e1ebf7d99723233351d9e8f9dc3382724c7f95e01f1,2025-02-27T19:15:45.573000 +CVE-2022-49536,0,1,e12ce931c66209fc9bc3949c5b3b79e06b4dd90c26290f7645b68c0e2f3c102f,2025-02-26T07:01:29.580000 +CVE-2022-49537,0,1,89955c5c15297ddc3d4a900be6d2d64c3ca5d393c27e7504de7e55af92e676ab,2025-02-26T07:01:29.667000 +CVE-2022-49538,0,1,9cdab7811c29220ab0b728a88ab160b531922e6764dfb80eac562ee4f6e72d55,2025-02-26T07:01:29.760000 +CVE-2022-49539,0,1,9abf8fdb7a0343623ef24e9040650b02834e07ba8ddb3e6cf863ee05e9cdaa66,2025-02-26T07:01:29.857000 CVE-2022-4954,0,0,3d35faeb50ff70fc83ed96ba4420fbc0348e83af9bccccd35fe117bc65a97504,2024-11-21T07:36:19.187000 -CVE-2022-49540,0,0,b20798b9cefde9279b648b30e81bc9cecf411001f17726de6b5f727b45849e25,2025-02-26T07:01:29.947000 -CVE-2022-49541,0,0,f85c6975d75e04baa0124797ff3b25fc672e7cf463cf067376e37662220a1cbd,2025-02-26T07:01:30.043000 -CVE-2022-49542,0,0,afd6b1cbd01c292002485a76ff6e8471906cbf078ebcd87d431eeece21b35497,2025-02-26T07:01:30.133000 -CVE-2022-49543,0,0,5639725731ecd4c53910c33529346b0da2c922793109ad186124a818c3a9a93c,2025-02-26T07:01:30.220000 -CVE-2022-49544,0,0,3da417bbc84808fefa546f3b86170ae113b81845ba60dd8a37a80fa884086ba8,2025-02-26T07:01:30.313000 -CVE-2022-49545,0,0,6c4e4ea0447e356a84ce8939dd7f7d959d36711760d8daa00bf2bc1d02929ab0,2025-02-26T07:01:30.410000 -CVE-2022-49546,0,0,91dec8fdfe3d3f00b20651609cc8c9b2d03b1df3fbfa60b0c58e971dbe493956,2025-02-26T07:01:30.500000 -CVE-2022-49547,0,0,69f2189de2b3f62ac5bf90c75c495783f4b783189df4e6f5c50fe2085ac386bf,2025-02-26T07:01:30.590000 -CVE-2022-49548,0,0,a47950b302e512c0f99519d13413ff3a49e9f061dca6b24104b7739de06d2ea2,2025-02-26T07:01:30.683000 -CVE-2022-49549,0,0,9200d0e78cef7dcd520fe581d99c3038af4e8c4fee4e408e660bb7562a2e8012,2025-02-26T07:01:30.773000 +CVE-2022-49540,0,1,f5f5eb0e41a09add2ea5b919e3860861f03bbedd77dcfde124c746425104115e,2025-02-26T07:01:29.947000 +CVE-2022-49541,0,1,b2296039e33b99211613e46b9d0d4233c537e0817cdfceabe669e4a4f0762186,2025-02-26T07:01:30.043000 +CVE-2022-49542,0,1,b6f252d76346d9e307100d26351ee554c9faeec47be2a3bb27e66036ba29674f,2025-02-26T07:01:30.133000 +CVE-2022-49543,0,1,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000 +CVE-2022-49544,0,1,b269162714fad49db756668cd97f37b5f4d33aaa6828e7bff75ead6a2acbe2e1,2025-02-26T07:01:30.313000 +CVE-2022-49545,0,1,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000 +CVE-2022-49546,0,1,7f8684c96998813c09b86e51eeae83cef4f6b68e267a0e325652ed2fc6c8a5d0,2025-02-26T07:01:30.500000 +CVE-2022-49547,0,1,d4defc86e2363ca8afdc4ac90a9c1d499adc5683239ec0f2e6c7948d17c28de5,2025-02-26T07:01:30.590000 +CVE-2022-49548,0,1,c95d42cb79c7d629faff5b699dea854e50455ebf18ac4b59cd2b80402f865ce8,2025-02-26T07:01:30.683000 +CVE-2022-49549,0,1,4459fa625d2f61d7a968ab894fd182917fa820e9a1dc35014b7d0594f7e7c073,2025-02-26T07:01:30.773000 CVE-2022-4955,0,0,94df8e1948dbb5187c1ece47af6795f51d100c945ff4ef8af1e29d9575313920,2024-11-21T07:36:19.300000 -CVE-2022-49550,0,0,751fe5ac67275c18160398a69c29f970f26d32c2fd84e08e0f10d72463f0e787,2025-02-26T07:01:30.863000 -CVE-2022-49551,0,0,95593c99fa4f20a5468a64b622eadc81f237749a0a59c3f6793c2b2d22dabbde,2025-02-26T07:01:30.950000 -CVE-2022-49552,0,0,259736997fa98da0cb8394ccaefcf889152bce599c889f4765ef6e137b5182a9,2025-02-26T07:01:31.040000 -CVE-2022-49553,0,0,dfd1db2f255d0d4944bbf731239995df6bbd0540c796bdd6f44ecffdc77dd668,2025-02-26T07:01:31.133000 -CVE-2022-49554,0,0,219eb0e775aee91be4168e4dd3d344c791de7032acc27456a43d7b03aa2fdf84,2025-02-26T07:01:31.223000 -CVE-2022-49555,0,0,c11d4577c8dfcca1bead6893055decf5dde218dccf1ce97d68c7dcb68baa38d4,2025-02-26T07:01:31.313000 -CVE-2022-49556,0,0,7d0e5317839d5499fdaf6c75bde739bbe441ffb7d60b693214d91b004e426bbc,2025-02-26T07:01:31.407000 -CVE-2022-49557,0,0,59fead43c74d9fc2581138b68aad378ffd329d960ed31527957e4612337a04ec,2025-02-26T07:01:31.503000 -CVE-2022-49558,0,0,a2c92fd12497eb2cbdc0cc6f454d67d80c885e8e77f30bd48e25de458260e9c3,2025-02-26T07:01:31.597000 -CVE-2022-49559,0,0,6183835e734c9c71f23b2b1d7ff73e3ee7fc6bd265fa4b315465c13fe73bea56,2025-02-26T07:01:31.687000 +CVE-2022-49550,0,1,2ab6c336eb52122ef28518e947bc4fbc556b44350cc2c27c1cabde267946af59,2025-02-26T07:01:30.863000 +CVE-2022-49551,0,1,6eea955fbadf8fff97eaa1e6a1b2c03b9ba652d30748e9fb256aff58e7798c47,2025-02-26T07:01:30.950000 +CVE-2022-49552,0,1,f11c27e4e83d55bc6a4b43d73b66fccce60f2ae33db072582aed8afda75d2ace,2025-02-26T07:01:31.040000 +CVE-2022-49553,0,1,772e59df9eafc84178e8fbd577b3acce3311378fd173eb34867b0a6e996987fb,2025-02-26T07:01:31.133000 +CVE-2022-49554,0,1,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4ca81,2025-02-26T07:01:31.223000 +CVE-2022-49555,0,1,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000 +CVE-2022-49556,0,1,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000 +CVE-2022-49557,0,1,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000 +CVE-2022-49558,0,1,daac90093d49c8372e444573abe119e8081a887b8d43470c5dabb6cb87a504ff,2025-02-26T07:01:31.597000 +CVE-2022-49559,0,1,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000 CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000 -CVE-2022-49560,0,0,a7152f17279319e9239b489972edeb73e1cc1e35c832b3011fd63128c4977c53,2025-02-26T07:01:31.780000 -CVE-2022-49561,0,0,5c4efceeb89a37cdbe22e3c49e728014e9a77e76085773b4ff6665ab95efead9,2025-02-26T07:01:31.877000 -CVE-2022-49562,0,0,af2b002d41dd6526944c66d5bc66d7d74b17c874d107b6cff1671e3e665e7a5a,2025-02-26T07:01:31.970000 -CVE-2022-49563,0,0,c0787ddd3c6195c1976cdf2fce8c6e07e1b8654f1131d17ab4adcfb5d37665ff,2025-02-26T07:01:32.060000 -CVE-2022-49564,0,0,02919d1c23b33d420f8dcd8949fc5e586c6238c3990599fd62c91e00281ea6ce,2025-02-26T07:01:32.150000 -CVE-2022-49565,0,0,fca28bc0a2d5ab25c046abac13c6aabb65354ec003567428c6de388c07f18101,2025-02-26T07:01:32.240000 -CVE-2022-49566,0,0,3b51cda13ec24aa4ccaadc59981afd501383f8b654302876d5ce19cf437d1c94,2025-02-26T07:01:32.333000 -CVE-2022-49567,0,0,e45cbdf4d7772b6f29ebf8e9a8c5a62e1ab2f37408b085b56c92f5dcad9cc7aa,2025-02-26T07:01:32.420000 -CVE-2022-49568,0,0,0128779bb440c1c4557090b47a4b43ed240c97cf25c313bf074c0e312068803b,2025-02-26T07:01:32.517000 -CVE-2022-49569,0,0,f729e3cae28ea331d83db0b0560d56a8ddd7089f13b2432ff79b9c09c822e269,2025-02-26T07:01:32.607000 +CVE-2022-49560,0,1,98a4136fcca252e1e2ff1b3931e39fe0b0949fc125619390e8528773f197ec99,2025-02-26T07:01:31.780000 +CVE-2022-49561,0,1,25ad39aa076e1bcf300a6537a852372a47057435c10de10a39571490ebbe9d4c,2025-02-26T07:01:31.877000 +CVE-2022-49562,0,1,6314c278dd709f1ad88da8450e2c6c09af54c9ff27b760022aca36a1e76506c8,2025-02-26T07:01:31.970000 +CVE-2022-49563,0,1,e647577800ffa6400a4a18beab7e745c11eb9ff79b9e1bd15ff0f624b986165f,2025-02-26T07:01:32.060000 +CVE-2022-49564,0,1,9ec57663c1c43db786d5a0afa63b5c45413561c04b3a89667c3889a76fdec882,2025-02-26T07:01:32.150000 +CVE-2022-49565,0,1,ac3e04ce7d0c052b88c34a7c1e5024db2ecfab84cc13c36cccc937b804a38d1e,2025-02-26T07:01:32.240000 +CVE-2022-49566,0,1,56971a0cad10b2c863953d7443e239ff63448842ac987801abc68e033424fa30,2025-02-26T07:01:32.333000 +CVE-2022-49567,0,1,3b415a91e3a66e6da3781ebed9395e49cb7324876262910d16ad2aee0db78542,2025-02-26T07:01:32.420000 +CVE-2022-49568,0,1,17e91ce62cf7c0fa7ac56ed868128a18075397026ab2a0b672826c29b2b07010,2025-02-26T07:01:32.517000 +CVE-2022-49569,0,1,3d20598e3f82f9fdbe3204b04a2a4a47cef8c987ddd895061b1764fb4d2e752f,2025-02-26T07:01:32.607000 CVE-2022-4957,0,0,0f59f801825d8335616db50df55384f4a214170b9e1eeee6c3796753d9651f88,2024-11-21T07:36:19.570000 -CVE-2022-49570,0,0,c66b56bd9be8b0f72bf40d1c4bcefd3a04eeae70fea01fdb77113c3a13bea57f,2025-02-26T07:01:32.693000 -CVE-2022-49571,0,0,1dcf9aab0a7ed202b744b6f976b6868944bb97cb72f62e8bec97faf9191424d6,2025-02-26T07:01:32.780000 -CVE-2022-49572,0,0,30ed21c02f989be0ce6291aeadf173db5e2795cb9f7384e7cd7e5a9750499e3c,2025-02-26T07:01:32.877000 -CVE-2022-49573,0,0,af876306787cdb0572ae9f8592572cfef09d45795c2f9ab3f2b4d92f15bb32a0,2025-02-26T07:01:32.970000 -CVE-2022-49574,0,0,57c693917fe9f1c2d6e68ece3b830038a37748d45cc5732b37d0283c80d2e9b2,2025-02-26T07:01:33.063000 -CVE-2022-49575,0,0,b4ccafdb6fea25bd3240c69853632a7799617841c48a26148b5674880b941f03,2025-02-26T07:01:33.157000 -CVE-2022-49576,0,0,cb84ce9937115deb39af6f3a6d7d9824b4efa7071702d21b2918aba882732c80,2025-02-26T07:01:33.243000 -CVE-2022-49577,0,0,1f9b1c18e2656e9ef967aecb05a15d948fc7c9f62c86eb1e60ce7813c6bfa3f3,2025-02-26T07:01:33.333000 -CVE-2022-49578,0,0,ca44ac101943221363e1f2d11fd1d0e64ed8fdd90137d6c35309d09927c02e75,2025-02-26T07:01:33.433000 -CVE-2022-49579,0,0,0c967822d0b5f6f5e52083e0fc39b252dbb0c81d6de8f4d0e5f550b903aff638,2025-02-26T07:01:33.520000 +CVE-2022-49570,0,1,124325303d535b4cd557c3ed0809fe196742dba47308c8abafab92a80da3d75d,2025-02-26T07:01:32.693000 +CVE-2022-49571,0,1,27ed5c1736d8e496c0a6a348b2f3ad7ac65cd7fb7286b0025d11e9ecfa6561a0,2025-02-26T07:01:32.780000 +CVE-2022-49572,0,1,ce49775144acc984a35c21f66344062872b2b2c2d39be92a51e08ef7e81f01bd,2025-02-26T07:01:32.877000 +CVE-2022-49573,0,1,92514bc902c4efe9275eb63df558068e687344c06a60a6a28c7e4e003f81b3b6,2025-02-26T07:01:32.970000 +CVE-2022-49574,0,1,29aea0bffd6b00ffecf952e7ce7e8aec6be016b76cfcc92a2fa7ea5f3cb0c79e,2025-02-26T07:01:33.063000 +CVE-2022-49575,0,1,efaa16654f62adf14ac318eef98b56de039770a39835cec9c58119e5d48a3c55,2025-02-26T07:01:33.157000 +CVE-2022-49576,0,1,f6ceb6c6347da5dcc1ca492ffeb7cff7e0cae7eb35e5276ab11ae3116f542b9f,2025-02-26T07:01:33.243000 +CVE-2022-49577,0,1,4c198f80ccd4569a69d80b95cadec02fd7a8d05c9d20ee2b489898b1de59a8c8,2025-02-26T07:01:33.333000 +CVE-2022-49578,0,1,a82d9d7480f07cf31e84728cf168241903c9064ff176db50638788f17d0ab085,2025-02-26T07:01:33.433000 +CVE-2022-49579,0,1,4128bc7bd3cc55d6d2c8ed4a1cb3f28af01f5655dd7b93c8a800e5e7ffa4268f,2025-02-26T07:01:33.520000 CVE-2022-4958,0,0,d6d6128b8fdd4a8fe744760bd37908b3ed213bef3370b8b8a46a12919160ac31,2024-11-21T07:36:19.707000 -CVE-2022-49580,0,0,d594d9aca8388720d8d1c9581039a5938e435b07d8811071a94602a6183a770c,2025-02-26T07:01:33.610000 -CVE-2022-49581,0,0,79b4726d321eb5c23772cf8160b9c440d47288826de5bea32beb265ea085dfc4,2025-02-26T07:01:33.703000 -CVE-2022-49582,0,0,36f43be6bf1ed79df8a25eee40e2f5935acef8f157e9fe1f20e9058aba1721f0,2025-02-26T07:01:33.807000 -CVE-2022-49583,0,0,49e91a7f2f676e6adfe1814728ac19e95adff78350fcbdc13f06e4301bbf298c,2025-02-26T07:01:33.897000 -CVE-2022-49584,0,0,1ae1a71613ea74f9d3ed34fcab8749281b49d746ac7e3f75bf85e747143b0f84,2025-02-26T07:01:33.987000 -CVE-2022-49585,0,0,501bf256d1faf74223f0ee50cea050fe60a5161b76f48e15265f28b25860d632,2025-02-26T07:01:34.080000 -CVE-2022-49586,0,0,4c4ff52b1836084b086631227d01c155304c56ba96ac57bd2efeea469d886718,2025-02-26T07:01:34.167000 -CVE-2022-49587,0,0,70bd2ae85fe9ed439b0378ab5d182eed681991be907509742a0fb5aab0ef2946,2025-02-26T07:01:34.260000 -CVE-2022-49588,0,0,048fc2bb7a6bd5c2a422b723a5efaa3058768d4183e54b45002e978e54653369,2025-02-26T07:01:34.367000 -CVE-2022-49589,0,0,74bc234680203a62e3dd7ac5a79de34578009b7e19c1bb0742d2a9ea0746057e,2025-02-26T07:01:34.470000 +CVE-2022-49580,0,1,2df7db078932c74a6d69e2c6989d7f07119185065bf6230a55de7638c0476bc5,2025-02-26T07:01:33.610000 +CVE-2022-49581,0,1,05efcc8772be9c6510c4c0ac471c31fc2b234f12de9236a552a715e84676dcaf,2025-02-26T07:01:33.703000 +CVE-2022-49582,0,1,9cbe7774c9a3f50fa82b9373e99341c46c27a4eb110f7a516698754ae566c6df,2025-02-26T07:01:33.807000 +CVE-2022-49583,0,1,4847dbb47b6a9a1afaea40e33a1c079840e770cafc21edf5f4a1249d9cbb92ca,2025-02-26T07:01:33.897000 +CVE-2022-49584,0,1,c230661b2449e440c4ee0158ce975d92b2e0a1edb3638ddb3b5109cdecb54b9e,2025-02-26T07:01:33.987000 +CVE-2022-49585,0,1,f259a45d52396142a327a607aaffb3c3f5f7b08593130f68a1ab70b7ab8c5cde,2025-02-26T07:01:34.080000 +CVE-2022-49586,0,1,018cdb67992614e3b8aaef86f63708e76709361132b17cad1f7019f3eb32a41c,2025-02-26T07:01:34.167000 +CVE-2022-49587,0,1,045dfa49579766af5db3b307fa6fccc91442356d8f98685bbe7c4c2e730f75b2,2025-02-26T07:01:34.260000 +CVE-2022-49588,0,1,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000 +CVE-2022-49589,0,1,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000 CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000 -CVE-2022-49590,0,0,c4a604065fe1ae5da0b23ed334586c13567eaf6ce8ae833120da97351e393b66,2025-02-26T07:01:34.573000 -CVE-2022-49591,0,0,c805b54ad017c833a8adb1533a6d885608f80dbb348f935aefc63521a6232cdd,2025-02-26T07:01:34.667000 -CVE-2022-49592,0,0,e8a1eaaf4e8752d192deca0255f401527531d4640d3adc267adfbce6907a0c3d,2025-02-26T07:01:34.760000 -CVE-2022-49593,0,0,6dc101f591606db359b517664c2e3a258d3f07d7cdfe279fd5ee97709ad97327,2025-02-26T07:01:34.853000 -CVE-2022-49594,0,0,c53c7426da9e42b50126b3da7a7e0ce31a6edf8289dd0d8d938fcd2b6a146fae,2025-02-26T07:01:34.947000 -CVE-2022-49595,0,0,dd36051365566dcb879c6465b3e909aaa70e1d224b9fd0c15a917efa977f684b,2025-02-26T07:01:35.040000 -CVE-2022-49596,0,0,e5bb2b108a3aded95713c07f8a4276850cc7873589965c60fc435a2d0ad238c9,2025-02-26T07:01:35.133000 -CVE-2022-49597,0,0,20d8966f8481fa4ccfc65a91cbe180ef417637fe4d36398bdf95fa75793f241e,2025-02-26T07:01:35.220000 -CVE-2022-49598,0,0,963dcd8fccc8346ea877d644a312e74bf9c232271e59692221e51214ec27ceb1,2025-02-26T07:01:35.310000 -CVE-2022-49599,0,0,4bb1fe2210843bb9fa604bc6c0e246aa87ae4d61b52274fba682293ee1c518ea,2025-02-26T07:01:35.403000 +CVE-2022-49590,0,1,e901dd69c67dc719a295c49d0b508bca98a06b0bf33b9e656239520776a1187e,2025-02-26T07:01:34.573000 +CVE-2022-49591,0,1,cf3ff33bf8faedc1e67d17369ac2be6e3a5a1baf8540a23bdbb24c08298a0012,2025-02-26T07:01:34.667000 +CVE-2022-49592,0,1,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000 +CVE-2022-49593,0,1,e5f1303a652842d3b18f50e804cbd8b7648b3bc37458a06fe6db95793bb227fb,2025-02-26T07:01:34.853000 +CVE-2022-49594,0,1,cd4b7b4e5b4bbbf1c4c76df7cdb5a625b549e358714ddf40517b32b3e1240580,2025-02-26T07:01:34.947000 +CVE-2022-49595,0,1,422f7e67ccc1235d8f9da3cba0a8531a9af59ec4580cfa63212ec1ad1606679b,2025-02-26T07:01:35.040000 +CVE-2022-49596,0,1,2dd4161256225c6c674124c7459b85f3943c1f0aa622a2edb991ee572c0724e9,2025-02-26T07:01:35.133000 +CVE-2022-49597,0,1,9aae8a41dfa5e280af982ea517cc043e654120719e830ffaabcf01ba0c57e46a,2025-02-26T07:01:35.220000 +CVE-2022-49598,0,1,852460f00e7b8a6601c3cf4a55aa9bcd60ab4e99e5a0f42ec71331284fdc5767,2025-02-26T07:01:35.310000 +CVE-2022-49599,0,1,f7dd814f9c7e8eb79adfc8bf1928c5ea2c0239a0e501695d0bba13ec00d3f2ed,2025-02-26T07:01:35.403000 CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000 -CVE-2022-49600,0,0,ffe3fdc6c2c7e825d70b716cb0a85b869853266256e17c72b3e02c700f2dc4b6,2025-02-26T07:01:35.497000 -CVE-2022-49601,0,0,2d9ee5f27774363aae66ba1239ee784d617d46b583da76645ea2dbfaa5c95143,2025-02-26T07:01:35.603000 -CVE-2022-49602,0,0,6eb4ea3369966d0f6e1891ede22bad5c20d1d57f88d1be261063e640e1111240,2025-02-26T07:01:35.717000 -CVE-2022-49603,0,0,5324ed63a16d305a1af080f7f0783205c879a9670db11c5a626579593ccb9d95,2025-02-26T07:01:35.817000 -CVE-2022-49604,0,0,a92bc8ae094ee58e8aee094b654359f4d9ad77d290fc38c5d126946d6f1400f0,2025-02-26T07:01:35.910000 -CVE-2022-49605,0,0,1fe4b4b249c692ad7e0570e1c435c1ff5c9f03d6a14df6c480c3a5d9a21da846,2025-02-26T07:01:36 -CVE-2022-49606,0,0,964a25fbf709071777fc970ef9bc856749d7b6c25e72f821f63e54f3fce5cf69,2025-02-26T07:01:36.093000 -CVE-2022-49607,0,0,adaf6cc7ef977c4a9db45b36a105027511ba2f2513068f337b5ed751c064ebf8,2025-02-26T07:01:36.180000 -CVE-2022-49608,0,0,32b3038135f6d57ad7afdd72453122ee907cfbfe59bc200f89ceebf6ad23888a,2025-02-26T07:01:36.270000 -CVE-2022-49609,0,0,53d6e48a4c8c36704b490fa75a7550efc22693fb22c2c7798a8d8c1f24f2f6fa,2025-02-26T07:01:36.363000 +CVE-2022-49600,0,1,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000 +CVE-2022-49601,0,1,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000 +CVE-2022-49602,0,1,25ebe11619a5597cd5a4e9e6381d159d8ccb03142538a1487e9bb3f1e8729c46,2025-02-26T07:01:35.717000 +CVE-2022-49603,0,1,237408378321f24803de15ca5b6905804b1ec3c7a742910425fea9db0156a98e,2025-02-26T07:01:35.817000 +CVE-2022-49604,0,1,9f79b32d51aac2b2a8bc0096308591bb87f5e3d31778838e243efe12de8321ea,2025-02-26T07:01:35.910000 +CVE-2022-49605,0,1,81564a466da5c8e8a9e89309cc4c57761b20c12bdbbfaf8a4154aaa81300b2f4,2025-02-26T07:01:36 +CVE-2022-49606,0,1,b4136faf8c7d11956847f93df6097107ca4f9830a00cb15762b94df74585521f,2025-02-26T07:01:36.093000 +CVE-2022-49607,0,1,ac2a2a31a5fd14f5392c600b4e11f4ace29fd5e8c855cacf53e4de2187a5523d,2025-02-26T07:01:36.180000 +CVE-2022-49608,0,1,c866593117934caedf12cf25ef75f0420115d5a23b7e2adef8a8c7f089c48e46,2025-02-26T07:01:36.270000 +CVE-2022-49609,0,1,525370730d79aabc9a34e3bef8ede13bfc62ba53ac0a2d56d118c8f878ecc1c2,2025-02-26T07:01:36.363000 CVE-2022-4961,0,0,05f2ffcd05e2d23e254218df57459bbdd8360d7bb570b059f299fba2169a2704,2024-11-21T07:36:20.120000 -CVE-2022-49610,0,0,11b5a741a8054dcf8044636dde3381cfa8eac599bbb5ea22242896e6e1679277,2025-02-26T07:01:36.463000 -CVE-2022-49611,0,0,344d38f5eab50eea56caa9422631db07ee9671baffd8abf944c9db4ed0aee250,2025-02-26T07:01:36.553000 -CVE-2022-49612,0,0,2304ed49ca77900bbe6ecb264baeb49d9a781e8df8e6bb309cd271ed227476d6,2025-02-26T07:01:36.653000 -CVE-2022-49613,0,0,da1a5bf1db738f16b89390b6e2be1b8d2a6beeabebad38e0c4b03ad5c9f896d6,2025-02-26T07:01:36.747000 +CVE-2022-49610,0,1,9632ec089628b3a3e283f96fc45c03469f6a5410238e11a8b089813d343ea6fe,2025-02-26T07:01:36.463000 +CVE-2022-49611,0,1,8111830a6215ddb0fe2a956868525b6f9532c8f59a9366f27f9f3f0d1526cc67,2025-02-26T07:01:36.553000 +CVE-2022-49612,0,1,881cd933fa62ec04545a34bcba5215cd8aa457f9744293b374bbfc29eea376d0,2025-02-26T07:01:36.653000 +CVE-2022-49613,0,1,2f6880cd9536b6484f0d7a54a0d250be6f0f33d09b238dfc2f4fa8462588df86,2025-02-26T07:01:36.747000 CVE-2022-49614,0,0,0c0cc93db34eafc8b46e404b2ade125e91ff81e0ea0c0d87408e17b6f9894992,2025-03-06T16:15:39.210000 -CVE-2022-49615,0,0,a88266d354085e1f96d25159fa3a20937819653dfacffa5ca2d6f580833df806,2025-02-26T07:01:36.927000 -CVE-2022-49616,0,0,a4611de63852c409b6a8f685741acf172ec192405385f97e33645e097bc948f7,2025-02-26T07:01:37.017000 -CVE-2022-49617,0,0,5b4bf5ee3ce7fea08e636f4ed9b4e7855593e6366c99a2330427ae648aeb3904,2025-02-26T07:01:37.107000 -CVE-2022-49618,0,0,f04321bbb25b5500424cf7bc62a995dd5e3bf99df26dfb4a7f427a321bad1d31,2025-02-26T07:01:37.197000 -CVE-2022-49619,0,0,38df8b5c04b2a4578fbceceabd18781714dc04a16b833b006ad222adda365238,2025-02-26T07:01:37.290000 +CVE-2022-49615,0,1,8d578979845876d31891c5f60852941ce5f0070b775e2c645192379b52ee8e53,2025-02-26T07:01:36.927000 +CVE-2022-49616,0,1,bdf0dc40c44ee04837679d239d916c9b171c9018d8f231acab3c09b56455b7db,2025-02-26T07:01:37.017000 +CVE-2022-49617,0,1,ebec9884dd1a40528fb56bb4a6c950a7db9bb05155d3b1fc4b853d0170d3999b,2025-02-26T07:01:37.107000 +CVE-2022-49618,0,1,1d462bc3ce891bb4d43325a74c1e4174a940bd8692b36352d2a7d505fb44ea62,2025-02-26T07:01:37.197000 +CVE-2022-49619,0,1,fccbe852fc08b24de448184425ebeee51096edb6938408a2024cebcbaf6c7ed6,2025-02-26T07:01:37.290000 CVE-2022-4962,0,0,386805a0e4416acdab18cedde9e47f610c5ba3ec156161822cfc562e819f4b4c,2024-11-21T07:36:20.270000 -CVE-2022-49620,0,0,27bfdf936da2421f5f20bee1f17a468991ef9c84ea33da9b86ebaab79fdca762,2025-02-26T07:01:37.387000 -CVE-2022-49621,0,0,d36e1ea5e5b81d0ea4e4011d4565adeee18e32a4acac30cbf37fe71649794d72,2025-02-26T07:01:37.487000 -CVE-2022-49622,0,0,d45d50f649ad5d33fed9f6a576ce0e78c881d06600fe3c035d97bf70df076b5d,2025-02-27T19:15:45.707000 -CVE-2022-49623,0,0,6ff06832f5c5843a65101bd1a5e62572b8e61535b924325db76861b9b33ce60a,2025-02-26T07:01:37.663000 -CVE-2022-49624,0,0,ab0d3162a2073696bdb4278c6b6811879a423a15d26346e4f8f5b9e905152817,2025-02-26T07:01:37.753000 -CVE-2022-49625,0,0,6870f847f8a744f60dac0e734771f7f52c696ab0b3f073a7975076d312b25fd8,2025-02-26T07:01:37.847000 -CVE-2022-49626,0,0,4353a65f1a99788c052b1c8611786763f949c78a1b7cbd81e4eab207e4b78fb0,2025-02-27T19:15:45.850000 -CVE-2022-49627,0,0,bde88792e25cc4b11ab31c08c3cb66ed16fed8d7b85efa250ecf51d96bea680c,2025-02-26T07:01:38.030000 -CVE-2022-49628,0,0,6e519d7f6c53062f22b344e4f50790bb11c7e144d17f4c56bb89a1143a225067,2025-02-26T07:01:38.117000 -CVE-2022-49629,0,0,5bebc3810a96a789e580809904ed4bcf34593023fc185ed1ef3e3d5cd52cec10,2025-02-26T07:01:38.200000 +CVE-2022-49620,0,1,3dc94f29a0c86abfc4db8eb3336661690d9fa12776c7a57e320a9305c0a60196,2025-02-26T07:01:37.387000 +CVE-2022-49621,0,1,1d3527890496715a2cf14c92f41d2a186835455323baa9d1828654ec51fb4cf7,2025-02-26T07:01:37.487000 +CVE-2022-49622,0,1,5ec40fdac5a28aa69fe760fdb55978b5c57530cf17ab235042b3cbc506b1791f,2025-02-27T19:15:45.707000 +CVE-2022-49623,0,1,ba8ee2d210181e942219c2b0f6c4bfe0b2498afdd6b3d0ccafde223861ee0476,2025-02-26T07:01:37.663000 +CVE-2022-49624,0,1,8daf94741fd4bfd341c15f574119255b10de06c06b501849b7f2eff9ebcce2f9,2025-02-26T07:01:37.753000 +CVE-2022-49625,0,1,a666226bbaeda20bfc58662e730585169c700df883534fb3d2b3980f09237b10,2025-02-26T07:01:37.847000 +CVE-2022-49626,0,1,451a051341b6677d685a6aad1a7c880d094ede0b39b1f804406d912925a0a57a,2025-02-27T19:15:45.850000 +CVE-2022-49627,0,1,5427de40ccb2b55372a59d818dff960d7a6c38e07dc00d27196376ac1fe3af6a,2025-02-26T07:01:38.030000 +CVE-2022-49628,0,1,450e5712615f0c17c8ff952909dcbf6671bdf291bd4ffd5761a2592c2f23c2e2,2025-02-26T07:01:38.117000 +CVE-2022-49629,0,1,4b2862fb33b1ff2fe3cfb6deb5161a57fcb21c344a687efa0e88bd3910d549db,2025-02-26T07:01:38.200000 CVE-2022-4963,0,0,d98d4c1e804634cc06ab791fc290767186ddd762bdf3926697d901e23749d3c4,2025-03-05T18:24:35.503000 -CVE-2022-49630,0,0,551fbe20a57d7813689434a100e3e508b902b920a782226ad8bb3197e9e06c2b,2025-02-26T07:01:38.290000 -CVE-2022-49631,0,0,51a7231d2ee2840d6f5c3d086df2ee7d1d404b6fdf797487db3d58d1a2e42719,2025-02-26T07:01:38.380000 -CVE-2022-49632,0,0,8f0aa7e3c1237674c3d89b2eec5e12f64d1125279ae3a796556ffad4c11c4993,2025-02-26T07:01:38.470000 -CVE-2022-49633,0,0,c8e80f7e92e0287924d3b2d783a4c2310078aed789efca3c2cd49eaec2e25964,2025-02-26T07:01:38.560000 -CVE-2022-49634,0,0,d869f9a8a90c8372c83f4c70e5dc420b135fb034669d3890b3772118167ddadc,2025-02-26T07:01:38.647000 -CVE-2022-49635,0,0,c99276acd89818eaf50554065998f11fe92b505c46d7491498f625c5e8403a0e,2025-02-26T07:01:38.733000 -CVE-2022-49636,0,0,33f043a7440473504c308fa92e6ec7283e5a7947b4a49cc8988a2a0a54172e8a,2025-02-26T07:01:38.827000 -CVE-2022-49637,0,0,13c4677c5c9bd90cf070d34c0fde470b69af5c74e2cb5a641f3acdc46e188a9b,2025-02-26T07:01:38.920000 -CVE-2022-49638,0,0,75cc2ea55357651b47f54702765fbe56fe184e1a78c24a1c649617bb0608cd1a,2025-02-26T07:01:39.010000 -CVE-2022-49639,0,0,b809595982782939962a3d5454e702f13a95b7b3b39bb453c592e9eb24be4546,2025-02-26T07:01:39.100000 +CVE-2022-49630,0,1,351f41122d628be75e6a251d8de0fbff28a480a66c97add6c3a512afb066f77b,2025-02-26T07:01:38.290000 +CVE-2022-49631,0,1,0f4f5b27142d665735f839ad66a22a5e7121b9b55406552e3bfb71a7e71d77ce,2025-02-26T07:01:38.380000 +CVE-2022-49632,0,1,6ea50294a14e1237dbba913abc465e20f66e729762fd05a607540e34cf7e1913,2025-02-26T07:01:38.470000 +CVE-2022-49633,0,1,429b07cc381012504ea41f8f88c1a35c0e4d742947a0369ca15c546bfb4b4354,2025-02-26T07:01:38.560000 +CVE-2022-49634,0,1,e1f8e402ebec0368976322412081f24e9ec2c99b60bfc62890fd9dcb916645aa,2025-02-26T07:01:38.647000 +CVE-2022-49635,0,1,acb2b4ba624516c0ac8db97854d6e55fff9e0d10b1b963077ffc8057b1f5357d,2025-02-26T07:01:38.733000 +CVE-2022-49636,0,1,698b47948fd76a87564d55b9d39fe893391aa4bc78b9152cbfda45c4f7c7597a,2025-02-26T07:01:38.827000 +CVE-2022-49637,0,1,75bbcfb20a16c0215fd91a25c236b77a7a10984e4222a7a97cd9d1662ef7ec0b,2025-02-26T07:01:38.920000 +CVE-2022-49638,0,1,c3679e493dfeac5520347c46fd0db5da6d672e3235f462d27ce275c9cbac1068,2025-02-26T07:01:39.010000 +CVE-2022-49639,0,1,c0f010e2348a8333d664bc095c687ac97c6ac9eb962af10e7305fdb98265821b,2025-02-26T07:01:39.100000 CVE-2022-4964,0,0,6b85e135c4fc3ab619388ff7b8392e5e6a2cdd14202905220d049a92e07cc5e3,2024-11-21T07:36:20.560000 -CVE-2022-49640,0,0,a3d04f1cd8538bc98e48ab8afef569497353478d2ea4efefe3d12d2f6e4c01f3,2025-02-26T07:01:39.193000 -CVE-2022-49641,0,0,83d7fae6952a30d3d49d48d2cc7effff681106f5668b36f38821b695664f7368,2025-02-26T07:01:39.280000 -CVE-2022-49642,0,0,503a874d4b660e1b3c8ad627c4fa71fc7fd8f59cda9454dca22bc2b9cbbc97a4,2025-02-26T07:01:39.373000 -CVE-2022-49643,0,0,119b45b13425737830e2cc1e5d114195525be8bb8512b2e51032e6e09b4d7672,2025-02-26T07:01:39.467000 -CVE-2022-49644,0,0,c2350e7318113d57ace9328512469934b68160cc13333b86e9b121829c4b689d,2025-02-26T07:01:39.567000 -CVE-2022-49645,0,0,11581dfba9f6489b9b16b40983e91bef3b33ef5cdd8efef643d5406ddaa72522,2025-02-26T07:01:39.677000 -CVE-2022-49646,0,0,86d54c3cebf3df236f15431be403ba5ad8fc1fc0356c14b42bdceb92d21166f7,2025-02-26T07:01:39.777000 -CVE-2022-49647,0,0,1743dacfcbd6af91395a0d474f140b8e2672835b767270eb0b91f2659f0427aa,2025-02-27T19:15:45.990000 -CVE-2022-49648,0,0,94ec4bb781a2270cfbd7f54d9b0bba7fe4cb8b420ccc9adff3cf019f89ba72b0,2025-02-26T07:01:39.957000 -CVE-2022-49649,0,0,0f2864b541fe05c8c6a145cdce99680529bdc8c8d6f20a30282b37ff5cc493f9,2025-02-26T07:01:40.050000 +CVE-2022-49640,0,1,34b42344094f35d846463a411d73b368cf33e18a19c1bcb2830a06671ffef9aa,2025-02-26T07:01:39.193000 +CVE-2022-49641,0,1,67a28978fdce99a4e8d640da1d3d8ec618d0c432c7bfbed7fc896a8e7b5c0e70,2025-02-26T07:01:39.280000 +CVE-2022-49642,0,1,eed9507f855969a103ffaadd6b2826b1bbce172df653364510dad2cb54ced6ce,2025-02-26T07:01:39.373000 +CVE-2022-49643,0,1,ca20a24f156819fd486e2f6347c1a1f865812c9b7fc45f7c79555cfd1e20f0f4,2025-02-26T07:01:39.467000 +CVE-2022-49644,0,1,0446a2baf8b8e435b3c81342749346908c99cfbe4bdb59a44ff4667196e54667,2025-02-26T07:01:39.567000 +CVE-2022-49645,0,1,7e18657ecaeca65c8c275650971ed38c7bc18f166ae31abf789c2b4f5948d0c1,2025-02-26T07:01:39.677000 +CVE-2022-49646,0,1,0a278852832874bf36bbf9ab461f604afea235b75fc0f3c0fb35efbe6af00314,2025-02-26T07:01:39.777000 +CVE-2022-49647,0,1,6fe173cfc64c1d77807f7ddd7847a0efbe66b66487daed564cabf1415e8b7c82,2025-02-27T19:15:45.990000 +CVE-2022-49648,0,1,36a3784ec5f9455344d193e38b4084a979e274affa14530680737a0871c536e7,2025-02-26T07:01:39.957000 +CVE-2022-49649,0,1,3843607fc9fdeb6c3423ffdbc60ff23609d63fc434056e7f858d9dd30375d1a6,2025-02-26T07:01:40.050000 CVE-2022-4965,0,0,60520f7fe367ad75afc49cb5a38d09f60dd060ea4cbc4cab5dd51ee8b1f8d468,2024-11-21T07:36:20.697000 -CVE-2022-49650,0,0,1b8a689d5d205c53866db0830ba6fecea7f3fd57acce5d54a52c22317627ef27,2025-02-26T07:01:40.150000 -CVE-2022-49651,0,0,a9564f6c7723a9a248c934b09abd391469f95c9714bc0453a6e859f67821b4ff,2025-02-27T19:15:46.143000 -CVE-2022-49652,0,0,13725d3487406ed64301bace0a7de380b5faf905690449c5625afaa3d2636994,2025-02-26T07:01:40.323000 -CVE-2022-49653,0,0,3304cb749428bd74b5848b1677619617c2506f5c87b090b1caf3e10dd797f01a,2025-02-26T07:01:40.420000 -CVE-2022-49654,0,0,4767f59e52624f8825416eda0549addab472c95e89f72620de878af7fe1860c7,2025-02-26T07:01:40.510000 -CVE-2022-49655,0,0,99f9557debd5a283122ae90319d3273e2c488ec6c7d3efd480d3f5edc1ebe2e2,2025-02-26T07:01:40.600000 -CVE-2022-49656,0,0,284ee98d5bc6c6a9f2405404d676f388039dd42082be1fd4cbb82e598b8b8b5a,2025-02-26T07:01:40.683000 -CVE-2022-49657,0,0,783120148a086152676c329cdd2eee39ee6f41eda6fdd710acc192b7aedc8bcd,2025-02-26T07:01:40.777000 -CVE-2022-49658,0,0,7c1d508898a18dc6cae9da82db9243d02385b183163b4c7e76645fecaa0be40f,2025-02-26T07:01:40.867000 -CVE-2022-49659,0,0,a0d9749692b4d47910a1e19add0ccb7a1cfd80573b1bc59094ec4a8f1e708956,2025-02-26T07:01:40.957000 +CVE-2022-49650,0,1,438b6bc446abd19c68f606078e1f5d877c56d955c348ec6a26093fe630c82b5f,2025-02-26T07:01:40.150000 +CVE-2022-49651,0,1,eb527f9dac1bb4904f5c60a9b09e17401d35f10caf4bfdddf04c352b7296e243,2025-02-27T19:15:46.143000 +CVE-2022-49652,0,1,3bb5ef4f759793223bd152f6652ebd8eebc57788f2f8ca15f8ee0ef6b40b215a,2025-02-26T07:01:40.323000 +CVE-2022-49653,0,1,76b7834c7a61353aa0be798df71d28680d26a9b280b0ebe22c4d3a7d33377ed4,2025-02-26T07:01:40.420000 +CVE-2022-49654,0,1,3a329bd545b2d86d89651b48227fe24274164556274fe21035c29dbc0a6daae2,2025-02-26T07:01:40.510000 +CVE-2022-49655,0,1,4e1b7d54762b4f24bbc88954a963b3c0e748387aa86bf3916f21e41553ed98f2,2025-02-26T07:01:40.600000 +CVE-2022-49656,0,1,62244f08711ec4c8c43f2c8d7dcf401e1cb12316b4b30dbe32d27eea34c41c99,2025-02-26T07:01:40.683000 +CVE-2022-49657,0,1,482f0398eabb1b2d45fb83807547dc317be70780cc03b592634789c84c97a384,2025-02-26T07:01:40.777000 +CVE-2022-49658,0,1,abb2f9b1c683bb1cc6e729f6c067730bde14817e4a82801c579086d7291c9402,2025-02-26T07:01:40.867000 +CVE-2022-49659,0,1,f243b64946ab2a43fe20e4e8d2fe138ba52812332e59818c6dac746b4ccaa9b6,2025-02-26T07:01:40.957000 CVE-2022-4966,0,0,b9d213db176e3f688cb999f6fb4e9d706d4dd4cb8237e2d70136404a8893c1f5,2024-11-21T07:36:20.813000 CVE-2022-49660,0,0,d4790bfa84025c03cdb65ab4b0738cdd799d4b81d425161ae2d3f674b999f588,2025-02-26T13:15:34.227000 -CVE-2022-49661,0,0,c99de3ddb976fc5c1a2e5b141d350ea1cec58895e455044a4b05c1b24b5f1820,2025-02-26T07:01:41.137000 -CVE-2022-49662,0,0,3dfe0f3d8e47d0645c76ca5e7ff8ef46c94739f5b1385174b8eea2f6e0d147ba,2025-02-26T07:01:41.230000 -CVE-2022-49663,0,0,0f508af3b7c1fcc7e3d4b414cab96dafa1cfd7950d68263fb8839b13073b0c43,2025-02-26T07:01:41.323000 -CVE-2022-49664,0,0,4516d577a8b6297af4a82127e4cab25cd5bb50c73d5ec0d02d4821e21c456348,2025-02-26T07:01:41.420000 -CVE-2022-49665,0,0,5f05f78e7d83156306842e0e024546558a7df87903630ee4a392cf9ce78d2ac8,2025-02-26T07:01:41.513000 -CVE-2022-49666,0,0,d57f8200c70d6e4bebd51ba13debddcd3c7d86298d06e59a2a57777c81960eb9,2025-02-26T07:01:41.600000 -CVE-2022-49667,0,0,01fef2f932e4714973776d6886d79be9e598ee0aebee64d3ee4124d7db7dcf0b,2025-02-27T19:15:46.277000 -CVE-2022-49668,0,0,183ce16e917aa21e763d44933dd857e00328a7042341d1aa7506088934436d41,2025-02-26T07:01:41.780000 -CVE-2022-49669,0,0,b9944783314d10a3469764465f6aa500318e395c0c7ac42d23ad8fb39773108b,2025-02-27T18:15:26.203000 +CVE-2022-49661,0,1,08bc2f5af7638a3507af3a602b7bf76b56fc5567a75cde39e008149d70cb8ac4,2025-02-26T07:01:41.137000 +CVE-2022-49662,0,1,78f25fe4e3ff9c82b1feb7248d2560dccda7377739bc91ea631e28a4ab2db778,2025-02-26T07:01:41.230000 +CVE-2022-49663,0,1,252672f904002adf6522c340f0e2957c74e495c528c804dde13b055224f5ac22,2025-02-26T07:01:41.323000 +CVE-2022-49664,0,1,f947ccdeee8ae298db0c75b0a5140fac587d0ad2ee9cfacd32a700527ef3f07d,2025-02-26T07:01:41.420000 +CVE-2022-49665,0,1,fea49a13b5da46da584bd4c2469af496f6c7ff6c190a76c8f1b152e9cb7c744e,2025-02-26T07:01:41.513000 +CVE-2022-49666,0,1,8598dfccdf9c584e0209dcf02091970feb361c53d26f0fc48a520e93fcea7a15,2025-02-26T07:01:41.600000 +CVE-2022-49667,0,1,c4e22a1e23e3734c5029a6c13b378eb5b483352c835f0b68949e445d8aaaa667,2025-02-27T19:15:46.277000 +CVE-2022-49668,0,1,f233284c93625b671511343531547a7a1cc9870a7be8e260dce02427c0a7236e,2025-02-26T07:01:41.780000 +CVE-2022-49669,0,1,cce52d18f77942d59d46f213f26ce023958787e49f189f7a6cc8b441993af310,2025-02-27T18:15:26.203000 CVE-2022-4967,0,0,7bad2c988cb94d61125773a7a88a30404d5f4c0bbce5e0a1937e4f25b7e6b432,2024-11-21T07:36:20.957000 -CVE-2022-49670,0,0,0e9b75e1f4a3412c900c1d377aa0da7a6856c12d8ac545f4cc974dd3c7f433e6,2025-02-26T07:01:41.953000 -CVE-2022-49671,0,0,4c858a740dc650c9022ca83dcd23570028a08112763e43fc3f1957f5df992921,2025-02-26T07:01:42.043000 -CVE-2022-49672,0,0,c96ac030ed371f2d74ffe3b8b659e929897c4d1b139ccbc600d1ef88948de2d4,2025-02-26T07:01:42.130000 -CVE-2022-49673,0,0,d00f3ea95c94f04bb6cb0106310339810d079e33ad785ec59c6764d106bce18c,2025-02-26T07:01:42.223000 -CVE-2022-49674,0,0,f1dcda3f658b63cbf9561bc9a4e7dbe5cfb230fb465b98eac0374d661918a035,2025-02-26T07:01:42.320000 -CVE-2022-49675,0,0,1b959d42c530691201526197cb25feffe758f46e58895284acf7da499a81fd16,2025-02-26T07:01:42.413000 -CVE-2022-49676,0,0,6acaf3fa5510fc18ce4d1044a03ce9a62abe0b8be8a53a3263751bfe660c4c5c,2025-02-26T07:01:42.500000 -CVE-2022-49677,0,0,f7975bed5f862b4d419b4054ecefbbbb12a61314bcabb5f788b1a525fb53a993,2025-02-26T07:01:42.587000 -CVE-2022-49678,0,0,9bd69efd37ac7c1e3feb1b99634d8fa19fa2b197698b5223a6e2a4e31135a770,2025-02-26T07:01:42.680000 -CVE-2022-49679,0,0,06ac75014db5808e0d42ced8964decdd63149e064e5f0a9b6b887aef39f8e764,2025-02-26T07:01:42.773000 +CVE-2022-49670,0,1,66312ad85552b8d1ff563a7b4bd21f773ae80f39125ae26518ce9532bcbc4dc9,2025-02-26T07:01:41.953000 +CVE-2022-49671,0,1,98921ada34c7eafba44f373c915f213804e6c38a76854e0c3ceda0f89d31a100,2025-02-26T07:01:42.043000 +CVE-2022-49672,0,1,763cf2f8dc77a55f6861bc701351ab42ebbedc4a74019f430082d7357628e1c8,2025-02-26T07:01:42.130000 +CVE-2022-49673,0,1,134032e779b7aa19dc0b3c2a7d62e7e5308115962df6a45a64d344f919320bbc,2025-02-26T07:01:42.223000 +CVE-2022-49674,0,1,ca2c078621cc395a97fd8285609fa1f15998bec8e39d991585ebc2efb678deb2,2025-02-26T07:01:42.320000 +CVE-2022-49675,0,1,7476ca7ad3d9739cb3952206c217601edf28a5f21d745762888ede0fa28abed3,2025-02-26T07:01:42.413000 +CVE-2022-49676,0,1,749b4ecb1e3c8856cde1cc0a89f43f302100725117ffd3eafac766f7b6f832e3,2025-02-26T07:01:42.500000 +CVE-2022-49677,0,1,1ab100a8d6a2adac8df9df9c6d72538bc68456ad531ec9e1c79feecf2b937167,2025-02-26T07:01:42.587000 +CVE-2022-49678,0,1,5a057ab352179fbb9e34bb34f0794b8321507b34ef61faf8d3feb28bae543933,2025-02-26T07:01:42.680000 +CVE-2022-49679,0,1,1142aaf6215010dacf4d9c89ca9514fd7b77556c45c1fa038233a3925f00d7a7,2025-02-26T07:01:42.773000 CVE-2022-4968,0,0,943dc961a80e9392015a5b33a469efe5c0291971944fd460d5f7c41e33205936,2024-11-21T07:36:21.080000 -CVE-2022-49680,0,0,1021fca7f05e8f6ea722109794fd0e24fbad86f64c4cfeec115e33863b0d608c,2025-02-26T07:01:42.867000 -CVE-2022-49681,0,0,7c0305cff79ca0d1e353eef1fdfd5dba84ecd8978bd146aa542205f761d084ff,2025-02-26T07:01:42.963000 -CVE-2022-49682,0,0,7b4a80583f3072afb89f5452556e961af7da373a5f02a95078540c4af2d92246,2025-02-26T07:01:43.063000 -CVE-2022-49683,0,0,e1d6504b057101a6297ddb0e1009f5d8175e06905f11dc10021c937faad1da74,2025-02-26T07:01:43.153000 -CVE-2022-49684,0,0,c8fc89dda0d4341be6500a6057e355af5e3798d9c18e0ae5201f1ac85f8240d9,2025-02-26T07:01:43.247000 -CVE-2022-49685,0,0,8aca726b91629d955ce8ee2ab8e35ff78ec847c4a7d005c76a864ef63ffa1800,2025-02-27T19:15:46.427000 -CVE-2022-49686,0,0,4fa957822bc4f513d65f6d53b8cbbacbfa07e34848b937980a54db4e87d9ba37,2025-02-26T07:01:43.437000 -CVE-2022-49687,0,0,b261637cf3f50bdbf69045d5ec55bb6ac38e90cef54d6bc303efc37c459753cc,2025-02-26T07:01:43.527000 -CVE-2022-49688,0,0,1721505d6ed0eb86ddb031177d9433a5db88725e1606a02a7743878f27c0505f,2025-02-26T07:01:43.617000 +CVE-2022-49680,0,1,8026054c5024287c5397b4972cf8f544ac96675eb5a877223b032737958c4608,2025-02-26T07:01:42.867000 +CVE-2022-49681,0,1,b565dec7bca684dcee369de7759bef84fc1c8ef9a246b38d46d610c906a004a2,2025-02-26T07:01:42.963000 +CVE-2022-49682,0,1,e764656ef11c481d3067a42cc5d9bb48cf4e228ea2e669cd789551295d565499,2025-02-26T07:01:43.063000 +CVE-2022-49683,0,1,22c690ab7037163864d699e68babe41988b34a9eb32ad62c6b7ab1bafde3e675,2025-02-26T07:01:43.153000 +CVE-2022-49684,0,1,ff7da23beed596338d961f55676f1884840ef17721fa0a462288cef3025e9da9,2025-02-26T07:01:43.247000 +CVE-2022-49685,0,1,79a210d7407f32d1f23bccfde3b3e11ea1cbf39c2d2e41d8cd1556e5ae666a94,2025-02-27T19:15:46.427000 +CVE-2022-49686,0,1,008cbeb902f36bd00f93db44258601e0d1d8194e2a55c092c751b0138fbc7ffc,2025-02-26T07:01:43.437000 +CVE-2022-49687,0,1,5ecf0ec83dc5a76dc7eb767b4d246928304eb7c0a928e52c75e203e561b8b709,2025-02-26T07:01:43.527000 +CVE-2022-49688,0,1,1b1be12dfea10f8b68bd7af02d1d9507174f92938b08d99a4dee3664af3a02ce,2025-02-26T07:01:43.617000 CVE-2022-49689,0,0,7bd49c09374f7fd790a524c7c41bebac33954627da85eed58bd36134f90c5034,2025-02-26T13:15:34.300000 CVE-2022-4969,0,0,0a1d104b023864f2ecbbc69f5d1b330f7edcc1001653f40cb16be9a068e4e0de,2024-11-21T07:36:21.240000 CVE-2022-49690,0,0,793e057a79f8adbe5af54106dfc25e8729a6e63e0dfc223f4e86a9a491eb772f,2025-02-26T15:15:17.703000 -CVE-2022-49691,0,0,be83e6d1f5b196817aff5a660e5567a57e0a51ae02d2bbac201addee1b2e75da,2025-02-26T07:01:43.893000 -CVE-2022-49692,0,0,58eeeb8716066b4a8c51d2d5f51b81b9b58a9b96a5f09dc63d72e92c3005438d,2025-02-26T07:01:43.990000 -CVE-2022-49693,0,0,d3cea9b886c7577caa46a8fb6a08d9c5c0c03a59f43c0227f2e124c8df3dd9c2,2025-02-26T07:01:44.080000 +CVE-2022-49691,0,1,7a62a96b7289159d75a3dc13e39002859ab5c5adfd141ad6c0fe3e623b380707,2025-02-26T07:01:43.893000 +CVE-2022-49692,0,1,4c55d569aec7f6a3eb0f25c2d19bc9a6456545d20f09177031d79101e105fb9a,2025-02-26T07:01:43.990000 +CVE-2022-49693,0,1,09f7a1020726ffbe5d16d357005e46107b9f1d42c466ef4288f8ef1abe25c00c,2025-02-26T07:01:44.080000 CVE-2022-49694,0,0,de83bfbc380ba4c16c75660600cee6c65039e4359b92339ab9012e688ede9092,2025-03-05T22:15:34.923000 -CVE-2022-49695,0,0,6c59848c28b791220cd5f00f895a2651f6a09013e783dc4fb29f1844d6e6d99d,2025-02-27T19:15:46.573000 -CVE-2022-49696,0,0,b9644e5562f79cc2fc332aad6b0e6a056e9eef7fe74f2200c6847ba48e046c19,2025-02-27T19:15:46.720000 -CVE-2022-49697,0,0,9131c713e6cdf9d74b79f7ca68d3eca3ab0576898f710c48cb6fe2d287aec574,2025-02-26T07:01:44.450000 -CVE-2022-49698,0,0,123256ced2c960fc6a2a918ca201ce278956c5c20143b7cd580850958dc9b9d1,2025-02-26T07:01:44.547000 -CVE-2022-49699,0,0,7ae3a317ed0615d8413d3a61d8e593b2641440c2b12931e6d749f2674fd20176,2025-02-26T07:01:44.640000 -CVE-2022-49700,0,0,bcb5bc5a5a9c92c2fcbf5f25c3c801ccd1887a607c2e4a334f1d47d78b522c69,2025-02-27T19:15:46.863000 -CVE-2022-49701,0,0,9bca68c54b4b6f52fd53252006a822c04cb58edc258ce6c68af2e1621b8949e3,2025-02-26T07:01:44.930000 -CVE-2022-49702,0,0,fe924ccf0799dbeb7543ce61529da32b1ce4846ae942ad3846cf58959ca901a9,2025-02-26T07:01:45.827000 -CVE-2022-49703,0,0,51658e8a3d464efa1040cd9303d62186ee293801d3a07325b6e9cac512b5684c,2025-02-26T07:01:45.947000 -CVE-2022-49704,0,0,25b35f2284a8f1bffa81cf48821b658f9ca4edc0126f91730e33472d2973fc21,2025-02-26T07:01:46.060000 -CVE-2022-49705,0,0,712356ce02a7756b6a3684b17ed326dfc87721c1646c8927587a2dfb00b7d766,2025-02-26T07:01:46.177000 -CVE-2022-49706,0,0,5d704409f45ee598cddd6bedc1a5a9c8a25639128802ddd9d89e1ea0fb2f2834,2025-02-26T07:01:46.403000 -CVE-2022-49707,0,0,8006e0ccbdbc96d9550ff9f9ada684dff878d3170ae15e7be4eb8da1bf223117,2025-02-26T07:01:46.500000 -CVE-2022-49708,0,0,8a474145d7b0a441af8e943462cd026b75407a36dc327ba0f7e0c868a6de3761,2025-02-26T07:01:46.607000 -CVE-2022-49709,0,0,332804e811cab3d843fb5ecee041f16c21e050fd75cb7064c47ef4d25e514983,2025-02-26T07:01:46.710000 +CVE-2022-49695,0,1,7869f38df243f16053dc3154daa31c94893220defbf2109e6a5bb4dbfd1061d9,2025-02-27T19:15:46.573000 +CVE-2022-49696,0,1,13c6acfb389458ab17980bd68e50b3f5c8640aa38cb94a56819f534417c61b51,2025-02-27T19:15:46.720000 +CVE-2022-49697,0,1,02756b3694e3b3165ce30926ea27f97d84664505b613b5fb909ac8eb93365a44,2025-02-26T07:01:44.450000 +CVE-2022-49698,0,1,cb713e4c612b50761168ae4f9fbfbd5ca4b999123ebd34ca35c73c132850ff01,2025-02-26T07:01:44.547000 +CVE-2022-49699,0,1,74a12a87ea7cb25d04ff50a75661a290f4304ec748240508585b351759e115be,2025-02-26T07:01:44.640000 +CVE-2022-49700,0,1,eed853e4ffd6a9ce0baa6fb6275411782a52a573a30929300a8eda2c3664082b,2025-02-27T19:15:46.863000 +CVE-2022-49701,0,1,94a5d266d21f2a774d31b738ec822cc6310eb20a37e912688a09938927f52c2a,2025-02-26T07:01:44.930000 +CVE-2022-49702,0,1,b20cc6bb54ac756cd5f43c3acfaa839d28ab5aa608fe98eb3fd51398e23f5806,2025-02-26T07:01:45.827000 +CVE-2022-49703,0,1,42d27cfeb8014aa30aa4d7cf83ba8c35986477e26e0142b44a3a088de0684b36,2025-02-26T07:01:45.947000 +CVE-2022-49704,0,1,99e9ca57027d817e6354bb1750e00b2b1dc1eb9e127cbcceaf70a5d7adb8bdf6,2025-02-26T07:01:46.060000 +CVE-2022-49705,0,1,da9f027506648da1d5c3d2dae33d7000ec63cbbb26c1e57af96198dbc4b04d9c,2025-02-26T07:01:46.177000 +CVE-2022-49706,0,1,06442d5a63cd0136a29b4fa72c9193d0bf75fe2f2198325013c87e6fb48d847c,2025-02-26T07:01:46.403000 +CVE-2022-49707,0,1,1f67ade1263d4701d79d4a6164ea910f72fd5773a901555f115d1a712c45133f,2025-02-26T07:01:46.500000 +CVE-2022-49708,0,1,e066250260916c3f951714a6f61567ff65dfa73e30797d11bd86ee5f6d9984a1,2025-02-26T07:01:46.607000 +CVE-2022-49709,0,1,ce8beee78bb0a24bec22cf8c5c877a2947bd050cbff50bc6c67bebaff84ec5e7,2025-02-26T07:01:46.710000 CVE-2022-4971,0,0,8284339847d56a982dc79d79b0900fdcef988337c6504d3d0fb43eff5f9bcb0a,2024-10-30T16:37:33.237000 -CVE-2022-49710,0,0,1fa720c220d34b2c71e0f09bfc3d1879787ac82d3a3298ae203e67360a6e50f1,2025-02-26T07:01:46.800000 -CVE-2022-49711,0,0,355f1e29575ca9651a852eb406c992a0416e94c3441698bb8d722241ce3db9fa,2025-02-27T19:15:47.010000 -CVE-2022-49712,0,0,c0c5d1e2421a775b9e57eb6d968297053f8991eda62ab5a6e8d6180de847e508,2025-02-26T07:01:46.987000 -CVE-2022-49713,0,0,418722823f0110d22c6aa2f4242fe8e709dbc527be9cf5f36d2a3d00d8504085,2025-02-26T07:01:47.083000 -CVE-2022-49714,0,0,a07120af89cd7904c5a36462548a4ded93abdb7129f4645ee6dbc7674d977470,2025-02-26T07:01:47.170000 -CVE-2022-49715,0,0,d6b0bd84b94420620b68e58a831afe76c0b0eabd84c8d36c62a92a5cea308d18,2025-02-26T07:01:47.257000 -CVE-2022-49716,0,0,764e603babf1b3263b9cc01c0d98edc3f8e6e955b176cf62ea18195e0628fbf7,2025-02-26T07:01:47.350000 +CVE-2022-49710,0,1,64fa6ba0eedef2bb8501716659a16f27210c44d7db0ce6f02a1dc0b79cfc163b,2025-02-26T07:01:46.800000 +CVE-2022-49711,0,1,3f3c3d32116bf231c64e9193667d4f2a0475eda63b24faebff39d7d1b783bd98,2025-02-27T19:15:47.010000 +CVE-2022-49712,0,1,88eedf1624a86ec7a1dc0b8e4fb4b0cf2d10762158e27d488bcc2615a304da17,2025-02-26T07:01:46.987000 +CVE-2022-49713,0,1,6ef0ba398623fac8c720ec3231cfabb7e8f0f4a1c1ba2f34edb8be1f229553b1,2025-02-26T07:01:47.083000 +CVE-2022-49714,0,1,d973700239f8614605ff8024fd7c8708526253bf23ac8baa54b709fa084bd234,2025-02-26T07:01:47.170000 +CVE-2022-49715,0,1,c289e709ff1a8ce469bb61608aafcb26d1a299f810cd8fce2cc62c9576500d88,2025-02-26T07:01:47.257000 +CVE-2022-49716,0,1,69e66f9293ca0c949ededad76e70df19e8f8b73eeec178f193ab1d41c41c764c,2025-02-26T07:01:47.350000 CVE-2022-49717,0,0,fb539038cab940ab22eec30504629689493de5fe2a6e2bbd39e1542508e57503,2025-03-07T20:44:17.993000 CVE-2022-49718,0,0,f4e5f62b5f3b40dc2990933ddf5de924dbced752ffc8a63b9a5dfa43d9588a72,2025-03-07T20:44:17.993000 CVE-2022-49719,0,0,b7029e729a9a3b8e1963cd3b21170748f2d7de4df6eb06552e31a44098d2e3d3,2025-03-07T20:44:17.993000 CVE-2022-4972,0,0,dd0bba328c6c263b4470904688c48aab55242d31bd9c6ea9c0560b0bf0ebaa74,2024-10-30T16:34:55.117000 CVE-2022-49720,0,0,e942e1799729a164064affff001cbb1be7438436713fad67611b6a28df4d325c,2025-03-07T20:44:17.993000 -CVE-2022-49721,0,0,473aa7281e3dc5a4f5baf1649f0dd0e5950657ca34edd2864812a9224d181299,2025-02-26T07:01:47.793000 -CVE-2022-49722,0,0,d5be90e89760730a58fd3e10740f8db8dee9d3cb71097ff85fb5b51e1d1c09bb,2025-02-26T07:01:47.887000 -CVE-2022-49723,0,0,f2f8bb0dc09d2e8781d127500c242105a68e08452c1c41933f61dbc2886bcfec,2025-02-26T07:01:47.980000 -CVE-2022-49724,0,0,622058b1b155392c0d799f56d771c07a6825a2a5d929f2abac75e3ebdf87427a,2025-02-26T07:01:48.073000 -CVE-2022-49725,0,0,b3689084a2c29a0c5614c515ed5c1db050d2faa9cd06bcbf2ca231933884831e,2025-02-26T07:01:48.167000 -CVE-2022-49726,0,0,07f3d509df5e7d4e6dea1f7299a016daa467f2f8519e41fd5aed9c04bd29c2f7,2025-02-26T07:01:48.257000 +CVE-2022-49721,0,1,90b182a307cb499c92c3734f0bd0dd909284f914fb9cb17aafadb46de6da67e3,2025-02-26T07:01:47.793000 +CVE-2022-49722,0,1,432cb1a0596b2dcd2e39422cd12a84b047dd63e14bb0b79d3ec11d93d0cf53fb,2025-02-26T07:01:47.887000 +CVE-2022-49723,0,1,249838f0f73bfa225756c8d4f823c064b1659dc583d46b93d33e984d3eea93ca,2025-02-26T07:01:47.980000 +CVE-2022-49724,0,1,efc0d3ca60fd176a13b507aa32cba7a06a89275a3635b3f298e22e254725d25f,2025-02-26T07:01:48.073000 +CVE-2022-49725,0,1,dfc4d7c7244b5ce77d797ad8c2589087bf82a53692cdd826d90712ee09ecbe80,2025-02-26T07:01:48.167000 +CVE-2022-49726,0,1,606c6295e0bb15f5d7656b6d044331f12ac39ea63b46e31eded08705796f7ad3,2025-02-26T07:01:48.257000 CVE-2022-49727,0,0,9f8db5c0e9719bf24d9f87c911b8480b6f924e0752bfb4cd446bf309f0c7c90e,2025-03-07T20:44:17.993000 CVE-2022-49728,0,0,23c27efc649e09163c92e4f11974e8c023e287dcf686d5452f2f1a0d11b6aae6,2025-03-07T20:44:17.993000 CVE-2022-49729,0,0,490ac01aa5481c5617623e06015d596130e1566cce9840aa5e01d5932cce8635,2025-03-07T20:44:17.993000 CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000 -CVE-2022-49730,0,0,2bfdce97189f4294a4f5bd9bb6fb8ea7daf4ec20279fe3e8023054ddc72e2701,2025-02-27T19:15:47.153000 +CVE-2022-49730,0,1,bcd0d512fd3ed36ddef2f3abddb94ed4d94c9e1c8455cc41494485aee9ed6082,2025-02-27T19:15:47.153000 CVE-2022-49731,0,0,f89232c1fbc05ddb8cd90b3d0eda24af8c2a98fa38cd912488990e89cd7004d3,2025-03-07T20:44:17.993000 -CVE-2022-49732,0,0,91e898c8ed487c200545020bc19ca94e34172dbee027d967192fdde21cd00234,2025-02-26T15:15:17.843000 +CVE-2022-49732,0,1,364e13a6491839d83af585411890da08c1e514679e122e818830d89fe163fab9,2025-02-26T15:15:17.843000 CVE-2022-49733,0,0,fc0c6252bda4004b2b7a07aea99702f475ab06667c4f4e935e922bfbdec22966,2025-03-05T14:05:15.387000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fbd5,2025-01-27T14:15:27.210000 @@ -214481,7 +214481,7 @@ CVE-2023-0578,0,0,1b664a5f9087e1616dad80854d7095835d0ab88854a8196a7fe50c003be364 CVE-2023-0579,0,0,a9030806eb2c6a88cf9d4657f7bd32aa28a98c879cbc09d7f601d1f1c378ba9b,2024-11-21T07:37:26.030000 CVE-2023-0580,0,0,fb2903613cebd2dc46456b158d0e03dde7bc6f83ca3387673eba11cce6f53333,2024-11-21T07:37:26.137000 CVE-2023-0581,0,0,235330329aa9cb2413ff17de2e1747757523f4328b3fd3439758453dd9792730,2024-11-21T07:37:26.240000 -CVE-2023-0582,0,0,152546f4daba32942ebe9af556eb553c6a19f63125b0ff9d3c80673582ede364,2024-11-21T07:37:26.337000 +CVE-2023-0582,0,1,b81939d48daf4b881fc0c2d4b8f6598502a6fa649da8701115d2b53a95c72fb6,2024-11-21T07:37:26.337000 CVE-2023-0583,0,0,aecdf5bf075fe00bf28cdbb70dc4e17c1d3edbe8508537d39ebcdc1d79c2adc0,2024-11-21T07:37:26.457000 CVE-2023-0584,0,0,86d98ae13897aba2e27973d5ba25ca898414447a0e558495482aae224a1f3bda,2024-11-21T07:37:26.560000 CVE-2023-0585,0,0,49ac0e7f939629954485d621143f248a92ef053fa7893146e4d823a2591822c5,2024-11-21T07:37:26.653000 @@ -214987,7 +214987,7 @@ CVE-2023-1107,0,0,a851df6edb1e80cf4602605c0738c3b59d6c3f2962168a3988e52bdf9c1447 CVE-2023-1108,0,0,df886ffbb55c743dc7a087d4564fd0dfd2c2577e3622948c22b031bf12b53236,2024-11-21T07:38:28.330000 CVE-2023-1109,0,0,741eed4df4d257f913981742b5512d5f8f9cd245a50ba4f57819a079b2c7044a,2024-11-21T07:38:28.530000 CVE-2023-1110,0,0,31b2325bb9a2dc871bcc832c71bfc75f40ad0b898ad92f59bb84bac87a270ee9,2024-11-21T07:38:28.663000 -CVE-2023-1111,0,0,b3aed71d080e5e3a85b087db5e66484f4235c318e165dfdb9eb041bd089686bd,2024-11-21T07:38:28.773000 +CVE-2023-1111,0,1,a6cc1a890b5e1c638fb8b33082f9da5422d92856c566289866161fa0b5e82243,2024-11-21T07:38:28.773000 CVE-2023-1112,0,0,105f2f3e7a87475ca0a63d4a739e2f9ac4af03cd960244fe9a8889508ce39ffe,2024-11-21T07:38:28.907000 CVE-2023-1113,0,0,65ec1a9ee584cfb957659e3ae7d241c6918f302f03712780f1323b535f99edb6,2024-11-21T07:38:29.050000 CVE-2023-1114,0,0,4abf3872a6425f6f1f2b1b251b698314288ddedee6bf06fd59665b16687b0a7a,2024-11-21T07:38:29.187000 @@ -215861,7 +215861,7 @@ CVE-2023-20021,0,0,6a2ead76fe3b5fece57fab974d3dca57ab9246b1314eab0aca14a39bca71f CVE-2023-20022,0,0,d267e0083fa8403d8442c1bf3ac09340316446610d4d9e217c496ffce4b54016,2024-11-21T07:40:22.303000 CVE-2023-20023,0,0,95a83439fbba19b6c21fbdc0ee9b15f3bc03f36ffb8301951be300882be1433a,2024-11-21T07:40:22.423000 CVE-2023-20024,0,0,aa588e3440809485fc0865169fec554102a73a44873c6d779aa0ba291a537e5a,2024-11-21T07:40:22.540000 -CVE-2023-20025,0,0,afcba38c38651c002d3545458a5675c2eb3d1fb0d0d4fc0a104cb4c00798c8ff,2024-11-21T07:40:22.940000 +CVE-2023-20025,0,1,049d9d24b7233949f25dcb858a268d79ff2f227f75bfbdc9791a947af5c4ad96,2024-11-21T07:40:22.940000 CVE-2023-20026,0,0,87170f7e708d04c72d09a4682f931aaae1e7cfb930f016f405d49197a2963aac,2024-11-21T07:40:23.080000 CVE-2023-20027,0,0,643e4bd75b063b0079399886a3cd15f103694e59618950e3fd9d839bb6b1e293,2024-11-21T07:40:23.213000 CVE-2023-20028,0,0,8e75e4e2dea98ed8067b7183e305b57df6b136b6188b420e71399619665060df,2024-11-21T07:40:23.390000 @@ -215960,7 +215960,7 @@ CVE-2023-20114,0,0,bfadccad28ff3c994d170023d730c5f4974dcb3bd248cdd0ed7612008492f CVE-2023-20115,0,0,76ba26cd5daf30b65efc96a9db0f3f3fa0e47acd235379e371aa9779532a6a95,2024-11-21T07:40:35.413000 CVE-2023-20116,0,0,62369bd5aac71a1c97a767cfb7dc90038016a4d6148d2f98a45b040bc1dd10bc,2024-11-21T07:40:35.597000 CVE-2023-20117,0,0,2057ff7074237e28368821254321a8a66043e83f0a25d3872f4e9f4e8c4bc1a8,2024-11-21T07:40:35.757000 -CVE-2023-20118,0,0,f6fdc8bc97d2e57b970c6415c6ca3ffe58c95b742b901feb85e324af8deedde5,2025-03-04T02:00:01.987000 +CVE-2023-20118,0,1,e13875fd7fb3cffb199984b12343aa4f3361ea3bda064a506943cfc2e6a575c2,2025-03-04T02:00:01.987000 CVE-2023-20119,0,0,749595a8d4cdbb1698c1927ed2f7b98989f810dd96277e35e514a7c3b6012d6c,2024-11-21T07:40:36.027000 CVE-2023-20120,0,0,283544e70243dae890e54e82d95c6c3e70f1e3e7b01b66e1129b41dcde2d957e,2024-11-21T07:40:36.147000 CVE-2023-20121,0,0,73fa4fdba279d195369b2bb6850b3d8ec58132e3272a5f1fc484c28ab69daf1b,2024-11-21T07:40:36.270000 @@ -216622,7 +216622,7 @@ CVE-2023-20998,0,0,9f6383f04ce2dc70c0029b7743e50b46b5149802864f7fd733438f749f823 CVE-2023-20999,0,0,ae17aec52b7239760d2ba5921cc34c69314f4ab2dd47fc3b512b155378207e27,2025-02-25T22:15:14.063000 CVE-2023-2100,0,0,f0623346dbcadae9a62a64c71adfbbc96ffe68f71b75fdd9a6e7680933f00e28,2024-11-21T07:57:56.303000 CVE-2023-21000,0,0,e338f92fba07d1329b700ef1d3ac3475b886947249d9e50066fe65acb663ecb1,2025-02-26T21:15:12.497000 -CVE-2023-21001,0,0,81a13cb82e9b2b2b2df17e74d87d6d0e7efc488dbc66ebf9409851369add5921,2025-02-26T21:15:12.667000 +CVE-2023-21001,0,1,77d373b814d8f3f86a07130fd29bd9b79fdf9e346ee22bf7b2c2f8b1bf47f06b,2025-02-26T21:15:12.667000 CVE-2023-21002,0,0,2c78db89e7fa39ec0d46dd5a75c77583163ff32286359da04527e2d5e7d2fc12,2025-02-26T19:15:16.427000 CVE-2023-21003,0,0,b00bb8b24220bf71b5fc4b129e76724f7a4da6ef2e6efbaf1ad6238c59bfcb22,2025-02-26T21:15:12.830000 CVE-2023-21004,0,0,07db6bc25ee97fcb6147c32c90d518bfd330692200cb176fca87dd53792646ce,2025-02-26T21:15:13 @@ -217310,7 +217310,7 @@ CVE-2023-21670,0,0,2ee13d35132b2fa343bd06939813af865a53d3dbaa56ad6fbe5c4e630c2b9 CVE-2023-21671,0,0,89ede1df7f9893229594681477c80e5a2fcd551d29fdfa16b7f55494cf3e3eaf,2024-11-21T07:43:23.660000 CVE-2023-21672,0,0,26152e26b36e1dd84fa2d27ca13d0c243f834ffc6cbce77755ce66e96b9d4940,2024-11-21T07:43:23.830000 CVE-2023-21673,0,0,0785ce600ff2c554266233cbd91282a629db79eb3f2c9adfa3277a33f74dafd6,2024-11-21T07:43:24.007000 -CVE-2023-21674,0,0,0b3f805f82fc459f2a1a28e3a1654f17d9e1103be14c6c9ead9d575844d616bd,2024-11-21T07:43:24.307000 +CVE-2023-21674,0,1,21a3f83bbf2d614184e24442a9b628efa86e36a25bf761b1ae2a30d61946571f,2025-03-07T17:12:53.023000 CVE-2023-21675,0,0,e85b87b77d14107bde80b3fe4f2feab9f6281ccf5d667ed0e8cbda03b508fab6,2024-11-21T07:43:24.460000 CVE-2023-21676,0,0,7e011e7ff082b113dcb6c262bce6cbf392b9a3cb07d1729b8d69cb58bd692897,2024-11-21T07:43:24.610000 CVE-2023-21677,0,0,253e07a3eb512706504976018743c4669311057f8c1d5bfa43bd25f09d38d095,2024-11-21T07:43:24.737000 @@ -217356,7 +217356,7 @@ CVE-2023-21715,0,0,d2e7a81f7d68f0c480379ac2ccdeb9b3ebceea8616532ef965c0a4fa347f3 CVE-2023-21716,0,0,ad0f14110c9c94a0a58aeed9fd7dd6b2c2c61bbba9c251e02ff545f237448e86,2024-11-21T07:43:29.853000 CVE-2023-21717,0,0,5d705bca19752be9d11d65ce9f294a675e0c7c2df02156816b58f244babbdff8,2024-11-21T07:43:29.993000 CVE-2023-21718,0,0,c9cb58903163963e0ff91d227721f5a6f31d7c877cdb3900ef3f4e255ae68d11,2024-11-21T07:43:30.117000 -CVE-2023-21719,0,0,632458b500b3d5fd2489ad1a27f5dfbeda95127f6686f3ece9e719688c4b197a,2025-02-28T20:15:39.963000 +CVE-2023-21719,0,1,b242a8e40a24b31bc7c473192a1691d23c271e56f4bea3c850e887910a77ca04,2025-02-28T20:15:39.963000 CVE-2023-2172,0,0,b692d9bcc456a5c1dda926a32bf1ec3dd5514f32c3576a77142f581d1744f846,2024-11-21T07:58:04.720000 CVE-2023-21720,0,0,23a004a91d4f53c918e14fb5d3f548a63b17913fe196a14cf34c80a5209c1f3c,2025-01-01T01:15:20.017000 CVE-2023-21721,0,0,df46aca9340b0d535ccdd066275fbff36c6f99a481aa893df56abe263edcf234,2024-11-21T07:43:30.490000 @@ -217435,7 +217435,7 @@ CVE-2023-21790,0,0,bbfea0e558d87b03c2717255d3e5c811dd971e1f0844b973600036e2ad6b5 CVE-2023-21791,0,0,118ecf5763039dd5ddd198cac11cb242ef8a9526e35d74843524710cd3bdd4e8,2024-11-21T07:43:39.450000 CVE-2023-21792,0,0,125ad34890fe142688e3f25013ef35654f8d00e9736a23df582592c2c001e600,2024-11-21T07:43:39.570000 CVE-2023-21793,0,0,9d598276b1ee22af7777b3c64e60212e953f9126bc3af5a3aba73f42f54c9107,2024-11-21T07:43:39.683000 -CVE-2023-21794,0,0,6b662c094bbf3d093b5cc3badc09605872bd9b803e42bf523aec3e0d6d54e5b3,2025-02-28T20:15:40.183000 +CVE-2023-21794,0,1,1dcf98b92e59575d529e4d9aef8e3c91ef552efbd900a222fe1f1969bb8b10d8,2025-02-28T20:15:40.183000 CVE-2023-21795,0,0,c1d9ba786ae7a3af62f29ca85c28a9f375806b466cf2bc2a0dffa744808ae1b8,2024-11-21T07:43:39.923000 CVE-2023-21796,0,0,46ea9df62ce1e27b6c4fa0899508598812d4a3a13138697d29e6c3c61964e7b4,2025-01-01T01:15:28.520000 CVE-2023-21797,0,0,caf33020db36bcce29f533019a9e71b5b3a000ceb1d373b108122c8a16c4128b,2024-11-21T07:43:40.163000 @@ -217481,7 +217481,7 @@ CVE-2023-21835,0,0,7ef60f87f50a4d14cbd1e287089e9dbda7525da1c493c573b16f7bc382d20 CVE-2023-21836,0,0,75f5b94b68038a7f4e808489279e423dc99dba1d3e62b25da83f20d7b2b581d8,2024-11-21T07:43:44.963000 CVE-2023-21837,0,0,990982f5f636e7235ebce9f9f5a7a336155aab9bdfb89dcf1210d2434380578f,2024-11-21T07:43:45.077000 CVE-2023-21838,0,0,fffedb74cbf7913c5f9824cc58606284567c9036f02cb1fe6656b3f71ea9848d,2024-11-21T07:43:45.203000 -CVE-2023-21839,0,0,fbc3accdca27d2ce92cea2f124f6638c85d9201e0777a8fe9c333036f190893c,2024-11-21T07:43:45.317000 +CVE-2023-21839,0,1,e0f13ddc17c808c22252226b4ec241cc175ae3a327787ae6304d9188341782f1,2024-11-21T07:43:45.317000 CVE-2023-2184,0,0,f538d28228bcf672ce9725ee5d888db1b2b88c294376d69eb2a5b1d2280ad405,2024-11-21T07:58:06.150000 CVE-2023-21840,0,0,8ffa7d472414fc56655d97179caef9d17e6f441033f4de0099871a0c0e8755f2,2024-11-21T07:43:45.447000 CVE-2023-21841,0,0,ec14e447035808a64c1e28e9eada157c6b752c430190456a4e7afde29cf361f8,2024-11-21T07:43:45.560000 @@ -219007,14 +219007,14 @@ CVE-2023-23726,0,0,824c7fb33c7b3dbdeadd5c5c200268d202c410a38839e31ee7189ed94841d CVE-2023-23727,0,0,cdc8e5ae990be565f7abebd209d3048644c388d1772e3b3b15a5d2b90e4a4008,2024-11-21T07:46:44.233000 CVE-2023-23728,0,0,729a47b180b49a1c6e9e5f4a5a17ca6919d386725faccc3311a4c19c6171ce2e,2024-11-21T07:46:44.353000 CVE-2023-2373,0,0,bea7c8e1201d1afb09d64041347d79b4b2581b7e5e7eeb416a579a263e69aa5a,2024-11-21T07:58:28.970000 -CVE-2023-23730,0,0,5c4981f053d0863a8eddff59da91dcbe146aeaacdfcc83c2604bd378a154bda2,2025-03-01T01:48:32.590000 +CVE-2023-23730,0,1,b85dd358c522e4cb3fff1b9da26eb57ebb8a107b4336d5b731c8ce7eb8b9fb1e,2025-03-01T01:48:32.590000 CVE-2023-23731,0,0,0f1da5f1a624bdcfa55a8a8ac768f5d808fedce4efe4072b2188a4738f0f94fd,2024-11-21T07:46:44.603000 CVE-2023-23732,0,0,c93aa976d19ad042fe28a058f3d328a9ed435073dfda91510f171e6ae2b19042,2024-11-21T07:46:44.727000 CVE-2023-23733,0,0,d344260e8c55cc630af91a574ffece2da84cad0656ad1eec5b4d7a67c52d1ca4,2024-11-21T07:46:44.840000 CVE-2023-23734,0,0,57d5adc046b300145d115a0087609697dab36f625fd730591b71d48efd0444bc,2024-11-21T07:46:44.960000 CVE-2023-23735,0,0,b4f7bb4cd5051518d308585115de854d56744060f23202fa35427548fb3612a9,2025-03-01T01:48:32.590000 CVE-2023-23737,0,0,35a455166512747817a7eb1c8485f8549f69f2953afcd554622cc6d3b8911aa6,2024-11-21T07:46:45.183000 -CVE-2023-23738,0,0,4158cf1aff9e0d67a926d9d8b6cfa12f7d0b7b1403d85821646c2af9200a57f1,2025-03-01T01:48:32.590000 +CVE-2023-23738,0,1,ea4af59a33f53a8b5d4d6198cfd7b6a9c6cf1d7cf79a6d8e52bd5eecb64c6db1,2025-03-01T01:48:32.590000 CVE-2023-2374,0,0,346693e4df7342aeca1e439f42b1893404fe6bbfcceb463b868960855ffc7b20,2024-11-21T07:58:29.110000 CVE-2023-23749,0,0,164fb033a6a8b49cd4f5f0e6483035479e26ef442674f99aaeb2a58d40c58afb,2024-11-21T07:46:45.430000 CVE-2023-2375,0,0,b6a7467d777f895ee81e080b4aae4e3bf61999158d0f561cce0639e6c4a1254a,2024-11-21T07:58:29.250000 @@ -219174,7 +219174,7 @@ CVE-2023-23891,0,0,9a467d5c8576278cd60800aa31195e66e21136dfb0f4b2951cf9c492fbe2a CVE-2023-23892,0,0,babd7b6eb254e5a1e48ab1ecee1f075091bb9524952f0370f061cce457d343e8,2024-11-21T07:47:02.940000 CVE-2023-23893,0,0,79a8b1e4c088a6b98234d52b61651bf5cebf3c590e29e2eb91b4549f46d3c09e,2024-12-09T13:15:21.793000 CVE-2023-23894,0,0,ac1fbc40c284c0f0382b0d62dc16300b41b03c54eb17701ef0abf4283ac91cae,2024-11-21T07:47:03.067000 -CVE-2023-23895,0,0,5dc50fa91d29e5b6bc483fffafd5d9851a2d94c5237b749b48db9c77772838be,2024-12-09T13:15:21.920000 +CVE-2023-23895,0,1,2cb9cf5c7c7b301a2a2485593b522c3995d70101f7949f1e161adecf679cf4bf,2024-12-09T13:15:21.920000 CVE-2023-23896,0,0,323349cf0baac2bb680f396fcf57bee11f3b3efdbbe33857343c32da31079f52,2024-11-21T07:47:03.193000 CVE-2023-23897,0,0,8a120f9b5892c25b1345b6a3937aae72e10f21285071459a906a94ee359146eb,2024-11-21T07:47:03.320000 CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fcab74,2024-11-21T07:47:03.457000 @@ -219926,7 +219926,7 @@ CVE-2023-24856,0,0,97b4f395b6e652def9dcc2f155c3a39d88ec8c14a0f8ee8a6b453e25f7825 CVE-2023-24857,0,0,8d12d9e91adc3444862b40e2e824f8f830420628e6b976054799769fca4d5e4c,2024-11-21T07:48:34.623000 CVE-2023-24858,0,0,93cdabe458d178c29458255066e72b6b36fe7b40a33c7619e719b9bf6f8a3677,2024-11-21T07:48:34.777000 CVE-2023-24859,0,0,c2a70e25c0c2f119ec3b74bbfef2068feb8afe3838bafea5b4a91a17f423ea36,2024-11-21T07:48:34.933000 -CVE-2023-24860,0,0,ec81f50dbdabff1a940b99dc89afe1bfd5ad276ce88bb905cc4646e2ba144d24,2025-02-28T21:15:20.647000 +CVE-2023-24860,0,1,ff53444720c53285922c1c7db59b813e81c93b10d2316e978de83da2cfef416f,2025-02-28T21:15:20.647000 CVE-2023-24861,0,0,7b79f6f2650458a480566f9582c9bb906336542d4ce0f354d0d1778f3436de83,2024-11-21T07:48:40.240000 CVE-2023-24862,0,0,1c89f212e5c544b0b4b082ddda99d8333b9815a65de708bff9f1d462aa904753,2024-11-21T07:48:40.393000 CVE-2023-24863,0,0,69aa7df86355c41218a4d8b50ed2a5af0c71fa8414de9e2ae34fbb22e54c825b,2024-11-21T07:48:40.530000 @@ -219941,11 +219941,11 @@ CVE-2023-24870,0,0,8599ebbcfa3139a569b085f982e3ee51bf17624171c69af6249d9ced40f95 CVE-2023-24871,0,0,007ef30de0e40fb6fd98f3dc553ee1946c748d33e5f3b8eb4f7e68ecf7ef080f,2024-11-21T07:48:41.580000 CVE-2023-24872,0,0,671db372b4fc5cf0a6a0e4e79a322a469f6ee9128071f391172290f9fdc06310,2024-11-21T07:48:41.693000 CVE-2023-24876,0,0,b6b8afa42ab869a9a2feba8724301da7d4129a5fc5bc8a3dd1f583bca1fdcc07,2024-11-21T07:48:41.827000 -CVE-2023-24879,0,0,db57dd3a5211db1892cf5db4149921766a3a20439c470e1ed4c2fba2f5b4e3ee,2025-02-28T21:15:20.783000 +CVE-2023-24879,0,1,4e41f1e619fcf5a637ddbbcfde247d01c92c625de173682eed5b12e5da953e12,2025-02-28T21:15:20.783000 CVE-2023-2488,0,0,1ff030b9a9cc358926f2f31f1cebcdc10263b6fd1a8f39d3ff95a9e9e914dd17,2025-01-08T17:15:11.237000 CVE-2023-24880,0,0,217db8fd5f2bfc27d7bcff73485caede10e60b11d81e00b372ce0612c3406195,2025-02-24T15:48:01.833000 CVE-2023-24881,0,0,6b069e84033388c6b792588edb6dded8ddf1805480c83fada6521fb31796bbfe,2024-11-21T07:48:42.197000 -CVE-2023-24882,0,0,2d876f925379fa7e203aee4c88fae3d77c428dfd40afd3e80b9a293230b8d41c,2025-02-28T21:15:20.930000 +CVE-2023-24882,0,1,81bb41968b76a066f9ea4ce38afacb320f0861d8a42b0414a883ba749a38499a,2025-02-28T21:15:20.930000 CVE-2023-24883,0,0,f8cd2e3c588975da658157610ea853db7cf61d2aa3e5ce70748358ea9d242e3f,2024-11-21T07:48:42.410000 CVE-2023-24884,0,0,73e41844b7e07f1b3039fd3a0ec6d7100971bb2ec55e89d87f704b8c2df7a471,2024-11-21T07:48:42.543000 CVE-2023-24885,0,0,9662d94e242ea3b0e8333672deb3193424405f26d0206b6d719c84bf8f41bb99,2024-11-21T07:48:42.673000 @@ -219954,7 +219954,7 @@ CVE-2023-24887,0,0,0a51b2549252711cc2c924f14ac2cf21056ec8d5ec46b8caa58ba29516c9a CVE-2023-2489,0,0,5a424baee54accf15cb35e970432f5c16b21b4a2d25b4c6512fb478e634bdc3a,2025-01-08T17:15:11.450000 CVE-2023-24890,0,0,0c9591a70fb15e43dbe8f570343175177ad2f9d0f1b8dbedbc9cedc1c2972968,2024-11-21T07:48:43.077000 CVE-2023-24891,0,0,6d09c3103d23416d7e1f9cd2dcfc7ab06bdff03290f23f0e1a8fefe151239e3d,2024-11-21T07:48:43.183000 -CVE-2023-24892,0,0,f0dd7a49c48fd986bbcc659d21d01708993109799373639844ff051b4a49b19c,2025-02-28T20:15:41.343000 +CVE-2023-24892,0,1,a189940ecd46c3bd7ce21504351fe1286c60c8b1d105a64136c3926a9f3f2a39,2025-02-28T20:15:41.343000 CVE-2023-24893,0,0,8627a23e388e284cf88678588e944a3f2e53919cf726af6b8c1d2f82c9572708,2024-11-21T07:48:43.397000 CVE-2023-24895,0,0,04bc1307e556e27de816a66d9491db01faddf8128e5015116cdad5aefb041734,2024-11-21T07:48:43.507000 CVE-2023-24896,0,0,51437fa19d80d9021db06310e3a4cd99648d9935ac62052618478ab1d0b7ed93,2024-11-21T07:48:43.680000 @@ -219983,7 +219983,7 @@ CVE-2023-2492,0,0,815b785fca7d6abc348e9b027950fd2d8e4a246d4324fc755593fc639b6a92 CVE-2023-24920,0,0,b27bec2aec362183060b41b5fd66da117e2fae147fa7b2e01f00361c8c9ce0e9,2024-11-21T07:48:46.180000 CVE-2023-24921,0,0,05f3c5ebc5b396734db95b79e280ceec38805f4ec089084d146385c1a8ec44e0,2024-11-21T07:48:46.283000 CVE-2023-24922,0,0,eaf0894a4da74776255defcbf4a307740bf22c1a754553075c3f47fcf25992de,2024-11-21T07:48:46.390000 -CVE-2023-24923,0,0,26f8cde4ebe4a82c8c08443e635eeb6c3c694d6b740f7c318e6fcca24446b628,2025-02-28T21:15:21.063000 +CVE-2023-24923,0,1,6d810f1f080bad8858d77d8be2207a443f1422feec845689285a016e01e856da,2025-02-28T21:15:21.063000 CVE-2023-24924,0,0,6bf5509a654c5e535ce0ef7466bb3989cb125ca29e8fe177b492484a2a320910,2024-11-21T07:48:46.597000 CVE-2023-24925,0,0,f365fdbbd4bb40f0501f0dd9edd79f72c7a6312084ca81999119dcfab6bb1431,2024-11-21T07:48:46.723000 CVE-2023-24926,0,0,ae44c4c5e920f119ed5408b1fb83345c66660790daac93367ed5c55a7bdc40de,2024-11-21T07:48:46.850000 @@ -219993,9 +219993,9 @@ CVE-2023-24929,0,0,10392ef33a8f953951d5f358167592dcf06de88228e77d7c025367d2b0689 CVE-2023-2493,0,0,6fd09106e82f4d15ca0700ed3c72d8ef5c11402ca9bdc4289502812842581d37,2024-11-21T07:58:43.250000 CVE-2023-24930,0,0,9f9e561c144213e77edf7be5969762b4d914f545cf0c22227904b800cf15e12b,2024-11-21T07:48:47.377000 CVE-2023-24931,0,0,4cb3f680aee2110301457c68ae711581649c05db20ed022c69aef2e15fdee122,2024-11-21T07:48:47.493000 -CVE-2023-24932,0,0,69e57209b8f96c1cad11574f2f7d5e74b2418f4aede963515c0c35c6fc327082,2024-11-21T07:48:47.630000 +CVE-2023-24932,0,1,e8a46cb1a1efe6585d0924bde867a63f0e2815879b41600f60665d01530ae6fe,2024-11-21T07:48:47.630000 CVE-2023-24934,0,0,b063256a223adfefb231bf44cf66744c128745708e070ccb4c8cf146c607f43b,2024-11-21T07:48:47.787000 -CVE-2023-24935,0,0,44066e8436a2f4e902889f0d88724d97f848e5db883c16437a126b68806e4afc,2025-02-28T20:15:41.810000 +CVE-2023-24935,0,1,8614e0b6fbe2f08c0b431b27c8e1fe123ed66ddc777242e7c09ee082c7bf41f3,2025-02-28T20:15:41.810000 CVE-2023-24936,0,0,505bcf4b6a5f58019032a1d5b6159bf29aaa4d730ba53d1a3bb4919bbceffcb1,2024-11-21T07:48:48.003000 CVE-2023-24937,0,0,45be0bdf310f7ea0dae27b5a09535a058dfe5731f6609e52cf4744010d4cb0b0,2024-11-21T07:48:48.187000 CVE-2023-24938,0,0,d12e34f15419e9b00a7c637a8a6db492342337e0d2eee9897fa539eb02d353f6,2024-11-21T07:48:48.330000 @@ -220306,7 +220306,7 @@ CVE-2023-25267,0,0,4259de3326950cd8e26ada70276d9aaf3cf4cb092f4dc89828c70d495046b CVE-2023-2527,0,0,b628c7086a29a9183da8f9f64491e1f494424d1684e0e71a944098c3e46be700,2024-12-12T01:20:30.213000 CVE-2023-25279,0,0,b1a7056aac972e2cef544266b63734e9282f2de2380e110d864a5fbe3b37fb78,2025-03-03T20:15:38.600000 CVE-2023-2528,0,0,7354ad96239bf796c6cbd6ba58728972cb6fb7255bae028f505e752f2e6ec6aa,2024-11-21T07:58:46.940000 -CVE-2023-25280,0,0,a79c3cb01158c75cebb6ca46dbda57415199643ec1f65d6581773efff9df270f,2024-11-21T07:49:22.837000 +CVE-2023-25280,0,1,420720f7b19bd32b6fc1bbd4aa7919fb187b5c67dd551259fd62cd8da22709a4,2024-11-21T07:49:22.837000 CVE-2023-25281,0,0,08a99eed9edd45cf107fcd3f103157d21f276d9348825d0b3afd565c9dcd6a89,2024-11-21T07:49:23.057000 CVE-2023-25282,0,0,f816cb37e750e78c1fe070772f27931ee830b2aa8129db9fffc29b2562f70ec6,2024-11-21T07:49:23.203000 CVE-2023-25283,0,0,5f356e0d9f59faa52b6e5bf0560e1bd2b7ce0198ae0f76caceeb35ca6da8acf0,2025-02-27T20:15:36.397000 @@ -220606,7 +220606,7 @@ CVE-2023-25675,0,0,8c8a829c022837acdcd6adf4f27bbae59cfec6ba8d35a84fba47dc6cdbd4f CVE-2023-25676,0,0,f7a1425608694de8f812c14e6a8a67c4560e9f4ee555fd51e1345942fd97d3f1,2024-11-21T07:49:55.443000 CVE-2023-2568,0,0,1720d24034e6edb25f9766c5935e20b421d30b6b90acdffd3a597fe2816fc7ad,2024-11-21T07:58:50.880000 CVE-2023-25680,0,0,e1a64726bce64077951e4f0196ee171d32e8cc7addf06ab340bdd8b07a622ce5,2024-11-21T07:49:55.567000 -CVE-2023-25681,0,0,aea3c30ef509d62ebb6f4760f393c3197f0e7180fb2f1139863bbb3d40a7ebd2,2024-11-21T07:49:55.693000 +CVE-2023-25681,0,1,b995cd038aa84a3dfc37eb48780040a0178bbc78c195f3b55f7279fe3ff4a946,2025-03-04T12:25:10.853000 CVE-2023-25682,0,0,d5139c0c5549f8e8ae3d7e1fde9e7ccd648987f7ad2100fe4c46f6d2a3b0ba0c,2024-11-21T07:49:55.813000 CVE-2023-25683,0,0,fbd7618f9c7aca7a4eea71dafec6e8d08388ded8d50e034023250212a3d8facd,2024-11-21T07:49:55.943000 CVE-2023-25684,0,0,529ea0c5ef5ba39313fd08affd805eb0f72bb28214ddcced317413f182c224ca,2024-11-21T07:49:56.077000 @@ -220644,7 +220644,7 @@ CVE-2023-25713,0,0,dd0d0c101d1005a4dfb41b844ef773d03acdf6055413f757c97bed9c9e64d CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e4334f7,2024-12-09T13:15:23.967000 CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 -CVE-2023-25717,0,0,8bbaa01a33576cfd9c8ee16f21a7be05022bbe98b9b58ff733f0a5074a27fec8,2025-01-29T16:15:39.253000 +CVE-2023-25717,0,1,530b1e06023752d31beca2384ec8cc297d9cab5a2bd76e45e84ab265507c5cc4,2025-01-29T16:15:39.253000 CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000 CVE-2023-25719,0,0,af067eb4bbeaa87ff5bd0003d5bd5bc28035789641dd59be0ad1c17fd3a0687e,2024-11-21T07:50:00.107000 CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 @@ -221378,7 +221378,7 @@ CVE-2023-2652,0,0,463a4ac082ec703d5d5956209565c55ef56e7f0ca770c74381540a378ec2fc CVE-2023-26520,0,0,8bbadfe41f0961187a2a9723f99b15d379e9fedefeb5c75b5a71616de7cc9606,2024-12-09T13:15:24.623000 CVE-2023-26521,0,0,9b025c0740b71806f679769b8c710244bb74bf3dc6394de4036ba9f960ec51d0,2024-11-21T07:51:40.347000 CVE-2023-26522,0,0,a0f96e13a377b4007cc9557c9a4a746228fdc4a7287d0d66549492731d9505d6,2024-12-09T13:15:24.777000 -CVE-2023-26523,0,0,e57f98036f26a1920e749f1b338a2ba634a30a2031ed2d1aab6b09d7931c7959,2024-11-21T07:51:40.467000 +CVE-2023-26523,0,1,715fcd3ca8153b8ce9abc200073deacb36460949ef8701ab344fd2ae2eaa74c0,2024-11-21T07:51:40.467000 CVE-2023-26524,0,0,3d237401d49ea9adff1b292d58c86c8af136eacf3e74a201a2a0c2ec747ca632,2024-11-21T07:51:40.577000 CVE-2023-26525,0,0,70b10fab59a416858b2c3c8084128377292d392f57ce994c37f9bc7e7c2eda47,2024-11-21T07:51:40.690000 CVE-2023-26526,0,0,94ee7ed4ec413223587a69727c0ed222c8ba094df4a8dcc78b40e4cd9fc8ace9,2024-11-21T07:51:40.813000 @@ -222011,7 +222011,7 @@ CVE-2023-27457,0,0,db33655e037a343ca2b318f816541e3292041ff8f0e3b127514bebbaaa676 CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000 CVE-2023-27459,0,0,52dd158ab4109639424079513a505fc276707ade7fe70bcd50217505d316710c,2024-11-21T07:52:57.177000 CVE-2023-2746,0,0,98242dea1630ecb5d407829a0cfc43949cf4fae0e0c6a7aee7cbf79120ac6bca,2024-11-21T07:59:12.863000 -CVE-2023-27460,0,0,7bcf692464f376ae5e5301bda90450c546c10b0805803935c32eda75a8fceab4,2024-11-21T07:52:57.293000 +CVE-2023-27460,0,1,d0a4b6803d7eed30bbcc6c0565b88f4dbc31589c58d0f5cf4dfdd65a9008b7f5,2024-11-21T07:52:57.293000 CVE-2023-27461,0,0,175bed00a77c02dfaff0699075240f268538851e9028c34c2c4a73edf53266b8,2024-11-21T07:52:57.417000 CVE-2023-27462,0,0,2753acd56058c78c9b40a10cccdcaef0d20c4e913018cb45b2738a744d8a5d7f,2024-11-21T07:52:57.543000 CVE-2023-27463,0,0,762bf14565d23d4343e40e12bbcc0ce88cd3db82d0b0aacd3eaf47f25d900552,2024-11-21T07:52:57.663000 @@ -222073,7 +222073,7 @@ CVE-2023-27520,0,0,7cfc86e27d87a04d2be4742a1b2fd83c24b17fbd45830c3942c74c9510e9b CVE-2023-27521,0,0,d0280668b2ed638e8d9575be3ed07dc6ecc1f654fb45c40d020a2f9c3b5a2217,2025-01-31T14:15:30.730000 CVE-2023-27522,0,0,0f4064f7600ff06b1d0a6fbf2515f1b96463167ed2adb01ccbed47358b6bc28f,2025-02-13T17:16:13.183000 CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829c64,2024-11-21T07:53:05.643000 -CVE-2023-27524,0,0,3a89b9a9e5827dc76ab9740ee91fee0870f79d1969f43d566be430989d7a864c,2024-11-21T07:53:05.773000 +CVE-2023-27524,0,1,2a724a2933434466381182023210376c2f83511db739404a5ffeab4d2cae7dcb,2025-03-06T19:48:51.880000 CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000 CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000 CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 @@ -222550,7 +222550,7 @@ CVE-2023-28088,0,0,3115db2774cf28e4f5677d996e019dff4cdd9782363caa31df05dd7ac8dd2 CVE-2023-28089,0,0,8038f737015b1cea5c80ff26d9b03c652f37096687c4ca8f5a19f7ac6bd74834,2025-02-03T17:15:13.320000 CVE-2023-2809,0,0,077393c58c8990f29f8e82ad241722cf36fab954ed97d4fc720fdd591c7e00b6,2024-11-21T07:59:19.990000 CVE-2023-28090,0,0,a87ffa52ba290df0e5b828881d9f1b9de04b7261b9f0f8fa0f61680a1944de79,2025-02-03T17:15:13.480000 -CVE-2023-28091,0,0,2fac4128d71d5aa19399e259283fbb3256df459c3dcf0924fe4bd1a5e72e2344,2025-02-06T20:15:38.647000 +CVE-2023-28091,0,1,f1a0a0e394ef9fa09deb6f90139dfe2c828e30cf0193d5bf7f2775e538e78dd5,2025-02-06T20:15:38.647000 CVE-2023-28092,0,0,fa9a6e25c46e37f1ee9a255bbf33cc96208208da5465dd635479cb57349ae6e6,2024-11-21T07:54:23.150000 CVE-2023-28093,0,0,259bdd06199123fa465d95db621eeb8ee389e1259607020367a23d832cd811c9,2024-11-21T07:54:23.293000 CVE-2023-28094,0,0,5bcd476b1754f5150cc1e276ae628754bb67341403844f64654a5132ee5d7d9f,2024-11-21T07:54:23.410000 @@ -222711,7 +222711,7 @@ CVE-2023-28255,0,0,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f179 CVE-2023-28256,0,0,53d012c4f4b9abca5c1a189025597db086560275d3d5102dba44da8993793d55,2024-11-21T07:54:42.730000 CVE-2023-2826,0,0,5f07de1819d0003ff8e578a142827c865b94157521575a450c8869e18dd04831,2025-02-12T17:15:20.110000 CVE-2023-28260,0,0,9d42909900dc5b743b635c40edb3388a3a1b977b27abb173433e9bf06d8a3542,2024-11-21T07:54:42.873000 -CVE-2023-28261,0,0,099dfc60fe9cad7829d84140e9f27b8c475cfbabae635b3fd144bb49045f52fa,2025-02-28T20:15:42.067000 +CVE-2023-28261,0,1,2804f74d4f978c25979640d0f8eba453a516917b6c15b12ce86332f8f05f406d,2025-02-28T20:15:42.067000 CVE-2023-28262,0,0,5688fdb5c21f038bb05742d43ee3ebb92be8fddb0b80ee5d81721383b6735563,2024-11-21T07:54:43.140000 CVE-2023-28263,0,0,48218d485f27fcdc8957f621c7d4aa0fe8187a4dccb65445dc074430a9ec6a34,2024-11-21T07:54:43.273000 CVE-2023-28266,0,0,466ca78921baf11e6120c13a28d81ef39d9861bf4a872c75b075323c4d8d00e0,2024-11-21T07:54:43.407000 @@ -222730,9 +222730,9 @@ CVE-2023-28277,0,0,657a7cb51bcd262ae465b48fb5cc2738f33eaa082d0cf305a1a6b58ccbab4 CVE-2023-28278,0,0,d6e5f85eb923c94d6e2f6deb971e32f2b4acef13e2303b60fc3047f28c83242c,2024-11-21T07:54:45.130000 CVE-2023-2828,0,0,a371c564bc5051c7daa5d723658e0ad0cbde32021c5dc6c3f2f1c91a8f0e860e,2024-11-21T07:59:22.150000 CVE-2023-28283,0,0,02e2f2a7203b3861503e7b160552cadcd206518a229a8ce3d0443ed5fd7c1d2a,2024-11-21T07:54:45.273000 -CVE-2023-28284,0,0,fe156e3ebe3e09c6a457e0cbf52f3fc401811d50cf4f7171b9dc36366d492897,2025-02-28T20:15:42.217000 +CVE-2023-28284,0,1,cf9d3d41850ff14d8507105665bc252f1296217fc0dc65103cedc83b18d201bd,2025-02-28T20:15:42.217000 CVE-2023-28285,0,0,bffce47a511701c672d6dbb7f2c407c6eba0aa8c1b86a8a603a5ce6bed3d46b4,2025-01-01T02:15:27.993000 -CVE-2023-28286,0,0,4aac1cdc197747449758e7312c2d0d352ab13e79b4fc9ceddd49cf317466a488,2025-02-28T20:15:42.360000 +CVE-2023-28286,0,1,49aa60a1a2b5e18bd777b9dd1cf408b8ca55dc18b97c4ea50e5589b077fb5242,2025-02-28T20:15:42.360000 CVE-2023-28287,0,0,450f128d8cc60abae7a7311bf9f2f3652ccd28483332b949efd1b7c78aacbfaf,2024-11-21T07:54:45.827000 CVE-2023-28288,0,0,5093b285423c1d16cfa9dcf547b753158acbd3a696c51969307e022d2c719c95,2025-01-01T02:15:28.247000 CVE-2023-2829,0,0,ebbb99be5ef9f212ce39405dbc1217e37028f76941bdca8ccb91a39adaaf1790,2024-11-21T07:59:22.303000 @@ -222747,7 +222747,7 @@ CVE-2023-28298,0,0,27d98d1a1c8be95757d28327184cd0dd130dcb4fd2affc307b1d4802caa63 CVE-2023-28299,0,0,151b97af0fd12592cef19a08217c6ccf186f1c8975a380f67f50bb0eaafb3253,2024-11-21T07:54:47.197000 CVE-2023-2830,0,0,afa9f35d5f92e9adb5e591002c9550a94202603384c5cff69d3a30a0f7b43281,2024-11-21T07:59:22.423000 CVE-2023-28300,0,0,812c280bf87b13295521f04f7cc6bd8d0a2ed615cab7a8fe9c057e24fe6e3637,2024-11-21T07:54:47.337000 -CVE-2023-28301,0,0,33dbe5b389b471ce06235096191b35a8b0910a6e76cae89e464bb7cdedd3d421,2025-02-28T20:15:42.503000 +CVE-2023-28301,0,1,4c0f058c76bf32440a0402bc07217802171fc90259b1f65f87aae525c92966d5,2025-02-28T20:15:42.503000 CVE-2023-28302,0,0,c0ed64707c937a115ef4295335123a6bc9891a84888456b11a9b02e3ea1c8dd6,2025-01-01T02:15:29.660000 CVE-2023-28303,0,0,177a685c7dbca7f5e511c6e6e701da63dc297ee31accda0a4197f4bb3f5dafc1,2024-11-21T07:54:47.747000 CVE-2023-28304,0,0,d2b1131b10699689d0d11b14f99b769843da22dfff9bef2fe414995080975fba,2024-11-21T07:54:47.887000 @@ -222950,7 +222950,7 @@ CVE-2023-28490,0,0,c2691cf6dad5873e37bfb7d31c03351110931dec1c4d68cf78fe7f6f6416b CVE-2023-28491,0,0,a08f5fb57c47bae4014cf5c58fd84802370a22132f8ba33f6db944cd58678881,2024-11-21T07:55:13.210000 CVE-2023-28492,0,0,61c2652aaa1ed3df12d34a1cb2df045415a71058bf8ba985a3b25a15910c298e,2024-11-21T07:55:13.347000 CVE-2023-28493,0,0,63d26d8433b17b438460f6376e5cf247729e1647b56c7c622cf289b6f74c8eef,2024-11-21T07:55:13.470000 -CVE-2023-28494,0,0,830d71f300e90bdc23d9f16df4b8ec59e19b3f49f9711c82d2e32cab743397dc,2024-11-21T07:55:13.610000 +CVE-2023-28494,0,1,c439c1112a0b3588085efe2f7242e59ee168af54082de6e705fa56eec08120f2,2024-11-21T07:55:13.610000 CVE-2023-28495,0,0,6ade60805a535d9bfe6a65f4c8166f3225cfa6a32d1916948d9167e1f4e52539,2024-11-21T07:55:13.737000 CVE-2023-28496,0,0,bfd15d02e568296b3863ebee8021904b794b9b4b61fabaeabfe1ed360a2945af,2024-11-21T07:55:13.900000 CVE-2023-28497,0,0,afd8859928c8144c20a4e02a9eb71a629b06026a464eb1aa02479f6f4256bb2b,2024-11-21T07:55:14.037000 @@ -223282,7 +223282,7 @@ CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad085 CVE-2023-28829,0,0,5f3fb9e83e6bf580b695944554c6fe1959e6a17c65d5fb240077ff50f4fa6f71,2024-11-21T07:56:06.343000 CVE-2023-2883,0,0,34959bad52bf6be31f759c1775100dbd3b11b18902b85ce859cda51c457d7e02,2024-11-21T07:59:29.487000 CVE-2023-28830,0,0,fed7b0af3899c9c0351c75ec8cfb07e27d01e8975cc277e5aac982d65b695708,2024-11-21T07:56:06.480000 -CVE-2023-28831,0,0,6f6cdd8e5fd8fe1559f9c93fab3dd445c779916161a7a2b5332a6e8de2089411,2024-11-21T07:56:06.617000 +CVE-2023-28831,0,1,1cb929cc23e41716a49688a6ffdeb4c80c40ebfbe7776c15293911d36edbe691,2024-11-21T07:56:06.617000 CVE-2023-28832,0,0,c04fae8e5ab3928bedf14f9231bd4ec1cf01e8d8f32a49b0e582cb4d622fe123,2024-11-21T07:56:06.930000 CVE-2023-28833,0,0,9011138fc64d981c5e762d5dbee0f1652c314153024bea70573be0bec72d6058,2024-11-21T07:56:07.050000 CVE-2023-28834,0,0,8d6db7c0f5b4adbe01caa0a5aef9170681d4fe1257d2b601a0080883b3c572fc,2024-11-21T07:56:07.197000 @@ -223468,7 +223468,7 @@ CVE-2023-2905,0,0,2e7d8586b199affe214707e53c4af3357cc1420ad86076cef07ea334cb9435 CVE-2023-29050,0,0,e9a00a942e26ae8816ff11cf7bcb97724b4e1f59ee49ee2fc1b956f609bedc66,2024-11-21T07:56:27.090000 CVE-2023-29051,0,0,f52b3125a784c291a1bf4434e1c507e99fdcf3c6c2cec9f72c5586945ec11c15,2024-11-21T07:56:27.233000 CVE-2023-29052,0,0,2175a1d1cb47429d8e3145d2b808a6eee72a416943ca78050e547484ba54e2ca,2024-11-21T07:56:27.370000 -CVE-2023-29053,0,0,f17283c9b2e609ff21770e70c7fe17c1255f15db2004f8dc9a462899b0ebfab7,2025-02-26T21:15:16.830000 +CVE-2023-29053,0,1,23cbed0f9e6f84aa3c5e9f654c512f78b8b9698922d171117db774eaca8bf209,2025-02-26T21:15:16.830000 CVE-2023-29054,0,0,9145e738c6033594e303be9703373181917b855ed69cb67e93d41917f9d0c2d1,2024-11-21T07:56:27.647000 CVE-2023-29055,0,0,78036d146b1281e623983a269ffb6615c8fc0e3ea91f5c0231eb52270e30974a,2025-02-13T17:16:17.503000 CVE-2023-29056,0,0,104bc8fdd98392e04e87fb3246e3aeeecc1ca5f56863b6a608ffe24b5a7ed467,2024-11-21T07:56:27.923000 @@ -223717,8 +223717,8 @@ CVE-2023-2933,0,0,506fe21d298d60e81cfb459c778ed6f01e9fe9fb433eb44e4e20d5f10537cf CVE-2023-29330,0,0,b081a0b9606df4872e479593d4c39109a0a6e927bc23a0f9a36e4cdff9539df7,2024-11-21T07:56:52.567000 CVE-2023-29331,0,0,2c87d248fb12110e9d3681dbc35a6bacea3b3865feca7228ffb2a45f791233d2,2024-11-21T07:56:52.667000 CVE-2023-29332,0,0,426a3f2d7c6e1861c2689b1ef1d51fd2ed2c65028037d9c2f1e87622c3393c2f,2024-11-21T07:56:52.810000 -CVE-2023-29333,0,0,796546d619f4f04132c9e8a9764a4f889c4e0aa249cdcdb7ff6170e208484946,2025-02-28T20:15:42.797000 -CVE-2023-29334,0,0,6b2dbb12ec70185bcb42557e8872a943d968b654b42d6f523db3792268bc784d,2025-02-28T20:15:42.943000 +CVE-2023-29333,0,1,e39ee9256d6cb6e4bbcf62435e196e69d1632189657e25959c48ed30d2e578fe,2025-02-28T20:15:42.797000 +CVE-2023-29334,0,1,40a694796c3dfad5000acd1277181ac7ebaccbe7833e8fb5fefb1007db0b3ca0,2025-02-28T20:15:42.943000 CVE-2023-29335,0,0,61181b1a8a11a5838648b960745a60fbd0089db6dfa8e380519644f6fe0f4ebe,2024-11-21T07:56:53.140000 CVE-2023-29336,0,0,4eff31337ef98c9ff29bfcb52467fa2757a57db48d118523b36b87bf90993948,2024-11-21T07:56:53.257000 CVE-2023-29337,0,0,56f7ebb5d77e680d8eedc44e0115faf21d19e36d9a2d179e33c83a37194e5627,2024-11-21T07:56:53.383000 @@ -223734,11 +223734,11 @@ CVE-2023-29347,0,0,7540a8b8428988d01d75207c6801c8a4498852058d52dd035965bc8e2062d CVE-2023-29348,0,0,cde6c9d0d1c4a590530eacdeaf218fbd357f360dae86b83faf7599fdfa227cbf,2024-12-12T01:19:43.200000 CVE-2023-29349,0,0,68f1fee57235f288caf20ce8e4d0f85f5f33cf9c2891304252a1903ff58cce8f,2024-11-21T07:56:54.493000 CVE-2023-2935,0,0,a1f830d805349a093c6cdeb2502a942677ce9d486e83c5e09da994318fabaf74,2024-11-21T07:59:36.050000 -CVE-2023-29350,0,0,90cb508a611dae77f0039ac880cccf354480d10c1fb8d0ff19982235cf4056e2,2025-02-28T21:15:22.160000 +CVE-2023-29350,0,1,2ed5d40d921be07f53bcb7b5ee007eec52d63d5dc0e2ea404264ac6c6796fb1f,2025-02-28T21:15:22.160000 CVE-2023-29351,0,0,c6062460c858a11fa54fe28b1df1eb831b3681fa11b330d5f4bd8bff873bd007,2024-11-21T07:56:54.710000 CVE-2023-29352,0,0,61aea718674b1cd43fae5ad5029d7058a355bbad52de0a500c7bb8958f696e69,2024-11-21T07:56:54.847000 CVE-2023-29353,0,0,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3695,2024-11-21T07:56:54.950000 -CVE-2023-29354,0,0,22cb0b755ce130acb9b547513bcaa306934a6b0cb0719b856fdbe31b8e21ddb1,2025-02-28T20:15:43.080000 +CVE-2023-29354,0,1,6e6e6f6e09c384de89c89ff717c6b28e221fec8335db9a1d673dc1093d4c046a,2025-02-28T20:15:43.080000 CVE-2023-29355,0,0,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000 CVE-2023-29356,0,0,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000 CVE-2023-29357,0,0,1d53854bfebe463c63afc97a38a0162781953a5d7535dd4324423be8080bf5be,2024-11-21T07:56:55.393000 @@ -223867,7 +223867,7 @@ CVE-2023-29487,0,0,3d13910652c9ceb1782af2c61c24f634eafb36868d369f7b919d47049bc35 CVE-2023-29489,0,0,df6c5af5ac2e3229b6ed02d2d2ee1f81ebf76beb1923252f8aab1d0dd5131466,2024-11-21T07:57:09.780000 CVE-2023-2949,0,0,e8a354e546e4b107ec601ec03b74e830838f361fd676790e29e647a00c7e0f22,2024-11-21T07:59:37.783000 CVE-2023-29491,0,0,18214f055738f9c70b8ea08170c16516e75285c8db1071653aefd6687e9b2983,2024-11-21T07:57:09.933000 -CVE-2023-29492,0,0,6d699c439c5d8ded49fa6cb032f9de89a3509187577d5869add282334a403581,2024-11-21T07:57:10.087000 +CVE-2023-29492,0,1,4f4685c55f6bbe7d9cfbf5960e8880e59ffa020d3df174295de098520679790d,2024-11-21T07:57:10.087000 CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000 CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000 CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000 @@ -224559,7 +224559,7 @@ CVE-2023-30627,0,0,b179551ac2b2aec7f243ff1595f134b80bdcf8367ebe0ab868616ab5fe5c6 CVE-2023-30628,0,0,acdb1a51d868c185cef5580412bfd3a1adac8efeb23d4e4d62dab4098c169b96,2024-11-21T08:00:32.690000 CVE-2023-30629,0,0,db8d47acde7b3fee691ae50fd114be204f5537a7a6a8f106752ff53ee0b6dbcc,2024-11-21T08:00:32.820000 CVE-2023-3063,0,0,cd7fb32daee65efff903827a32e072d7912d2ff2abce0c6d7779ba3dd71b4c62,2024-11-21T08:16:21.533000 -CVE-2023-30630,0,0,e9d5c7c15e40c974939f85897f47959e11abda8a12f7e2deba572dfe47747548,2025-03-04T22:15:36.017000 +CVE-2023-30630,0,1,1eb45a49624e5a6520b124553ba44092c2baf7116c9a6105c61bc45912f7e067,2025-03-04T22:15:36.017000 CVE-2023-30631,0,0,bfc0d3beeb5e32392077de35a24d682dc59521e8c032d8e7696231220add5d78,2025-02-13T17:16:25.470000 CVE-2023-30633,0,0,74099a59b3b177109852946fc25b65f30a6716f2451544a4a77fa813ae4ce4f7,2024-11-21T08:00:33.987000 CVE-2023-30635,0,0,ab8703ab2fe3f8b696f825d26e2348963d273f0de2940555f66172cfe52d1f89,2025-02-07T17:15:28.943000 @@ -226323,7 +226323,7 @@ CVE-2023-32759,0,0,92de9d873ac7aa594425a2888485677aae7f3f4a23755d578f3b5235ca019 CVE-2023-3276,0,0,7123ab0296b7c6ce7ad901a4894fc936c5af5168247b12da45ced6e2751e456f,2024-11-21T08:16:54.930000 CVE-2023-32760,0,0,fccd0073c9a6db078eb62a2bd869cbc7c5b72623c98c003b079b71a0260b45d4,2024-11-21T08:03:59.657000 CVE-2023-32761,0,0,7c98169f1d6d44c78c740529722a11281ea1d59a06f5528eda0efc8fc6652f19,2024-11-21T08:03:59.803000 -CVE-2023-32762,0,0,8885e1478d5a5347dcddddfc5f391080f8ea3998809c16cc92a63732c551fbc9,2024-11-21T08:03:59.967000 +CVE-2023-32762,0,1,d787066ec1b56e489e84b7713305dfd3d1c0f147223122b1a7550d2ec7c122b7,2024-11-21T08:03:59.967000 CVE-2023-32763,0,0,13dc09fc98abd947b5057782cd048a40b85b6d5b968ed9bbc1c3021b6d91770c,2024-11-21T08:04:00.213000 CVE-2023-32764,0,0,ebc54782bec9818ece3aefb2fba6620578488822b7196a3e93048212e5122f14,2024-11-21T08:04:00.367000 CVE-2023-32766,0,0,45a6bfbc1bc5d9ad3e69720870daa6abcadcf2c17ea85ef6a1a7c6c24f887cff,2025-01-31T18:15:32.640000 @@ -226634,7 +226634,7 @@ CVE-2023-33128,0,0,772c47a195903987cfa6221ad03af8ca52aed890cd2702133f6ee6f12331b CVE-2023-33129,0,0,27c2c660dfe64c3f463f9f465a98d93e6b7658ef9955d742caaa3b16d5317f49,2025-01-01T02:15:45.030000 CVE-2023-3313,0,0,35a41bb99b4450acb54669178d01dec620869198d155697de5c92593c1a1d832,2024-11-21T08:16:59.433000 CVE-2023-33130,0,0,216848226a9ee176c9362044c0015a98fc59522fe53383acd38430b1cf9cb9df,2024-11-21T08:04:57.070000 -CVE-2023-33131,0,0,0470fb500b6ca80a4f9fd501ec8e50ef39a52ad7912365c3866b43712cb9733a,2025-02-28T21:15:23.230000 +CVE-2023-33131,0,1,e68c4d9249b2c20a0c2cd357581a54103d9b33aa98f3f6d81822753610f4fc7d,2025-02-28T21:15:23.230000 CVE-2023-33132,0,0,0d9a65533d7531be65ccdf067c48a00affe18f9dd7c2fc2d4e416800e769931a,2024-11-21T08:04:57.330000 CVE-2023-33133,0,0,376f41ef4b45180189a2dece784b8004759c786b69569a0af0a6657c0a5aabe3,2024-11-21T08:04:57.447000 CVE-2023-33134,0,0,dc4d5e56efdcd5e7aa4fd806cba38aa381b5014743f43d84ed56194f9776f6f5,2024-11-21T08:04:57.577000 @@ -226643,24 +226643,24 @@ CVE-2023-33136,0,0,99eba898fff23d82c47f2c792c222f3f3ca6ed5327fb5baca69d268d06909 CVE-2023-33137,0,0,103ba212dcba54c28261d5a1e10e51442a71026eccdde0a1b3adbe2e820d70c0,2024-11-21T08:04:57.960000 CVE-2023-33139,0,0,c5c93e304d7d4040bc790da55af757379ee9f4747fd79e0fed8e66046830fc4c,2024-11-21T08:04:58.090000 CVE-2023-3314,0,0,66b3623bcd12750794511e8de7bd12735c80df59f69ad19e4e2815979a9cb344,2024-11-21T08:16:59.577000 -CVE-2023-33140,0,0,25db18a29633d8e74c45d809dbc6b92cea1068417de79ffaa3c20d7ef4837c34,2025-02-28T20:15:43.667000 +CVE-2023-33140,0,1,d9e381ad509b58ac46da41efd8240df88f173a11c24023b55bad15d8cf8a8e3b,2025-02-28T20:15:43.667000 CVE-2023-33141,0,0,e880fe3c971966a3951b20760badd2a5635eb6ba4eef38878fc8dd765bea29bd,2024-11-21T08:04:58.350000 CVE-2023-33142,0,0,cfbfdce9ccb97bc615b3e8847adfcc51cf9b6f48a434bfa7862a5ca2dad7fdd6,2024-11-21T08:04:58.470000 CVE-2023-33143,0,0,39b8f2547e4a4602a4caf4bdb0635a664485290ebbdc3d4fdc4e3d2d068fd000,2025-01-01T02:15:46.503000 CVE-2023-33144,0,0,c5c99a4cc2d46831ddb4bfd99ffad8b12eb567b507918c6a894656cd1e008e86,2024-11-21T08:04:58.710000 CVE-2023-33145,0,0,d4f81efe6c7251455dcad2808b397fb637fcc0835388397053cb440b967b6877,2025-01-01T02:15:46.720000 CVE-2023-33146,0,0,75077b07f61cf9475551388324a9a1aebc58b8358dd1b7357824810a762005eb,2024-11-21T08:04:58.943000 -CVE-2023-33148,0,0,c61b4f9924cc96a159418e884daf34d028cd0c43cd2c2013f48b751f1169f2fe,2025-02-28T21:15:23.590000 +CVE-2023-33148,0,1,6aa5ec83de39ad2d22d1cca36f8a03c5e358340b9409b5d223715190e8886d48,2025-02-28T21:15:23.590000 CVE-2023-33149,0,0,f75f0a747a83f3f235651d937dd265d40c46a2ffafd9e6970a83f54434de4e89,2024-11-21T08:04:59.187000 CVE-2023-3315,0,0,a5cc1682b0bd1470d76652335c3939881cf5018e24052724b93fef0a4f802a67,2024-12-11T17:15:13.593000 -CVE-2023-33150,0,0,3d2a72c963c94854b23b2c134d0cbf9789e136ed96e4f409eeff8ba231a29993,2025-02-28T21:15:23.770000 +CVE-2023-33150,0,1,354d4f63c70f2dbb82f0ac811eedc73caa341224127a605f427a52cc1110451b,2025-02-28T21:15:23.770000 CVE-2023-33151,0,0,f17e6ac28e2729340aa6594d68ce2d2b7fdb7124deed3a7280a0d99b4b5d9838,2024-11-21T08:04:59.440000 CVE-2023-33152,0,0,939457a123619614ab551649c36717856d708fedb4cfe7b746afc7d87b9f32b9,2024-11-21T08:04:59.563000 CVE-2023-33153,0,0,5e9fc1087f90fd2b4b68734df3f7f4734c87850c5f8b21ad4d501f6aee250e98,2024-11-21T08:04:59.690000 CVE-2023-33154,0,0,25f0e57f58f755458e4eb749e40bd8c8036d520fd9d1513cb98d3d5f3b677715,2024-11-21T08:04:59.827000 CVE-2023-33155,0,0,d4c6dd394ea9af744964b67a6d993e9655abe1a91fb9caf6ef7ec73241037a14,2024-11-21T08:04:59.980000 CVE-2023-33156,0,0,fcd883ce5dda35d41ded90747b81fa8bf1e922a9d7bb9e8bf32b07ca84636c43,2024-11-21T08:05:00.117000 -CVE-2023-33157,0,0,c7d557c72c48ddd4d5693251044b3776fc06c682770327d7098ae5f7b7c9ef00,2025-02-28T21:15:23.967000 +CVE-2023-33157,0,1,81e2f83ca701c049ab813116907bedcd3b79f81916c32c96011bd79d5c1edd29,2025-02-28T21:15:23.967000 CVE-2023-33158,0,0,c910ac69cfbb64efec2c91fb00cf4d6f27a0268f3ab61a941c758b748c55cf10,2024-11-21T08:05:00.377000 CVE-2023-33159,0,0,70f344d7dc1310cf844805f4d3d7c603c77f7c9b9820843f9a333ad2e075ee57,2024-11-21T08:05:00.503000 CVE-2023-3316,0,0,334702b69a7141c53c86f5a20043d63d27f96464c258bc643592c12abbf58455,2025-02-13T17:16:55.980000 @@ -226753,7 +226753,7 @@ CVE-2023-33242,0,0,a76e54903e1bfa0300160648b077333b58cc1f028155f31638eea87ce5b93 CVE-2023-33243,0,0,590f0b7337db73b310eeeedc8fb6b42289fc37ed06cbdf228f0f61ca9d1533ca,2024-12-12T22:15:07.200000 CVE-2023-33244,0,0,b952001d5c70fc9f91f4520a4fc9e6d5c2bc3795aaf8dabea0f036e3908a55cd,2025-01-31T18:15:32.897000 CVE-2023-33245,0,0,16c9db6606ed2dfdc13b1f06447f38071397777076e1320f59f76264acfe464f,2025-01-10T22:15:24.807000 -CVE-2023-33246,0,0,ab37de475fef51d4cd71c2089b70fc335b2c38c207ae853dbfc66fa165a58309,2025-02-13T17:16:33.297000 +CVE-2023-33246,0,1,2d6a11ec4762fc48c531efa1c3ca38b7a60c7d28f5b2ea59501ffd8df48441cc,2025-03-06T19:48:51.880000 CVE-2023-33247,0,0,28e3bb5766ab12affc427d3366ffd23fb9c14a844b84b4947c8ef44e558c8843,2025-01-16T16:15:29.437000 CVE-2023-33248,0,0,e14495edb77049f2c89ed0c54ad4447d666394f95d323f14cd348a126ba1d6bb,2025-01-16T16:15:29.630000 CVE-2023-3325,0,0,7efdbd196c90142bd5bd8f5c064614d6c4e96a5dcdb6f4c022ddfa4dae0b97ac,2024-11-21T08:17:01.167000 @@ -227270,7 +227270,7 @@ CVE-2023-33991,0,0,864330c019fa3c67a86547803eb55d9ad422e4f988d17ff6a6ac16c7f1631 CVE-2023-33992,0,0,4a5a0b6d9977fc5ea12d68e3650dcf8778ade033c97f3ca6644b8799b376fb07,2024-11-21T08:06:22.143000 CVE-2023-33993,0,0,2e397b4fac2bc5612fbd8b3d1c03db02cea4caaa77c2fe469fda51cdce399556,2024-11-21T08:06:22.307000 CVE-2023-33994,0,0,50da05c750f5ddc6968fa620b3da33e1fe0cc63cf275da78a858b9f82511afcc,2024-12-13T15:15:13.923000 -CVE-2023-33995,0,0,90175a497ff5c27207be37abe4a2a2e494ecf8a823972ef9ca3ab32e430c20d5,2024-12-13T15:15:14.100000 +CVE-2023-33995,0,1,a271739525d7382a0c51c77bbb1c21bf2f4f5bbeb2e20b5f098b0e25dbfbe897,2024-12-13T15:15:14.100000 CVE-2023-33996,0,0,7fb28f49febde37c287211aef6c553b40269abde031954416e92203924e5acd5,2024-12-13T15:15:14.283000 CVE-2023-33997,0,0,0bbfac779740c3d268fe29a2dd4e2446760ab5e642735fa90838e43eaedcafaf,2024-11-21T08:06:22.457000 CVE-2023-33998,0,0,4ad82ff34ed269eabe3da9a2c50fa747b30ebcefc7f2dc9140d2641fdb1cb27d,2024-12-13T15:15:14.470000 @@ -227461,7 +227461,7 @@ CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b CVE-2023-34188,0,0,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000 CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000 CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000 -CVE-2023-34192,0,0,7a792a993bbfd27143feacecf8a1caaf4ad6fb33b59d222e687f7a5c9df87d37,2025-02-27T02:00:01.920000 +CVE-2023-34192,0,1,9fa67229d42fc49b395a821e47e758c7f6e84c68a28ff54f19593f727ab2c365,2025-03-07T17:12:53.023000 CVE-2023-34193,0,0,14e3f411d4a04e2c3cad259bb032e95a5c614ee3e39b67e63aaa5e15e2e15102,2024-11-21T08:06:44.767000 CVE-2023-34194,0,0,b7871e681e01ec42198e77eda731a4939d1c785c4b2346293df4e2f9dcc0ede3,2024-11-21T08:06:44.923000 CVE-2023-34195,0,0,1ba4f9585565b817e14ad2c1e757fdd42c04587c2c99d95ce7977396ce5dfaa6,2024-11-21T08:06:45.087000 @@ -228033,7 +228033,7 @@ CVE-2023-35045,0,0,59020ba7086d756072a9d908f45df756fc13e6c52833fd8a2279c472be043 CVE-2023-35046,0,0,be75d7bddb171773fdfc0b865c7ebb49459a073b8a61424f81664689f2e5b394,2024-12-13T15:15:15.723000 CVE-2023-35047,0,0,eba9e5240fc0579a5e94cb2c6682ca1369edf28f1e86dad6841e23630fabe6f4,2024-11-21T08:07:52.847000 CVE-2023-35048,0,0,c42c36702131c48dc501f2245ae6b03b0b394e9476a0c5a9061c817acd6f524f,2024-11-21T08:07:52.980000 -CVE-2023-35049,0,0,2610e654bbb6299a584af0a62ef345b13dbf31c39effff7fe3b6628b33472629,2024-11-21T08:07:53.123000 +CVE-2023-35049,0,1,e436002c0b0c44b84fe779a9cdd5c162c00229e83ba6e19509971d1d1efbf09c,2024-11-21T08:07:53.123000 CVE-2023-3505,0,0,028abed4ed563200a4d3925dc55e0b44321934486645d4eca13e9c221952639f,2024-11-21T08:17:24.700000 CVE-2023-35050,0,0,7798d8be3a83e605c6d0ad9dcb99cd50b0dfdf1c690f4791cdfc810b3cb136f2,2024-11-21T08:07:53.260000 CVE-2023-35051,0,0,f0c3f4150fd7e48e527eddb623de0aca17423e277eb3de8858de4a5618ee0234,2024-12-13T15:15:15.880000 @@ -228270,7 +228270,7 @@ CVE-2023-35389,0,0,5a62eb7d579c869493b8eccc441dd2c6c2d0bdf876845e9ffa41601c68bce CVE-2023-3539,0,0,44eac7bb26efe9fa8f35bebef930a683e7cb2aa7a2bed5694e5228d1009e441a,2024-11-21T08:17:29.673000 CVE-2023-35390,0,0,9888ca187426062a7d12cbca91e60e372647fcea5214b27c9b3d579f113a51ce,2025-01-01T02:16:02.787000 CVE-2023-35391,0,0,bb103be9307ca23d479248deb4e446266c7cfa23c30add9bc5c5b54fe2dc2df8,2024-11-21T08:08:22.370000 -CVE-2023-35392,0,0,b3ab3694c4022fefd55dc9e5985dfd1d2026e934a617434df28388209dd87aa5,2025-02-28T20:15:44.547000 +CVE-2023-35392,0,1,0373cb6d8dfe6f0e32da0f9f24548e1705c8bbce93af848491eef0dbf45c1e5e,2025-02-28T20:15:44.547000 CVE-2023-35393,0,0,e8b92057ca70bdca0d1ebb492b43a66f358d460ebbf5b74d0dfaadd60685e4e7,2024-11-21T08:08:22.650000 CVE-2023-35394,0,0,c1212bf7152173930e08a3ccc6ec822345c4ed792bca80b7bc1d1b4f3b202f2d,2024-11-21T08:08:22.777000 CVE-2023-3540,0,0,fb54c5e79c718e673ee36cfd65d0f38ea01746e1f383e8e3255fd878034c9e15,2024-11-21T08:17:29.813000 @@ -228282,7 +228282,7 @@ CVE-2023-3545,0,0,3522db59930b50b46eca7a510c352378d2dfa7a960ca1accf062153f4f6baa CVE-2023-3547,0,0,1ef9ff46cca3788322beba1952cd97e7807f5d3b216b9ea0591a0e7275381d2c,2024-11-21T08:17:30.733000 CVE-2023-3548,0,0,e1423caa843f87fa2d6d013924800d27f69e53e6549a622df522ceb0f14e81ea,2024-11-21T08:17:30.860000 CVE-2023-3549,0,0,08f60160ba5845f1b3fda5248764a82eb4886b52cf9915a4070b7221e524418e,2025-02-11T02:15:31.663000 -CVE-2023-3550,0,0,19122d8b0b42eba28bd18932d38b14ae4753504c03567b2ec3894a42ab63bde8,2025-02-13T17:16:57.407000 +CVE-2023-3550,0,1,713fa5c032777ba5aab7dc2312a6561da372a17c102285e9d63fccc24137f67c,2025-02-13T17:16:57.407000 CVE-2023-3551,0,0,699d37249792c6e0216787d3591ab7ec21054b3b7381281b66e3f167b20cd47d,2024-11-21T08:17:31.210000 CVE-2023-3552,0,0,52570a1364e4501926204b0aba03c6071192ce2ca6baa255e79b490e335cd452,2024-11-21T08:17:31.377000 CVE-2023-3553,0,0,6efc3a6c64a2b958127785e08addd26978057687d48d85108ec0dfc5b9b9b27c,2024-11-21T08:17:31.557000 @@ -228555,13 +228555,13 @@ CVE-2023-35895,0,0,83ce1443b6655dab60e0c4caf8c50745fccee066f0b72d30b018dbb22010b CVE-2023-35896,0,0,083027e8b7b9991862f226b808efa00e9c54a1aded5738c59c832ee7a839eaa3,2024-11-21T08:08:56.640000 CVE-2023-35897,0,0,4441d4b616892b6bf61b7f55516939aaa11e282b69fa205360a8598d1c288ddf,2024-11-21T08:08:56.773000 CVE-2023-35898,0,0,ae8e5a3045aac197c5b4a0c55f6f9005b7ee1e3cd15e71503b1ecdfb292571a6,2024-11-21T08:08:56.917000 -CVE-2023-35899,0,0,4dea4953831956ec9c14bd232e25ad0b375cadaa267c76c08d633a021dca77bb,2024-11-21T08:08:57.040000 +CVE-2023-35899,0,1,908066a611f467d7a12f450a949b079f97189435d8c5a9b4441edbb7abdfddf4,2025-03-05T18:24:35.503000 CVE-2023-3590,0,0,82b2b8b91f4c3be7b699fb8f33ccecf1e8c69754a221ecdda0bb25b2ef79529b,2024-11-21T08:17:37.127000 CVE-2023-35900,0,0,9214ca961b93163204463ded6d4b5e4cdaf81febbc51e642b9e4994da121de10,2024-11-21T08:08:57.160000 CVE-2023-35901,0,0,764869482f4620d16b5d10509c4323c77ec2b7c88227515f848b587d33d66485,2024-11-21T08:08:57.287000 CVE-2023-35905,0,0,41ec045da9b8e47c817f8bef8ffa84316576a9d7508182f2fce6bded3dccbde5,2024-11-21T08:08:57.410000 CVE-2023-35906,0,0,2b379cd9c01c73e1c7a567e3502f4499fb1fa92efcb09618be3760205bbd72b7,2024-11-21T08:08:57.530000 -CVE-2023-35907,0,0,754d912a0137433e8a221d02304c2d5767ef0031c6e56bf4a9e65f5c8122bc17,2025-01-29T17:15:26.350000 +CVE-2023-35907,0,1,6c20e09b1196dba6f3d5802c42202f0b829abaca92c0cd229e02a92ea3adebea,2025-03-04T21:43:48.913000 CVE-2023-35908,0,0,8db2f65e856bcb97d3d9f0310c7b7467bca0d38d88082818eabea4a1a5706482,2024-11-21T08:08:57.667000 CVE-2023-35909,0,0,0fdc8cfe042abf650527e03964e6aeb5f820e0111164912709b46c1d0b096cbb,2024-11-21T08:08:57.783000 CVE-2023-3591,0,0,75269fdbe60b09a5c6a61865b40e00c916f22cb46c44486d2de75f6bc1242711,2024-11-21T08:17:37.270000 @@ -228603,12 +228603,12 @@ CVE-2023-35945,0,0,964143f928c92bea6b7339b394c3f52b183ddc8b150fc3d1b4dde8fd3c0d2 CVE-2023-35946,0,0,f9a7a11dbb78b03e3e9af373b8f4eae2a401d11e9e75c0bed6486fe6eb92eeb3,2024-11-21T08:09:02.030000 CVE-2023-35947,0,0,420667c146b532c8e0ec00ccc7345dd5a39de55783dd0a08493a2e2f9b40ac5d,2025-02-13T17:16:40.690000 CVE-2023-35948,0,0,c8f862a664d40c2c195d314a7d98cb626df5c9c3c2aa672d9ee56efd7b245dbf,2024-11-21T08:09:02.327000 -CVE-2023-35949,0,0,c768c27adec5e9814e887c8513014a45d398a9c8f2521b73e217b9ebe59f7b5d,2025-02-12T16:10:50.810000 +CVE-2023-35949,0,1,234ae513cf1181c24a8bf46a7bdeefd1d3ebfb10854f4dcae82c596d2e5c84ac,2025-02-12T16:10:50.810000 CVE-2023-3595,0,0,36c3a800e2fe77bd8d7f41a96cc3e08101edb93e582c3a777dfa2342e3a7af14,2024-11-21T08:17:37.710000 -CVE-2023-35950,0,0,32fe81d427d9545c5db05ae8e8c747a14c859fe4fdbc76c9212e447a934d27e5,2025-02-12T16:10:35.737000 -CVE-2023-35951,0,0,bb2cd00e6e53a4fa4b70bca1be1745a8e9ebd4b81ee8591a6feb01dc9ec936d5,2025-02-12T16:10:26.800000 -CVE-2023-35952,0,0,0eefb5de35b696359d8108b296eef393f67c4d20a074ff798ba34b0b0fe26e14,2025-02-12T16:10:13.873000 -CVE-2023-35953,0,0,49750bef093443385674327f8f884405d160aa0a7257f7483e10f982a6813013,2025-02-12T16:10:01.867000 +CVE-2023-35950,0,1,690b79d72555402a7f9b4c5750893633c88c0cc76f4ffc306b590adec496c274,2025-02-12T16:10:35.737000 +CVE-2023-35951,0,1,0ef8348901e1ee4729b7264992dfcede6c3c8c4658a4fa9a11fcfbe518488cc2,2025-02-12T16:10:26.800000 +CVE-2023-35952,0,1,71d3e1a4f7e794f8ac0ff7370f497f480d47dc5bcdbf0e4f75078670b7923211,2025-02-12T16:10:13.873000 +CVE-2023-35953,0,1,4a48583565b25cce80fb7f5beb3ba78261d52abee84d1416d421ce140acb80ec,2025-02-12T16:10:01.867000 CVE-2023-35955,0,0,91c0639a971c00780cac97b1cea018d17f2e427fd30c92e0afbdf80f037bb86d,2024-11-21T08:09:03.093000 CVE-2023-35956,0,0,d0d751f39f1298fdc704a74843149c039cb5f4bceb3641e76a34a61f3d75f97a,2024-11-21T08:09:03.223000 CVE-2023-35957,0,0,e00c1e2d59bde2aa34d3bf82890a934b6edf52786a89e4243452e75601637a3a,2024-11-21T08:09:03.350000 @@ -229065,14 +229065,14 @@ CVE-2023-36565,0,0,d69016aee0ac6d9c8cfb446934e067ae10ba3e94b9d318759f4243fbf9bf5 CVE-2023-36566,0,0,0532ced63dda4791fea6c3f4a039c3872b4ab90c4aa3ffc97eeb9085799fc4c2,2024-11-21T08:09:57.040000 CVE-2023-36567,0,0,90dd6c86dcaf7aa52885a963a7772ec9df8849054e39553e70bf4f20b7d7d096,2024-11-21T08:09:57.173000 CVE-2023-36568,0,0,da0a43b72f15e7c15f54813da9f5228e0916be206987c7408ad21521b93105bb,2024-11-21T08:09:57.340000 -CVE-2023-36569,0,0,aa98734ba1353ca6dea37cd2a760d90a3a060483718d581c6d6f2429ff3ecce0,2025-02-28T21:15:24.787000 +CVE-2023-36569,0,1,f09fcfe2ca79e53f2e1633e58f4d3e5fa6dc26edd2ad6ead5f8dbb95ccf426ce,2025-02-28T21:15:24.787000 CVE-2023-3657,0,0,4f568d65bba5d62a7bab42f452d7d96d81fee35c105b734b0fae95ec37042221,2024-11-21T08:17:46.270000 -CVE-2023-36570,0,0,4a907fa621d0490bb14ebd00742c9c2fa8973cb5e520ffd9f7ee990ee1f6b652,2025-02-28T21:15:24.943000 -CVE-2023-36571,0,0,dc84d3f4cb533490ac3b3d94961c5d5f4c5d487ef5244d0e758dcdf426209fb6,2025-02-28T21:15:25.117000 -CVE-2023-36572,0,0,8a619d4fb9d3f3a264124299f30cdf4487488a54ed1ac124d5114c3155942b2e,2025-02-28T21:15:25.300000 -CVE-2023-36573,0,0,e756d912c4a838b0314501aa6acc89364dc48e9781b727e991c7fc76ead3c05d,2025-02-28T21:15:25.480000 -CVE-2023-36574,0,0,72233f28656ced3571f2cc0e3b34b39615d76955e238f27f8bec638bc14db06a,2025-02-28T21:15:25.670000 -CVE-2023-36575,0,0,c18804aab38e0ca7a20ec4a2446d5f06ca2ff13602248e0fcce343c052ef8cb4,2025-02-28T21:15:25.850000 +CVE-2023-36570,0,1,6195ed4afb07ebddf8d6cd720d0a5acca4ff844001f5fad2a37df7b69d6392ef,2025-02-28T21:15:24.943000 +CVE-2023-36571,0,1,82b2a5b20cd4fa0f6e89896e97fa7aeca52fb45f6013066246d2a5413aaf14da,2025-02-28T21:15:25.117000 +CVE-2023-36572,0,1,470cd7bff79bd1e9976f8dbfae70e0f7286fdeca84c06e61abd58c853f4f9b22,2025-02-28T21:15:25.300000 +CVE-2023-36573,0,1,7244b537beb4d949ffb63e9aaab3cc8bd4c182dd3eebfa4b0e91cfe080a97120,2025-02-28T21:15:25.480000 +CVE-2023-36574,0,1,d304addb45fb7acf79e7e8b5988205a44fdfa0c3a4a34c42c299031c0113d7d9,2025-02-28T21:15:25.670000 +CVE-2023-36575,0,1,f1445ce9d06f3e31fc666004b287f90577185bbd34212f8339f213d12f223989,2025-02-28T21:15:25.850000 CVE-2023-36576,0,0,08a86ff3faebdb619f94c5c219b23dee9d749bd6eb6bc5c9fce64eade6793407,2024-12-12T01:24:49.650000 CVE-2023-36577,0,0,e50aeafe79c861d091e7057a4e84c858e731c6a359aa0fa9fd6f18815c5b1164,2024-11-21T08:09:58.613000 CVE-2023-36578,0,0,0ff8143c5a5c65144cb69b60fefece7fa8ae33ca61d56f8d26ec4eddd5eee6b6,2024-11-21T08:09:58.770000 @@ -229083,11 +229083,11 @@ CVE-2023-36582,0,0,17fa89a7fba58752482f8d60d13589452a956e1b0a95299a16c8963661bd3 CVE-2023-36583,0,0,16c68d118ea57336250d71f3b0e590b09e39662e96b8c1bbb32d494d1ce6430a,2024-11-21T08:09:59.397000 CVE-2023-36584,0,0,c84e3573b835aedc034e86b3d2493c36d32455f168d328a3235641608397c0f5,2025-01-23T18:17:31.817000 CVE-2023-36585,0,0,aa6dab025f0475d1f60107ce87c0282cc6c4275369a40ec076b1a78d56d9470b,2024-11-21T08:09:59.697000 -CVE-2023-36589,0,0,dbefd01df73710ac5b7bb17cefd45ae027e43f7c5922fb46c76ac1dab1c84504,2025-02-28T21:15:26.043000 +CVE-2023-36589,0,1,73baa8e6ea652df3d5bc7a42466bcf9c20a4e2bb3b51e055ca05f774746fb4aa,2025-02-28T21:15:26.043000 CVE-2023-3659,0,0,1b0398df8752a9e92b7411b7d875ed8f28fb4e8b2899d12a885f36a2733c90b3,2024-11-21T08:17:46.570000 CVE-2023-36590,0,0,9ba231c5c0d820edd3a1004cf461398ffd81efdcd1c1746d9798e134a83cc054,2024-11-21T08:10:00 -CVE-2023-36591,0,0,f668566f18dc789ed89a9efacb81c5d93c37f46ecf4f25a0eb530cc0e8f8df71,2025-02-28T21:15:26.303000 -CVE-2023-36592,0,0,58434964ee10a3142470636386bebfb410639bcabdae5a5ca5a6c813113761c6,2025-02-28T21:15:26.520000 +CVE-2023-36591,0,1,079fdb09ded845bfe1feae41c268e7aff523a90a8f0b3e89b670ca988a44ea81,2025-02-28T21:15:26.303000 +CVE-2023-36592,0,1,4ff20b93d824445a193662c145b71f80d91859b179fae1e7e6e53f8dec4a1d1c,2025-02-28T21:15:26.520000 CVE-2023-36593,0,0,8f092aab88642398752d78e4bec75756bf2a01f1327d687dd42ec3316dbcadb1,2024-11-21T08:10:00.567000 CVE-2023-36594,0,0,ad71b61cfc8c350d7dfa4f0ea667fe77634aaa10562e45805a300a96ff554ce1,2024-11-21T08:10:00.800000 CVE-2023-36596,0,0,ccf16f9a1799ac121b0b73dcf1eebfe2f2e7d73b70cb2c3929077267f1287519,2024-11-21T08:10:01.037000 @@ -229190,7 +229190,7 @@ CVE-2023-36697,0,0,43e9790d418a4e6faf1020ee27d476c7a0c0804564c7cf59bca66ea41638e CVE-2023-36698,0,0,3cd689f639230f024ab155106a874771c8f6bb8006ddaed81a9da7deba78ef77,2024-11-21T08:10:24.323000 CVE-2023-3670,0,0,694e15bb8cd50908e75580a80c917d903eb0fe78b7f93a80b64bf3a2f3dd8e04,2024-11-21T08:17:48.067000 CVE-2023-36701,0,0,184105cd1ec6f0788f4f807da3c0bd3f97fdc95758b89514f394f3e042be44d9,2024-11-21T08:10:24.560000 -CVE-2023-36702,0,0,f9d0aba44944412b3122a5fd098056422289721a8df1d960b95122ac587c1f0d,2025-02-28T21:15:26.773000 +CVE-2023-36702,0,1,a78b83a3ab09f90129bc1d281e1f035fde936c26879fb9bb3d40943ced515d0c,2025-02-28T21:15:26.773000 CVE-2023-36703,0,0,092200a4fa48bfb934ec36f48ee95b9a46f30d492ba67f002e5a62d91bc10ac3,2024-11-21T08:10:24.980000 CVE-2023-36704,0,0,3708e63066bff3942bc8946f1f07e72e8370ac5cb80bf9c73f35a5dd8abdbb5a,2024-11-21T08:10:25.130000 CVE-2023-36705,0,0,beaa245fd4fa27f8e8edbc69a067a3b8d66cf3f1f0621dfcfe36f66014cea781,2024-11-21T08:10:25.270000 @@ -229203,7 +229203,7 @@ CVE-2023-36711,0,0,d36987de973f0c2a52196b02be08792783ce06048b9accfe6b490601ee18b CVE-2023-36712,0,0,a171c6360adf0d19b5d8db87284295dd1eb2bb11ea4ba1b005c0d0016178da63,2024-11-21T08:10:26.217000 CVE-2023-36713,0,0,859f932df3fe5caa57d10e2f5a0fe7fb0abc2b2a39136aaa6cf39cfb189f4155,2024-11-21T08:10:26.380000 CVE-2023-36717,0,0,a2dc69521bf271d2d274e3b90e53de6653a3339b09850007e61e78cbddf18af8,2024-11-21T08:10:26.543000 -CVE-2023-36718,0,0,f37a833f6f1866a9797985b045cefaa047b6a5078a2ff11ab34040914f084638,2025-02-28T21:15:26.947000 +CVE-2023-36718,0,1,94c5ed3bfed845141eb50e8484e6fb6b6d092d2f735f82d74ceeb840511c5125,2025-02-28T21:15:26.947000 CVE-2023-36719,0,0,cc449b368219bbd7afce9c75e780909fac4cd44d0c01f33917709595918d03de,2024-11-21T08:10:26.823000 CVE-2023-3672,0,0,a5914e0a89d7114a960dcea164372c3718fa96b5ad479d6e1b28c1170e5ead8f,2024-11-21T08:17:48.310000 CVE-2023-36720,0,0,cedad55b3dcb528441dfc2a4f1bf9f02250525ddc86f3dc71148141f0b493d7c,2024-11-21T08:10:26.997000 @@ -229327,7 +229327,7 @@ CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d41 CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000 CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000 CVE-2023-36844,0,0,bc6d41b439b8f4d601bb9c02d7b26d2be534ed2ee7be257d11b2e8bfddf0fccf,2025-02-24T14:59:31.717000 -CVE-2023-36845,0,0,4c9c0ba3f4e74883a1dcba2d5029a75aefe60811d3dbfebbbb7078d2457250fc,2025-02-13T17:16:43.583000 +CVE-2023-36845,0,1,a2b585a9340e155b8437a91bc7dd8379ff2930d860a6449aea969a0c621f237e,2025-02-13T17:16:43.583000 CVE-2023-36846,0,0,31e0f5cfc64218783c631dcb6ea01294e0b629b622e66caa6ecd46f40b776415,2025-01-27T21:39:36.497000 CVE-2023-36847,0,0,abf946e66b75d4fe6a8324763c422edcfca5bfa6d043c289b569ca20068fadc7,2025-01-27T21:40:15.840000 CVE-2023-36848,0,0,a2151c8586ba65daa2e8cb4be03b6c633a7c5c083fda49d9a275029509f8e399,2024-11-21T08:10:46.410000 @@ -229362,18 +229362,18 @@ CVE-2023-3688,0,0,5fb0235848124d0ca2e69f9cddf5a22b5b970c3543d79e582d56c58aa3bfc5 CVE-2023-36880,0,0,6b58bba983600a7c360b5b962803e7997d939ddbb9eac10bb632116cb03f0956,2025-01-01T03:15:21.520000 CVE-2023-36881,0,0,ee6331d63c5bd22b02bd003c1b2796ed5a24b6383a3fb29762ca37a159d887db,2024-11-21T08:10:50.090000 CVE-2023-36882,0,0,4459a20df4e535a2f2f9e1bdcbeff8a7a662c76140ddd20426310cfeb6b914aa,2024-11-21T08:10:50.223000 -CVE-2023-36883,0,0,5e7feafb7eee49e64e24200bae78428742c74bd1d1b0c7993d991df964c959a0,2025-02-28T20:15:45.167000 +CVE-2023-36883,0,1,335b9fcefc462e9ba02a08a954f9aa4714126f0b70805532c11f5353a9de2644,2025-02-28T20:15:45.167000 CVE-2023-36884,0,0,114b8674f8791d4b0a23fff5b2f9c7cdfbac801128f7861c4f3601033b70d1ff,2025-01-23T18:53:06.180000 CVE-2023-36886,0,0,7e68bc36f62d9e13deee73864578e0c6c386259e473819f67807d3c608101f6e,2024-11-21T08:10:50.650000 -CVE-2023-36887,0,0,217b6995abfe68a81fcc78e09d608d2f1929667a640265304efd50d98cf1197c,2025-02-28T21:15:27.290000 -CVE-2023-36888,0,0,f1dd5364e900956284fbfb8df035149a378ba8d36854ce879f5b4a4361f2bdbe,2025-02-28T20:15:45.317000 +CVE-2023-36887,0,1,1ab5a554175758327be04dfeea47a6399629a8a33ec144fdc15432a378dc6a70,2025-02-28T21:15:27.290000 +CVE-2023-36888,0,1,4e0b263ba6801393d9c67dbbfd7e5b14e7e6f0fadb4feda022c4f9ea2fbcc152,2025-02-28T20:15:45.317000 CVE-2023-36889,0,0,1dd3f55346001cb8090ff236c94967460371f64da8d7f980ef8984890769bcd4,2024-11-21T08:10:51.037000 CVE-2023-3689,0,0,3463794b80cec7dea229bc232b3b69e2af12bf6070a2a45b2a13d993bcdb0c61,2024-11-21T08:17:50.787000 CVE-2023-36890,0,0,329c99568f2e68a4432ce2546b452f3a33514ce27c75d4ef338aa077312601c0,2024-11-21T08:10:51.190000 CVE-2023-36891,0,0,14871eb0f8562437e89c313745ba844699ec0689cc2ad29870ba39db48dc4e35,2024-11-21T08:10:51.327000 CVE-2023-36892,0,0,1d4290c3f10e03f142d63dd5b73af0df1051de1793cdf0e37c4b92cd96599ab5,2024-11-21T08:10:51.460000 CVE-2023-36893,0,0,9c1cb0c01aea1f60445b339ce6d6405ed6d329335baedab29e6dfd84356929d3,2024-11-21T08:10:51.593000 -CVE-2023-36894,0,0,291d1f810b80fda7df7888996d990de8642e0f6e93f21de7b9bd6904c14559a7,2025-02-28T20:15:45.453000 +CVE-2023-36894,0,1,2c36bcd59751b8b21ab06360e02106a748f5fc019d20d8d02a555304b212ce59,2025-02-28T20:15:45.453000 CVE-2023-36895,0,0,0eb63b8f7a33a5f4fed07b77d236fc1e6e4d1d33c4dfbc93e1393895463d13bc,2024-11-21T08:10:51.853000 CVE-2023-36896,0,0,465313ed68ae2809aff2a772e6b88893dc12d9e2c53827b900b1a7a4b30fb1cd,2024-11-21T08:10:51.990000 CVE-2023-36897,0,0,68ea84cad1f81d98be05c22b48cd75d3e873c5e02672dcfd8b2e7469fd7bb0d3,2024-11-21T08:10:52.130000 @@ -229465,11 +229465,11 @@ CVE-2023-37020,0,0,33b6c9b931d31b797e658d571ef8a6ca688f33fbb706d4af9923099a60bb8 CVE-2023-37021,0,0,614b26c9dbf16d69560ec2488cf9420ce2338ee5379c9d4cbb265ec52e178561,2025-02-06T22:15:37.020000 CVE-2023-37022,0,0,d66ad21bb13a58e9544c9d3a66c2f26f054e308d3e7db44423dbd440289fbcdb,2025-02-18T20:15:17.057000 CVE-2023-37023,0,0,95d76efa35f99ef0d2baae13dadad518ac193033703ef87fb99d07dd7638ad47,2025-02-06T22:15:37.160000 -CVE-2023-37024,0,0,5eeed4d71df26f0ae2a2d8d0f35a6c04bcb7ae42f8650935a0d2e0cfae236ab6,2025-01-23T19:15:09.950000 -CVE-2023-37025,0,0,33bc7b812664e9275c3bfb23b6d53cbfefd4368ab864d63e6acddf0e1a53b97d,2025-01-23T18:15:28.283000 -CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000 -CVE-2023-37027,0,0,595a1a0c601d9d184862ecff6f14ee703e8c2ce8c4e181db40e4b2099ef12a52,2025-02-18T21:15:17.510000 -CVE-2023-37028,0,0,dd87c6ab9aab96c58446d45821d284a883421f55adab2a4c819fff0d992840c4,2025-02-18T21:15:17.727000 +CVE-2023-37024,0,1,481eba3a60b3f688e8f5fc3da801e6f8c4b10a7591893880a6f70edadc3ea52d,2025-01-23T19:29:27.067000 +CVE-2023-37025,0,1,986b49b1b2b8e05a1fe4fa743a504b50de6b71fd4e3297936e0364d226aaed6b,2025-01-23T19:29:27.067000 +CVE-2023-37026,0,1,fceb048140ec761d82b5c8ed7c657e3770b1273749b1717890f8330cda5589d9,2025-01-23T19:29:27.067000 +CVE-2023-37027,0,1,edb48f5b96cf20c224ae9683d793538322b879cf5cc9f3075d2d1c85dcb46ae4,2025-02-18T21:15:17.510000 +CVE-2023-37028,0,1,2b915dbd7aec704b6a3d746468a2d68cc437789ee731e9c8389cc8ce053ae8b4,2025-02-18T21:15:17.727000 CVE-2023-37029,0,0,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 CVE-2023-37030,0,0,ebdcd8b44b26b10615d4d1e02a10d45b81fef97c218d1a1e3ae11fd5af3bc011,2025-02-18T21:15:17.930000 @@ -229759,7 +229759,7 @@ CVE-2023-37394,0,0,0338eb93ab89f059f3206d02bfc24033e086b6f86189917b378799b18d81f CVE-2023-37395,0,0,ae2ea880c24ffda91fdf95fae1832230039bf46a7989dddf214f9ee098180f21,2025-01-07T21:10:50.467000 CVE-2023-37396,0,0,3dd4be4cfa5e3ac695d22216f0156cb0e32135a72abe865fd68030e55032b284,2024-12-19T15:40:24.690000 CVE-2023-37397,0,0,495ea247e2c316b481151d70502bd709d1dab32c4174e2af8b8520a039b7ff2e,2024-11-21T08:11:38.713000 -CVE-2023-37398,0,0,d86da4f43454071c5e6e50f3f09a9f6f2b3d5d53cfafdc673f5765285403e9e5,2025-01-29T17:15:26.513000 +CVE-2023-37398,0,1,d85ceeff17255c823692ab9adfdca406c39aa5b6b201adc932d3af705a9dcb53,2025-03-04T21:43:48.913000 CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000 CVE-2023-37400,0,0,f94e685742ec817d5407020ac26c99ac625870b02acacd04771125504e52e4e1,2024-12-19T15:41:42.607000 CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000 @@ -230389,8 +230389,8 @@ CVE-2023-38152,0,0,741bccbfa5949548b989dbf175ca6110f8b3d8918e295823f8f4790757300 CVE-2023-38154,0,0,ece04d5ea2441d4dd593b0e23f14895bf56cf9391b57bd4936cbc9fd098346de,2025-01-01T02:16:28.007000 CVE-2023-38155,0,0,aba1254b93aa060c1b002473a6a0023d7e9510d26f726d9fe0d106c385f115ce,2024-11-21T08:12:58.437000 CVE-2023-38156,0,0,51bacb16165725150d7179f1c6ba7a60857387d8947da33ad3d4fed359aae26c,2024-11-21T08:12:58.583000 -CVE-2023-38157,0,0,bc8479914ca44b14e0cd1ca6a8f5bb30c2b30b0a993cc89cf3a9687fa01db8ff,2025-02-28T20:15:45.603000 -CVE-2023-38158,0,0,e91fb46c72d5de618ce1bf118dd80073044f1f2511a5b3524053bb5b57bfa4d1,2025-02-28T20:15:45.757000 +CVE-2023-38157,0,1,6ff6edb86c6bf3b73c12a3f979d74b2c9ee822b9ecdcab29e69ce33f5965562a,2025-02-28T20:15:45.603000 +CVE-2023-38158,0,1,b271c1b3bc3d1329a1c6c74a9a37746e978b4329a6fc4378a70ebb39e4f8de07,2025-02-28T20:15:45.757000 CVE-2023-38159,0,0,98e8cc2dacb18fb1b614f0b8b0817da70f2eb30b0c255fcc084552daa2f0110c,2024-11-21T08:12:58.960000 CVE-2023-38160,0,0,53daefc1d1f2c654c6cd7896416e88506ea59f5c237c2bb92890e2cd6e714700,2024-11-21T08:12:59.100000 CVE-2023-38161,0,0,425bbff8bdf397140af80aa5a1ca7762fa0f59e5f74436e3b4eac764ce24ca07,2024-11-21T08:12:59.270000 @@ -230404,19 +230404,19 @@ CVE-2023-3817,0,0,2def5a0837fc8052bc40dca5b0b65da4cf19d6372c881eaaacff6f92b1219b CVE-2023-38170,0,0,ab6608018c2086627caece12bb829ac29b1e72b32e899b99184f429645ef8d50,2024-11-21T08:13:00.303000 CVE-2023-38171,0,0,1d9971ce36d8e68d328048473d72c428d9ff1987304e61fc8f6bf8758182fc6e,2024-11-21T08:13:00.467000 CVE-2023-38172,0,0,c03ceeec1921317baab0f5d33ac6ffbaaf6bd77cb8ddda3fffd24fc5a1c85f29,2025-01-01T02:16:29.943000 -CVE-2023-38173,0,0,753768dbefa3d743a013d85b7dd4fe91a29f90baa8010ac3f900f8d13a82739e,2025-02-28T20:15:45.900000 +CVE-2023-38173,0,1,4ec45de41d29efcce5cc0ce33e1c7850685a865de967b703050985b47fb01327,2025-02-28T20:15:45.900000 CVE-2023-38174,0,0,58ab57eece21bd2f8f4943bc11407efa8a97b7b1460106cea2d4aaa7ceb9eafb,2025-01-01T03:15:21.763000 CVE-2023-38175,0,0,ef1c8529b3657e2f66fcf0c37f671b4b6edc91494a166816094eac680db4dee7,2024-11-21T08:13:01.010000 CVE-2023-38176,0,0,3fdc33ad178160a5c99abc1a3ac59e3e73fc42e8ab098f2163e13646e62e3b2c,2024-11-21T08:13:01.133000 CVE-2023-38177,0,0,730bcd01c82a54192a212d95053de3fec2969268787436a461567cb09272c10c,2024-11-21T08:13:01.270000 CVE-2023-38178,0,0,7c75f8662268ca89daf277bec3375208706881a79c0c88533a7f4fd2922ae19d,2024-11-21T08:13:01.407000 -CVE-2023-38180,0,0,7523d2c869c4ef7450617cdc50a46fdba4769848e232d1fb6bc5f1f64d628371,2025-02-26T17:15:21.023000 +CVE-2023-38180,0,1,ec7ac4671a4a8dfc6569e323af84768a45d38819b4d08cd6ab81a3a8ecb63bda,2025-02-26T17:15:21.023000 CVE-2023-38181,0,0,5a8b679495a586462dbde9c3056012cf04f2dc6c5625ddc2c0a5b368831d71af,2024-11-21T08:13:01.720000 CVE-2023-38182,0,0,4d4a59af220c252b63fea8ea60f7e53085011cf3820ea3ee0c3d6c02139ee575,2024-11-21T08:13:01.853000 CVE-2023-38184,0,0,8041243a4a2b4032f9464c8d84f0fc87c8a2d1f56ecf4620773160e63efc0f4a,2024-11-21T08:13:01.980000 CVE-2023-38185,0,0,a896db1f9cd601b250fb437f388d78427d68869ccd41cfed4d1746d209d422a5,2024-11-21T08:13:02.147000 CVE-2023-38186,0,0,a26d63342c786f02f0f9b245c99ef8053d9804dc14ae758f614053dde58989c1,2024-11-21T08:13:02.270000 -CVE-2023-38187,0,0,b54a5c0726de3a61cc0199512aefdbfde84455b495ef6a4a7f7796335cd9ac6d,2025-02-28T20:15:46.043000 +CVE-2023-38187,0,1,c1f45924ad55304cc43b3b3d217ff325327153f1b3267e5905053b6e414607c7,2025-02-28T20:15:46.043000 CVE-2023-38188,0,0,26b96d88b207aabfec3486123dd721973347f93e7ecfc580763e11f91fa6cb47,2024-11-21T08:13:02.520000 CVE-2023-3819,0,0,1feaa31076019ed4aac12d690f8a6d61ad646f9c397a46d2bc6b63c68c2782de,2024-11-21T08:18:08.360000 CVE-2023-38190,0,0,247462562dbb49a297fdc6138ad19cd54122ecffd2c68d5b802461d7aea8511a,2024-11-21T08:13:02.653000 @@ -230586,7 +230586,7 @@ CVE-2023-38361,0,0,5646b0dc24d6ba6ae916f311ff7d533fa4bb30c1b1c8f75f4f9f318ff84a8 CVE-2023-38362,0,0,63db9a756cbcd9154b49462038447e02050e91ecd2f3b6d2a3334ae6361cd14a,2025-01-07T21:24:06.857000 CVE-2023-38363,0,0,a591869353ec495b6ced3419001a4bc71a1d976d71be89cc15611c55d2ef9dd8,2024-11-21T08:13:25.203000 CVE-2023-38364,0,0,8e811d572c6ae14997b41396824245065fc1674c69eae1daee3876448a447237,2024-11-21T08:13:25.330000 -CVE-2023-38366,0,0,99ca63c10b678dff2833dd98be41cbadf6b1bce54b3367a03ac25574ba6d03a7,2024-11-21T08:13:25.467000 +CVE-2023-38366,0,1,dbab208341e151b842195c2a1d4cbf2a8efb8c44f562802ff53795d5e77dff53,2025-03-04T12:25:10.853000 CVE-2023-38367,0,0,6a03f461c0a3cbf13b518a99d4702e4a73ee2951a18886adc1aa7645c3e8f642,2024-12-16T19:28:58.587000 CVE-2023-38368,0,0,4e92073cc3cde9610fff149c73e145f08c12ba5fb261336c4db43e74a278b21d,2024-11-21T08:13:25.713000 CVE-2023-38369,0,0,20343162d9fbe7902fadaef9efe17c5051b8d190ce29e8425fee989b8cd2e50a,2024-11-21T08:13:25.863000 @@ -230761,9 +230761,9 @@ CVE-2023-38530,0,0,4e4e66a2c24c9621836f71f66bc79096ab1c9791f030d61f091097512aeb6 CVE-2023-38531,0,0,f2ed48e07d4840ae6c56e55cb29ea3d8c8fb13a973f5d004638b1c054bb1d6ec,2024-11-21T08:13:46.483000 CVE-2023-38532,0,0,93e795319b21d595bc386ad4f7ab375ae9f1953850bb0258fa24bc5f3b5c1076,2024-11-21T08:13:46.620000 CVE-2023-38533,0,0,c16ba29eb2d545356ad441068c0d777daacf50687c7b9841b866bf45682b2c89,2024-11-21T08:13:46.767000 -CVE-2023-38534,0,0,42afba0fb8c9198023d9d9c297490cdbd4b67f6c8cb0d543829701f89c26f7e1,2024-11-21T08:13:46.917000 -CVE-2023-38535,0,0,342f29fb050cb7183e9b816d34038bf755b4166a5a17a9287b83e95666424522,2024-11-21T08:13:47.050000 -CVE-2023-38536,0,0,eb4dd34ad11c0fc23217b3a86acc4e5b66238e25d0ae6cb8ebdb566a95b89b0c,2024-11-21T08:13:47.197000 +CVE-2023-38534,0,1,2b69e909a777c4e09ca35160ae25689beae3a1d13bb2a59e7b7d869cf3077c26,2024-11-21T08:13:46.917000 +CVE-2023-38535,0,1,428e3c756a93aa80ca8dee74061029c646c7e0b28752bf31236047e6113e7399,2024-11-21T08:13:47.050000 +CVE-2023-38536,0,1,bc42a49d2f6cd0b23955cf36f3dd93aca7cf8423253b9e2980178f2e5fc30044,2024-11-21T08:13:47.197000 CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64cd2,2024-11-21T08:13:47.330000 CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000 CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000 @@ -230900,7 +230900,7 @@ CVE-2023-3869,0,0,bf7ef47bca609710666823cda2cd3b87d8368f34d3f0495a52f2eaf8d6c44c CVE-2023-38690,0,0,16edfbb5cb2da86dc520cb5ce44bd79a6d8ebde822cfbb040067fae63d47da2b,2024-11-21T08:14:03.810000 CVE-2023-38691,0,0,ca389910441b1a7454482f4a88e1c4c63885642739c40e4d7a0ccd5c7ef7d2d4,2024-11-21T08:14:03.960000 CVE-2023-38692,0,0,0ee556b72a6afea4c1de339993db6445281a90b87ec7792f6788a7e15bf792fa,2024-11-21T08:14:04.103000 -CVE-2023-38693,0,0,3a8d3441aac765332c8a68d16370c7198bd8f3d600dc368fd25b0fd1e8356469,2025-03-05T16:15:37.007000 +CVE-2023-38693,0,1,eb9c9b43ab232b4b04d8bb4d5b6cd279da4b50082c9071bd2e71660f197c6365,2025-03-05T16:15:37.007000 CVE-2023-38694,0,0,dd6e03df9e481aa178e1dad22a17dfad00b2b20258d8ee6ef2c5f1d62d099484,2024-11-21T08:14:04.243000 CVE-2023-38695,0,0,586d599b8505c7fdbd06e5e8f2e6eba0814ffaacde0ff856d8f56a1e1d91ff0e,2024-11-21T08:14:04.383000 CVE-2023-38696,0,0,a792d5772add555e04dc32b1184a43591031e259a2b88d17649495621f2e2914,2023-11-07T04:17:23.480000 @@ -231606,7 +231606,7 @@ CVE-2023-39538,0,0,4f74ccdf3e4884a5209a77926e0911079b428c432b983cead172da77622fc CVE-2023-39539,0,0,11727386ac1717b6ff5ff5810e1bab187313c9604e9fa9562eb6476716c7a8cb,2024-11-21T08:15:38.080000 CVE-2023-3954,0,0,8df0b19b35801bac1ed0871ee7516a630837d2d3b3895bae4c112c6ae7255378,2024-11-21T08:18:23.557000 CVE-2023-39540,0,0,7d25658d170bd18e3510f96473d383d1f50898bdd317db20d32f4a83fcc79185,2025-02-12T18:50:58.057000 -CVE-2023-39541,0,0,ef98eec43f9e2358a264355f6ce8b146c277cdff457c43a4f8575c58db5d9b2b,2025-02-12T18:50:36.947000 +CVE-2023-39541,0,1,213aff86ef5c9926e78469558077665ad53e89e03bcf9d0cb52f3e34ac284d54,2025-02-12T18:50:36.947000 CVE-2023-39542,0,0,683414e574c6493b54bc4426d2963683ee3fb8c2f7a7e0fbf988bf0d401ee42c,2024-11-21T08:15:38.450000 CVE-2023-39543,0,0,32aa9c5ce589cd9406bb88bd141cb662f2b13f412cd32404de12325257702b9b,2024-11-21T08:15:38.573000 CVE-2023-39544,0,0,be578dc20d11fea72e49efd1c094f3f7eea238bcd4ba529630eadd8057e412c9,2024-11-21T08:15:38.700000 @@ -231873,7 +231873,7 @@ CVE-2023-39993,0,0,19bd25bb54abc9b1368859dc49e312bb28d2c35700f33dfb536d772530b61 CVE-2023-39994,0,0,87a029e29660aeb8f1b2be7e27e623b955ac0289fc3112ecce957361865e016e,2025-01-02T15:15:19.093000 CVE-2023-39995,0,0,fdf718e8170352e73d81bc89750099463548f40b6d848c31e93139491cdf59de,2024-12-13T15:15:20.463000 CVE-2023-39996,0,0,71428c1f3fd5b060dcf82814bdd5e8525657311120b2e5984c8f3d370d4d382c,2024-12-13T15:15:20.607000 -CVE-2023-39997,0,0,aa06a653665769d5e8129c0b7a18b14cfb9beea457ce915a4168aed4b4b27fe5,2024-12-13T15:15:20.737000 +CVE-2023-39997,0,1,68db0de501e930ddfc606a1d4a3e3db3b0e13d4da3aac62eaac774dee0604639,2024-12-13T15:15:20.737000 CVE-2023-39998,0,0,fd68a8e02068d57036d2baca19291ec770398514abae2edb537954ee2c2a2183,2025-01-31T14:22:08.727000 CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000 CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000 @@ -232953,7 +232953,7 @@ CVE-2023-4124,0,0,2ec78cef38ef505b98dc2c583ec0d9a8ba5d43240dede74b2fe9d00ce9844f CVE-2023-41240,0,0,c035a8d6c37ca88e185dccbec80904a7b8869b483747223bc806ba4271cba229,2024-11-21T08:20:53.910000 CVE-2023-41241,0,0,ccced1c3eda1fd3769b8a89d128e27512502be7f401d61b97b521da422733a91,2024-11-21T08:20:54.040000 CVE-2023-41242,0,0,e9599204053e22fb8892fcae86c53ed192d362f1928905ae016a481957768d76,2024-11-21T08:20:54.163000 -CVE-2023-41243,0,0,7ca7ca0fcbd95dfae668e5e1f73624040b8ae9ba6a64077d9deee44321681198,2025-02-13T20:01:02.890000 +CVE-2023-41243,0,1,01e8bfa55ff98c3fe77ce3b1da09b40a6cdc58360a4305929b47d33e2d9e763b,2025-02-13T20:01:02.890000 CVE-2023-41244,0,0,a0ce939999266f193905d92b700df1d9195324d1ab459c4776ee9bf35d7bf1b2,2024-11-21T08:20:54.413000 CVE-2023-41248,0,0,57b26d2d6df7ceb0835af5595be4c487c8fb723b29ea41a862a05fd2c1abfb4d,2024-11-21T08:20:54.543000 CVE-2023-41249,0,0,314c8d179d0b186f497f2e1497cd2df416a6638335bb7da159c9a39f8d9c3c9e,2024-11-21T08:20:54.677000 @@ -233212,7 +233212,7 @@ CVE-2023-41661,0,0,aabba384a10402738bd8f7dffc85cfe2570b1fedc35cf33e33aaaa7fb9642 CVE-2023-41662,0,0,fb74cfddfb769543d376256812b980aef10cce9def326445f4a6f84411457549,2024-11-21T08:21:26.550000 CVE-2023-41663,0,0,d2a405063ff50d5ff2d1f5348d7445bcf46081c5caa0be3ab8809b10e2572780,2024-11-21T08:21:26.677000 CVE-2023-41664,0,0,b690ab9305e0b7d598cac5af6eb692cbe51c6a9e031e503a0feb6e82746e3df7,2024-12-13T15:15:22.990000 -CVE-2023-41665,0,0,90f2f7c2d6d443d02b3733b40bfb89dfe4337c3d4cfceae150089d14ff389034,2024-11-21T08:21:26.800000 +CVE-2023-41665,0,1,417ef0e24bd0326bae4d5cd3e17c27eaaa85e112abdaadfdda359d56edac324c,2025-03-05T18:25:53.837000 CVE-2023-41666,0,0,8bcf6c9a6a2a26538e49b376505228ff625982fd5866f26561dcd4fd2d3966fb,2024-11-21T08:21:26.923000 CVE-2023-41667,0,0,89442fe7b532b915f6c02556129cf2b9977e6ba95d140a75b4227cf9551d3b45,2024-11-21T08:21:27.063000 CVE-2023-41668,0,0,528928c240b2d4a2f047eaee411e5df454cd4702b654be8a59aa61a272b4fa94,2024-11-21T08:21:27.190000 @@ -234321,7 +234321,7 @@ CVE-2023-43074,0,0,3ec8b15fec9493db3a59a582609d2bd28ec1b97e594c9c9554cd9d665c0e9 CVE-2023-43076,0,0,38c0c879e7151047cb3a1c77265d1b03178a427927adb392de4bb883335f37ee,2024-11-21T08:23:41.137000 CVE-2023-43078,0,0,441525e38dfece24d9f11790a68f05e1de731efa328d9a48f6f509349345ec6b,2024-12-19T15:53:24.717000 CVE-2023-43079,0,0,c77cf013dd28ba935eb61260be6352a6a8414cf9d066bdde15be6b852e02081d,2024-11-21T08:23:41.450000 -CVE-2023-4308,0,0,b332c74324a90d13b9f20e3405cb0441c1add842f6db79b55a07847dea17bae1,2025-02-11T22:15:26.973000 +CVE-2023-4308,0,1,81717240e6bfba2b19b6f84183aebb16dcebd0ebd2c7394d82610435f614e9e5,2025-02-11T22:15:26.973000 CVE-2023-43081,0,0,58b63e401d69ccb7e57787b2daf9353f71b2bfb248a3b058ce77f784b76caaa4,2024-11-21T08:23:41.583000 CVE-2023-43082,0,0,33c2cc69c3828bf0305f3f328e699b8dea5ba1d10dc3ce770793cf27d4c9dad8,2024-11-21T08:23:41.710000 CVE-2023-43086,0,0,c2638007517201c6f8e15fc37d7ba9bc0234e48c4fac8486619b2fd4e12ce721,2024-11-21T08:23:41.847000 @@ -234388,7 +234388,7 @@ CVE-2023-43203,0,0,c5f43f330a0aa47742da601ce3685bd755f7f7d9ab6ebb64781eb13ff1399 CVE-2023-43204,0,0,405e036bb3184a7a179a9c4f21ed6c5f9f1635df31afbf5874dc0d62b27b1663,2024-11-21T08:23:49.803000 CVE-2023-43206,0,0,91374bcbd7fa94046c0e01ed4ab2af8ccb38a6185b4d6cce69be85defa8f3e40,2024-11-21T08:23:50.030000 CVE-2023-43207,0,0,73bef3fa73b1104259ad40cd7fc06db4d20cce747ffc2532e824570b3f5f0958,2024-11-21T08:23:50.253000 -CVE-2023-43208,0,0,3199c329cf0bf49887fd1dcf35a63cfe059faa488bc525bc2954cc7341e52092,2025-02-26T17:15:21.213000 +CVE-2023-43208,0,1,13afcfa9013f5dd7c2fbb04948a98ea0e26d1e3085aa9ede60ba106d3b61cf3d,2025-03-07T17:12:53.023000 CVE-2023-4321,0,0,085e1cbb7abaeb38d420ac3b379575bc4b47d6929c3ff2b92bda924e6306d7c8,2024-11-21T08:34:51.040000 CVE-2023-43216,0,0,36f34093c9a1885a067dfd71b90fec85477364023b8581b3e15ae8b97b27ff81,2024-11-21T08:23:50.697000 CVE-2023-4322,0,0,1532a8b57387d09ae4c94e72d6fbfa510e33b1660215708f14716f6493a97a7a,2024-11-21T08:34:51.173000 @@ -235479,7 +235479,7 @@ CVE-2023-44995,0,0,09b6031c8143bcb3dd8732530414f342c756d0f762cb4033139ead2113975 CVE-2023-44996,0,0,22eb9e1b1051547c27e8899f36155195706aa2759899c97aff28cf36873a0b8b,2024-11-21T08:26:12.090000 CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026ef0a,2024-11-21T08:26:12.213000 CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000 -CVE-2023-44999,0,0,444952b9efd04a83fadbe72fa090e1791590098ccae3a889bb1d8154d7d29fa4,2024-11-21T08:26:12.467000 +CVE-2023-44999,0,1,4f7501630a43c7d4750793398d2204b7429cd2f2d191a30f553f62f5c529b1a4,2024-11-21T08:26:12.467000 CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000 CVE-2023-45000,0,0,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000 CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000 @@ -235892,17 +235892,17 @@ CVE-2023-45586,0,0,6b565c71ab704bd8e631f209959d1898851432ed4bb3fc8b2b21c0a6ef49f CVE-2023-45587,0,0,025d5ccaec3461c7aae70d71ac1f3ff5df6906dcd056c99dca83a5aac53bbe47,2024-11-21T08:27:00.890000 CVE-2023-4559,0,0,6d3dd9975708c32ae11f782d8520452850e9b29b83aba9a24d0d60628e2c25a2,2024-11-21T08:35:25.270000 CVE-2023-45590,0,0,05ecf04760c6be91163ac0bd5d4f759690d034198a058ca36f4c11671ed8f2dc,2025-01-17T17:08:31.843000 -CVE-2023-45591,0,0,45936665370901cf6bd6f3c4d1fb0775d3e157fe83efb64965918cf648dd4184,2024-11-21T08:27:01.167000 -CVE-2023-45592,0,0,668bbe96709a91593d310b83f278f0ab698a6defdb9b3a305c9d33af64243101,2024-11-21T08:27:01.310000 -CVE-2023-45593,0,0,15650ee38208d7c8cffe49c3f51f946f93a352336d9e31486e0ce70c376d733a,2024-11-21T08:27:01.460000 -CVE-2023-45594,0,0,0453458339cd51cd2c2f3969da40a22fc9c5bd216ca1f088221d1d733969caba,2024-11-21T08:27:01.593000 -CVE-2023-45595,0,0,c469a7b916c8ee2955f71d9363aeb3d0d11113cb44d996673381d946e8f41285,2024-11-21T08:27:01.723000 -CVE-2023-45596,0,0,32da2c5fa5ff529039b3a34360d08543267cd0cb111d3b9d3a35936279449a70,2024-11-21T08:27:01.853000 -CVE-2023-45597,0,0,ea1c7d086c9990c594f35d52ad62aea00392ed022b472b105eeeefb4b11db6ab,2024-11-21T08:27:01.980000 -CVE-2023-45598,0,0,432ae2835fea09c65913e68ee39111841f4f4e751499fde93c50a8a9326293d2,2024-11-21T08:27:02.100000 -CVE-2023-45599,0,0,5e3a705995f0bea6c0e32c6b25871c21143a468bbd68fde4a239201e569da5e4,2024-11-21T08:27:02.223000 +CVE-2023-45591,0,1,0bf80f93c8d038041bb4808a19e06ef555f1f98255d7523ac6ed2e3f398db478,2025-03-03T19:36:13.823000 +CVE-2023-45592,0,1,a97f1e0a79822e265836df2310140c2e0cd927d545d8012c65c237fa9f84f6ef,2025-03-03T19:36:13.823000 +CVE-2023-45593,0,1,fd2a9a890f9e8e3943d99d1eb2ad0811258dd4a1df8dafbe6f1b3c77f1d48df8,2025-03-03T19:36:13.823000 +CVE-2023-45594,0,1,f0cfac9d98842bdb8770148a41bc467027ed83588ecbce183c3796bab62b0c93,2025-03-03T19:36:13.823000 +CVE-2023-45595,0,1,e48edd399d703a460609baf1f0fe1d4761b340604458d9bbf2058eb77fa623c0,2025-03-03T19:36:13.823000 +CVE-2023-45596,0,1,37102e3065aa3cca571e1cd41c7dd8526c087253ac6e58c588f83e3e30aa7c31,2025-03-03T19:36:13.823000 +CVE-2023-45597,0,1,a6b4060c53b62ced5c8fd20917abf1be93db9e362c605a717b3b32bb99fc085e,2025-03-03T19:36:13.823000 +CVE-2023-45598,0,1,932cd8992d3c82c63041b3e00d6e7cd3bf68bcc60e0269520f1fbff09dcec8ed,2025-03-03T19:36:13.823000 +CVE-2023-45599,0,1,1e3f740f5a198cbf2e2cdfdb2d2f986bf21136ee61286ac5cdfea4ca96da933e,2025-03-03T19:36:13.823000 CVE-2023-4560,0,0,069747aa049fecc2c32b7a98740d46723970397ae350fae2885e9c0865cd2dd4,2024-11-21T08:35:25.417000 -CVE-2023-45600,0,0,bb7788bdd8a10877e983586dda935688bddb335d6027a99773051691b12bace8,2024-11-21T08:27:02.343000 +CVE-2023-45600,0,1,4286afd927e245a363643d25c9d88fe387f69ea14b804365fd2a5a981d0d255e,2025-03-03T19:36:13.823000 CVE-2023-45601,0,0,9be2c976a80c394c048d74501f1e27f2f867f04649b7fbb1a380efa3164389f5,2024-11-21T08:27:02.457000 CVE-2023-45602,0,0,407f68d6d65fae4dc5460b1789b8e215567f55d452c685d6cea72aa2d28294d1,2024-11-21T08:27:02.593000 CVE-2023-45603,0,0,07017817b227329cd225d7b5522b22723167a751534d1e8700682ec7674a58a8,2024-11-21T08:27:02.757000 @@ -236105,7 +236105,7 @@ CVE-2023-45820,0,0,0f279d6051434e62af88a09aa9584ff189866c2fa6071bfd090ee65e61aaa CVE-2023-45821,0,0,a5efc0cf09fbe0ffb997a5d9952a120426712f734319dcebcd5f558f82197dca,2024-11-21T08:27:25.503000 CVE-2023-45822,0,0,b8705e0d0b51b3169e64459069d4473b1901d07584912fde63fc8216205fbdd7,2024-11-21T08:27:25.650000 CVE-2023-45823,0,0,9cf2f9f9b608ff4330d5f4e9163895af0b4c72a268e8bc48c1079d139ae10904,2024-11-21T08:27:25.797000 -CVE-2023-45824,0,0,3d8fd6df4d3c7d931456c63013fc6b84359bc44c0b4788412032c8d18c254d93,2024-11-21T08:27:25.933000 +CVE-2023-45824,0,1,286be4458a31638e5127840906a9a2155d0a987a203c80a88202eebf90f6b6ba,2024-11-21T08:27:25.933000 CVE-2023-45825,0,0,cc4f775aec9a77cdb80822f190dfb31088087996aff99b7b525e09a3649bcb6e,2024-11-21T08:27:26.060000 CVE-2023-45826,0,0,2049fdcfacd49e62f3dee07525456735a2621cfb7b2b713331b170eaaa2c4f93,2024-11-21T08:27:26.227000 CVE-2023-45827,0,0,abaf7216d57163ffcb299f06a62cc36e0969e2f3d40b98189cc2564ddfd70e0b,2024-11-21T08:27:26.363000 @@ -236389,7 +236389,7 @@ CVE-2023-46193,0,0,74c77c2c17a3bd30e7ad6bb40fa34600a457b0f418337976b2e8ef750dd62 CVE-2023-46194,0,0,690f23dc30d3b28edbfda86fec6bd8801d171a9a9ec42905042d389b130a12c9,2024-11-21T08:28:03.063000 CVE-2023-46195,0,0,b7fbd6e45d5f753ed97ec65a5109033d49cd60d5f2c14605707d996debf37278,2025-01-02T12:15:11.270000 CVE-2023-46196,0,0,7714b0a8b00673c3e12679d694deb323c6886964cdb87cc60bec5e5837da95d8,2025-01-02T12:15:11.407000 -CVE-2023-46197,0,0,a2dd46f48fcaa62a7c2099e0d616db0cb2ebaa01bb6702c9312fe030b6de8e00,2024-11-21T08:28:03.190000 +CVE-2023-46197,0,1,d9fa0b45eed957551a142535a70a3656fea9a57c1c09d050c9e7812ea99c6b8b,2024-11-21T08:28:03.190000 CVE-2023-46198,0,0,d4ad4a351d2a5453b6446c39aa985a2c07900ad28e0892ea4f6ce229eb573b28,2024-11-21T08:28:03.293000 CVE-2023-46199,0,0,81fd91dbcb97ceaa2c6965aa2edf785a9235be6cbf673b27935a9692a9c96dfb,2024-11-21T08:28:03.427000 CVE-2023-4620,0,0,5407789a477ab3bbcc8e1b7f45e1f09216788b80aa1cdba66277acbeebfc08b9,2024-11-21T08:35:33.290000 @@ -236708,7 +236708,7 @@ CVE-2023-46596,0,0,dc26ebc015c5e3b5f4291fce518c050a174bd59bdda9accef80c5dcc4b820 CVE-2023-46601,0,0,739bb1365ee90282b5f1d046dd503ea5eaf0a4d64f7dd95529af7b2550849adf,2024-11-21T08:28:52.213000 CVE-2023-46602,0,0,f59406848825161cde147d1e590fffa5776803a932b927e1ea2bcc795ebef0ce,2024-11-21T08:28:52.387000 CVE-2023-46603,0,0,c8e4a28d8170f5924386c421f801ce28ae08b9f2a2675bd0a6d3ffc0105d045d,2024-11-21T08:28:52.600000 -CVE-2023-46604,0,0,2e24c6a5c705620d8d5d1a085dd6754703d14a004c66ddf64a758dc2e8b88b67,2025-02-13T18:15:35.243000 +CVE-2023-46604,0,1,dc6a15016283c2bb3ca1f09e0c7545aa000bcccb7146f983e7295a033df314dc,2025-03-06T19:48:51.880000 CVE-2023-46605,0,0,4a6ee379179e5ddde476c4cd2e5cf87ae26e9247bc93c31f97d0121557933169,2025-01-02T12:15:11.993000 CVE-2023-46606,0,0,265ae37bfc17238e9489142f1ad99f8e75a4c66c897be6a5b938e78e3e1232a6,2025-01-02T12:15:12.133000 CVE-2023-46607,0,0,990a9fdbb3f36ed589080fc6bd0f390c0325ee9e42ee2784d6aa92e4c57b0011,2025-01-02T12:15:12.283000 @@ -237151,7 +237151,7 @@ CVE-2023-47148,0,0,125c9b6eff45b4c4f4e98898ffc8939f83bab8e9e7741dc73fd5013c70708 CVE-2023-47150,0,0,39b8e6e38790365133c91f98743cb6362cd9f47470d0fb8b0febb10399d2b26f,2024-11-21T08:29:52.247000 CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bbb29,2024-11-21T08:29:52.370000 CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000 -CVE-2023-47159,0,0,1974aef045b7c69999a2b610de9b1637e7e2217cca2c13b57a37d4f3a5f30f46,2025-01-27T16:15:29.593000 +CVE-2023-47159,0,1,89b388303299ce76a92e48e9edca6512f78efaf426bf93904da142a73e6d71be,2025-03-05T14:08:19.020000 CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000 CVE-2023-47160,0,0,59dd67c6dcb78e2ae9b3d5f58bdb57164218adc27994b06f2c033d79411692fa,2025-02-19T17:15:13.983000 CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000 @@ -237159,7 +237159,7 @@ CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4bee CVE-2023-47163,0,0,f5adca02eaea8bc24cd08d7d4c73225678acd5cba7f9025b5e237a60252e4f89,2024-11-21T08:29:52.983000 CVE-2023-47164,0,0,12f34e2e1684b208d136a2aad6645354968c0de9429460d75555e02429e7a917,2024-11-21T08:29:53.100000 CVE-2023-47165,0,0,2c1439fbfa8479f6365d20e10b21048afe42d0cc1bc3ac6f09622447f4fb9892,2024-11-21T08:29:53.230000 -CVE-2023-47166,0,0,df9966b4554f4bb2035df845bd39586f49895586103e509e2680dd75289bdbd5,2024-11-21T08:29:53.347000 +CVE-2023-47166,0,1,0b4e6c3d8469ebe457e9632c47f9f661228c6f4b1bf36d6241305b805f2c972d,2024-11-21T08:29:53.347000 CVE-2023-47167,0,0,d682f65b67e9f8aa9edd9d443959ee85772aeb3a5ca414a3f3be8274cd75311f,2024-11-21T08:29:53.477000 CVE-2023-47168,0,0,2c480e8ba7cb1ee58bf1587485f882e95b24d836d8326dbc402f56d5d0e4d051,2024-11-21T08:29:53.603000 CVE-2023-47169,0,0,27402560b2c63c9ecee6e4a502eb12e15437e5b03137c3e1334a647bf2665d3c,2024-11-21T08:29:53.750000 @@ -237637,7 +237637,7 @@ CVE-2023-47801,0,0,6f061e52216fb88e9afdab960e303a263cd89f8039729a97804f9d992ec4b CVE-2023-47802,0,0,6dd946f699df6a491ac9834a15ddba63e64f16c5a6f5a062225cd8cfaecf9526,2025-03-04T18:43:40.097000 CVE-2023-47803,0,0,c49de6e54ad79301c655a131558ab3ecfd613b8f091c559078a77637e6507981,2025-03-04T18:43:40.097000 CVE-2023-47804,0,0,6205142f7b14e239ef92fef2b1ac44f9d1e9b48dff0ed3b2e07500fdcf8f815a,2025-02-13T18:15:39.070000 -CVE-2023-47805,0,0,a0525de6234d3b1e9bdc7e814d4514ded58e7b5fbeedb2b4ce90abaa3b961354,2024-12-09T13:15:30.923000 +CVE-2023-47805,0,1,3be8811a39d7913a3ccd9376f676a4b7b4f2031bb7568e12895f28cf0364496b,2025-03-04T18:19:12.327000 CVE-2023-47806,0,0,b0cdbd3a00354474ea134767ba68204fac150af82620653bb81d9b5e16a93e04,2024-11-21T08:30:50.427000 CVE-2023-47807,0,0,a89a754294e6a18768abc4ebafd8889155ccb0ad11bb4d71b15464a69f9d6967,2025-03-06T16:24:25.053000 CVE-2023-47808,0,0,327617dcfd8384900f916ba988789bf4115df1547b61d304fce6a00025e1fde7,2024-11-21T08:30:50.547000 @@ -237917,13 +237917,13 @@ CVE-2023-48287,0,0,79420f7b8f98df0fb5b990b5c0654ca8f2ff603eea9f7ba36f425c5b23318 CVE-2023-48288,0,0,dac9c0db378e3e3f1f2d798461f005d8cda98e909360fb0139ba29de2102bede,2024-11-21T08:31:24.643000 CVE-2023-48289,0,0,4498d81fe7b431d349db109eeb9ab2f11997a78ae7c51f3f6f8598d2d6442164,2024-11-21T08:31:24.797000 CVE-2023-4829,0,0,2bbc8243d507250fd98abf197a4fc5b881b1a656311da51d47db20a924e77e3f,2024-11-21T08:36:03.593000 -CVE-2023-48290,0,0,016404c21ee5f4fa89ec14f3f9210f5b146d81fb5b0537774cb2645445fcf165,2024-11-21T08:31:24.943000 +CVE-2023-48290,0,1,92cd8853ceaab3c1527bca47d36f210cca77efd98b054a5e05e21e67a332481c,2024-11-21T08:31:24.943000 CVE-2023-48291,0,0,f2d10c099d9bde459a9c04d79f557ecaf03d1ccab45b6490ee893db874950545,2024-11-21T08:31:25.060000 CVE-2023-48292,0,0,49b6ed3c7d82cc19d07f9b07faeae8eed968f0f9266280c60e9f10ad4e10a69c,2024-11-21T08:31:25.193000 CVE-2023-48293,0,0,7ec36e7fb2f0cd6575e1daab3edfac0587e55782822da6ae2d2ac5b84c8b6039,2024-11-21T08:31:25.337000 CVE-2023-48294,0,0,0823cef5ec1945423a2723001f0cbbc10811a1d7069f9e43f8bc302fbf48eb89,2024-11-21T08:31:25.490000 CVE-2023-48295,0,0,e3f7b0fabd467ba3d6d38c5a491e5d95e73fa412e4e67ec80fc391d92d9caaa6,2024-11-21T08:31:25.650000 -CVE-2023-48296,0,0,2d2916adf71f9bc143e62e7d876379958b5e54cba95cb10ae603669e5925a128,2024-11-21T08:31:25.800000 +CVE-2023-48296,0,1,0a15e48ad7844c9fa59bb7696fbcabfe945f7138cd12c884fe95e7b4cde1ee7f,2024-11-21T08:31:25.800000 CVE-2023-48297,0,0,5c29092d616aeb3553526d5d48e7236fe2eb36b7252a78c024845e2f7a8ca0b6,2024-11-21T08:31:25.937000 CVE-2023-48298,0,0,93a4e2a4bafe2888e8111342b6def94e2d2d08c80634f2badc050f7dd3bad50f,2024-11-21T08:31:26.090000 CVE-2023-48299,0,0,32b7b9547f9d8722df1b4409045acff64c8bf92421b88ca8d40dbfb2913b4da4,2024-11-21T08:31:26.243000 @@ -237947,7 +237947,7 @@ CVE-2023-48314,0,0,ec8b11670e7639e5627431c392caa51a40e6f608dc17795f5fb6b7e7e0046 CVE-2023-48315,0,0,0ce5bcb1f61b32ec58364507f3c2670354de060e5ea10d1d1099bde646e8c552,2024-11-21T08:31:28.457000 CVE-2023-48316,0,0,8abe8345ecdcfca12500314184dab2cee64a3bfdeea16d453153a22c3e3dab85,2024-11-21T08:31:28.590000 CVE-2023-48317,0,0,26db5ebd55e51ec988e8aca2aa556839c0011e5a7eba6ca7e48fbdc0abd7279c,2024-11-21T08:31:28.720000 -CVE-2023-48318,0,0,087f4ac1e005f336c37aa286cbbc141d692abba2e4de3505dddea9636977f7e6,2024-11-21T08:31:28.850000 +CVE-2023-48318,0,1,eb4e53e2f89dcdb04f622cb60c7895e789799aa29ef217202d4189d5784bee05,2024-11-21T08:31:28.850000 CVE-2023-48319,0,0,5cb54430daf5a8d0e4cb53d14ddd7683733bec8122610dfd00aac43e8a52a443,2024-11-21T08:31:28.970000 CVE-2023-4832,0,0,e6b2c1bc6eaa78a4b56b4804cc88c0571744536b4c97b319c2cffbe6a62608db,2024-11-21T08:36:03.957000 CVE-2023-48320,0,0,41cae7e6406d93214a5b8cc75fd41a289beab8affc1552fb80e64835a39f0cea,2024-11-21T08:31:29.097000 @@ -239368,7 +239368,7 @@ CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000 CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000 CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000 -CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000 +CVE-2023-50168,0,1,839c58ebb67d0eff1d2b8b5a29b7775d811d7c03a6f89a1b449ff37e232b995c,2024-11-21T08:36:36.050000 CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000 CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000 CVE-2023-50172,0,0,25c03c7011f73a3630332b712bf3e6e5aa0720bd78ba59ee21b22af315f1dd14,2024-11-21T08:36:36.190000 @@ -239494,13 +239494,13 @@ CVE-2023-50309,0,0,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000 CVE-2023-50310,0,0,ee63583edc72c7bb2dd2fbd446b3bacc51b87b3209164901da3eca6b0c813dde,2024-11-05T16:40:57.533000 CVE-2023-50311,0,0,bfcc9d072f5a2d893dd33392360fe36f36ce6d9885fb951e98233624c4f9ba2b,2024-11-21T08:36:50.263000 -CVE-2023-50312,0,0,1e67563904324223fd079dcc66d3aab87e6451abcc03afbf697386cae3c09a79,2025-02-26T15:14:55.753000 +CVE-2023-50312,0,1,40a6b9bf9a3e0586faca50cdeb43b13394503d00686ef9a7b60d60352dbede00,2025-02-26T15:14:55.753000 CVE-2023-50313,0,0,a83e416401577e94df6dfe4b1b998ddd0a8952164aaa6f5ea90e36bebd23e193,2024-11-21T08:36:50.540000 CVE-2023-50314,0,0,ce35340ffb0568ccdcb723e50bf9507ce76dc59cc4416bfa4739778b544bd02c,2024-08-23T19:20:22.473000 CVE-2023-50315,0,0,625341a76fda8905bc70b73219527e00e0b32c20581d112bacaee69e8b51c52a,2024-09-11T13:38:26.370000 CVE-2023-50316,0,0,d2a6fa563d8c7c4f2ca779aa41670344d5eee71be8ccf35a8b979a86c4517fe1,2025-03-05T14:08:19.020000 CVE-2023-5032,0,0,4ede5b17693a04ef49d59f95a825f1eb5b57b0f4b8cfa1778c1a2dc8be2d09df,2024-11-21T08:40:55.963000 -CVE-2023-50324,0,0,000a39c6d0a06cbde348ac025e564c5cce355db8654aef4cbde2d0d01df1d4ed,2024-11-21T08:36:50.840000 +CVE-2023-50324,0,1,b71dd5e5d5ea70b15a8f8b946f8a51be081a9a7fa585f9c9627d60fe2afa65ff,2025-03-04T12:25:10.853000 CVE-2023-50326,0,0,bd3bc6fce1ffc5491df4da766864b97e8ced1cbb50bba99d705adb05a7f7ceb3,2024-11-21T08:36:50.950000 CVE-2023-50327,0,0,ea24efd3c93ac60674f80abc73347dc6e62767236216bec9494e0c05567131b6,2024-11-21T08:36:51.093000 CVE-2023-50328,0,0,c55487b62bda05a5c2ae7d76cd8d505ebd65e77df73e04795ba360723b0467cf,2024-11-21T08:36:51.230000 @@ -239866,7 +239866,7 @@ CVE-2023-50945,0,0,d841bbdcedc43a7a2ac1408079f24749f3a7acfd55b3a3f00f52049d971bd CVE-2023-50946,0,0,465fe8804963533610f05c955c02c29c35bc2f424641a16ec6fc688147747bd5,2025-01-26T16:15:30.680000 CVE-2023-50947,0,0,315931b32ba2a05ba850339c4b9bc866bd08295cc58fb47a4e8b1ba5ad042e05,2024-11-21T08:37:35.167000 CVE-2023-50948,0,0,28323826bb3c873fc57cf155c09bad077515a97a0be7d5af9707ea35ef154f81,2024-11-21T08:37:35.350000 -CVE-2023-50949,0,0,8936f46f9db7ecbbd7b4745d7eeeee2a4a69e790da8f4943ab4b88acf033325f,2024-11-21T08:37:35.503000 +CVE-2023-50949,0,1,3ffca925309e3a7215e26bf2b972cc2bba3cb3394929162adc4f909f2af039fe,2025-03-06T14:25:09.843000 CVE-2023-50950,0,0,4ac9c015581d280ae365145323dd10fba76646013d4f89cc28ce9f2c1e953f11,2024-11-21T08:37:35.630000 CVE-2023-50951,0,0,912fecba95681a043fb96c3dc18dd659c27018a2607176ac5215f3a6b7cefe73,2024-12-03T20:28:43.647000 CVE-2023-50952,0,0,d7a165fbc90fbf4a779f1c6c3931beac69b4af33a7ddbb567cba6acab9aeb255,2024-11-21T08:37:35.927000 @@ -240081,7 +240081,7 @@ CVE-2023-51339,0,0,46130be144d70d7717f34638d17bcb922ba5bdffc38788d706d1125b8b9b3 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 -CVE-2023-51353,0,0,9189dfa7d2665be103964ae15dafe09dac376dfe91fcb66080ef0cadd1fcb53a,2024-12-09T13:15:39.513000 +CVE-2023-51353,0,1,14a176dfcef084d458098c1e959c692387681e08330ec5d7ce56fce2394d4bbe,2024-12-09T13:15:39.513000 CVE-2023-51354,0,0,708af8c5468f01b121a6a1c668923294699783ac63a9cd7f532f375515a975b1,2024-11-21T08:37:57.030000 CVE-2023-51355,0,0,403a1b38462fab64d2958d48b042a496c74a03590091d2ef7736ab842bdb9794,2024-12-09T13:15:39.650000 CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000 @@ -240250,7 +240250,7 @@ CVE-2023-51508,0,0,a1c83b0bb39aaff5b985cebbbf0f854a0f62ed7ffb1079cd2361cd180b397 CVE-2023-51509,0,0,5141cc1874d879c09bc6c5ae29f17b7cc3618a3dd55ae068dff761ececd3f235,2024-11-21T08:38:16.530000 CVE-2023-5151,0,0,08d96cd770bf1b04c30c98efb5eed61debed8b417449bf44e4a7ebc9a6835ec0,2024-11-21T08:41:10.143000 CVE-2023-51510,0,0,712c928dab66c438ef372acf6bdb096bd47638c890e5047299143bada89617f9,2025-02-27T03:24:36.033000 -CVE-2023-51511,0,0,b8b42a5c93bd31ce99b938638f406c54fdb8da2fd3b6905d9b4fec0e7ee2e7a8,2024-11-21T08:38:16.797000 +CVE-2023-51511,0,1,9ffa124b94086ed4fe64c1f67365fd6b2ef435af4e1b9c7024292fb826aa7032,2024-11-21T08:38:16.797000 CVE-2023-51512,0,0,3ffe46037d2759016fc60df007fcfb3e5660be4e480910443f43adca1c621857,2025-02-27T03:24:36.033000 CVE-2023-51514,0,0,fd045876a5b64b601897d61b4879de0ef70ace44f02a5bb84fff6e9509399735,2024-11-21T08:38:17.033000 CVE-2023-51515,0,0,cf6f4fc5368cadc9aabbda6e25adff7a88b955bad0dfc9c1844c5fb48208e5cc,2024-11-21T08:38:17.167000 @@ -240793,7 +240793,7 @@ CVE-2023-52209,0,0,5cc49a8c9584ee3734b32a880f990b114eed31ffc8d335c9e91f0f26aefc7 CVE-2023-5221,0,0,ac593677b3376dde09bd34a833907807ada0e2a1e2a05727f4f5313a1311ef84,2024-11-21T08:41:19.317000 CVE-2023-52211,0,0,4fd3248f4c554c980821f389569db32dc9c558ea6ec811b2423a7ecef28bcc4f,2024-11-21T08:39:24.437000 CVE-2023-52213,0,0,3601be2f1a2926cded9245ab21da9f59f377ccf814013c5e8b2d3dc18f46cd1d,2024-11-21T08:39:24.560000 -CVE-2023-52214,0,0,196c7db59cdb1f9e797e0acef6c514a3a1acb6246bda8b505b959ef76e721123,2024-11-21T08:39:24.690000 +CVE-2023-52214,0,1,dc95caebbc19bbe35deb08bddf40d6503aa27c84c3bd4b4f2b0f62b7ad115c20,2024-11-21T08:39:24.690000 CVE-2023-52215,0,0,65dd38763a56901fd2bf92818082f00e711bcdeb4b87c1f54143d565ece2e8e3,2024-11-21T08:39:24.820000 CVE-2023-52216,0,0,5b6f1089c088b9daa2fff83e5549313d7ca0def2a262e8c39c2c0c91f5d94203,2024-11-21T08:39:24.943000 CVE-2023-52217,0,0,447b3fd9aaf7581ab2dca3fde3150c58c3c612e636d6e3b2675dce7ceccb0017,2024-11-21T08:39:25.070000 @@ -240812,10 +240812,10 @@ CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2 CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000 CVE-2023-5223,0,0,2fb00a8c39af0b009cca243d971676d52c15e47da332f24d74c2dc93b3b5f165,2024-11-21T08:41:19.617000 CVE-2023-52230,0,0,f74a4b7b498808aeca0a984a29729c461b3b795e9da7ce52049e0e1692c07a5d,2024-11-21T08:39:26.800000 -CVE-2023-52231,0,0,5e4a367c83f1d32f7b9bb506fbc9b06f33d3a94154bf0a91100b28707f69d14d,2024-11-21T08:39:26.930000 +CVE-2023-52231,0,1,1898ae72b4557d66d34412838f4eac948bee83dc48ddea1259f96624fd15c5fd,2024-11-21T08:39:26.930000 CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3938,2024-11-21T08:39:27.053000 CVE-2023-52233,0,0,2423e3afa7be038ccf2190464fe2d4c37e2d909a99b6b2c713bd1ae6e307c147,2024-11-21T08:39:27.173000 -CVE-2023-52234,0,0,c9a6ddf29001d4456c812ec430c4f36fbd95f7613bd149eda7844272c0c580b7,2024-11-21T08:39:27.303000 +CVE-2023-52234,0,1,39a5bbe4db6b624413f844df3d1b1a3bf6bf3843620d3098c5576cc456c7da30,2024-11-21T08:39:27.303000 CVE-2023-52235,0,0,38fc0b124e8fbe66aaf7d1f1df9b950ee33f38eef712db18d6428c2cb89643d8,2025-02-27T20:15:37.787000 CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000 CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000 @@ -240847,7 +240847,7 @@ CVE-2023-52289,0,0,e6a2e54dd3a1c3f4b065cdeb7cba7713e3add3ea64ff3d39a79ca5e040c82 CVE-2023-5229,0,0,18bbb0701fdfc1eb961720131b947089c1dc194f24cd377eeba5cbe489702c68,2024-11-21T08:41:20.133000 CVE-2023-52290,0,0,f81c1307f271823fe5b2fc9b059a6b49b0b523729ebd16ad87ea28109735272c,2024-11-21T08:39:31.530000 CVE-2023-52291,0,0,8ca442de0c26d1789570c389978c57c73a5d71d52e523e995ae583da9534a264,2025-02-13T18:15:54.277000 -CVE-2023-52292,0,0,bff032833d10a8c329329a30317c786b662aa8adb7412a8d71e925b988e887aa,2025-01-27T16:15:29.767000 +CVE-2023-52292,0,1,d0308efffef6f685dc6ee9cda88ad16f210d133e3f8937aca16f5274ce7231ea,2025-03-05T14:08:19.020000 CVE-2023-52296,0,0,83f2c2154d29daddd2af79aa9feb1bb72bf0c688de74987f30d77a9ed23e784f,2025-01-31T17:17:35.783000 CVE-2023-5230,0,0,3cf502703ae5b648f307f80b76738bfea8747ada0db2366c9923cb7b273a080e,2024-11-21T08:41:20.240000 CVE-2023-52302,0,0,3df11091ed3603d6054aae0b4f32b2cddf705616c93df1718ba0a0c79d96053f,2024-11-21T08:39:32.043000 @@ -240918,7 +240918,7 @@ CVE-2023-52368,0,0,5434397324a71463f0e1429dab997190a2aba8bdd8c6ff9feedb95f25b870 CVE-2023-52369,0,0,e4e935aa65b0636d81711446862ca9d99eb3262109c6d92592111c4fc747347c,2024-12-09T17:33:32.693000 CVE-2023-5237,0,0,bf8b863edcb3c5dbd4e829c0548224833a285d1d6a3f96c65fa64c47ca318a53,2024-11-21T08:41:21.087000 CVE-2023-52370,0,0,46ceca081c2a100f8357cd3d4d4ef85d118d100cea450b5a55d488fc49aa9da8,2024-11-21T08:39:40.217000 -CVE-2023-52371,0,0,3ac832a0c7bc01d08055143b4290f71f66ed73b79bd97e7c5b3b8df674620f0e,2024-12-04T17:15:11.513000 +CVE-2023-52371,0,1,93d1d5301e48b1cd3b2441ad3c873d568764c2880e34261f6ebe917352fafdb5,2024-12-04T17:15:11.513000 CVE-2023-52372,0,0,2bf4bf44c9f7c570c0466d73873763f4ef4198ca0738d4b4348194a3c25cee09,2024-11-21T08:39:40.500000 CVE-2023-52373,0,0,9b50836c76e3ae1852fd0250695fbc0e6123ba9caec35a45b558d472a90fdbd3,2024-12-06T20:05:03.750000 CVE-2023-52374,0,0,cef19fc76096d62632a9e459ebcb9bbdd02ca3ed8875f3735dec7905215bec85,2024-11-21T08:39:40.817000 @@ -241221,7 +241221,7 @@ CVE-2023-52671,0,0,8ecfbe6ee420301fa80dc2cf957e2651d63d7dac3a9057b746076a32db73d CVE-2023-52672,0,0,ee557de88431eefa7e0f6d26bad35904d3a324cf22b23196783cc688a6367d5d,2024-11-21T08:40:19.660000 CVE-2023-52673,0,0,2b49a094ed02d8ce875a94d41602995d8c486801028201280e70ec805567d7c4,2024-11-21T08:40:19.867000 CVE-2023-52674,0,0,a94575914c9d6fcb8cdc3f93351d490e6f37e0f1fcf08c81e2737d7721471967,2024-11-21T08:40:20.047000 -CVE-2023-52675,0,0,5cf5c5f18e3cfe80c811d5947880b1795f4f683d879d9ed8ae70e832afeb40a9,2024-11-21T08:40:20.240000 +CVE-2023-52675,0,1,97ecb5a58f057ebf00d1a069384800db1f32e98831a897eecd9547ff64651a34,2024-11-21T08:40:20.240000 CVE-2023-52676,0,0,b5052d896eb6aa3d40bebd3433cbef1dbf5fef6664f492860c3bbc035891b00b,2024-11-21T08:40:20.363000 CVE-2023-52677,0,0,d53f7966a67dc8554bfd32a310b11c4d3cfff4fd17d44d1d08dc29544085cfab,2024-11-21T08:40:20.473000 CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425db4,2024-11-21T08:40:20.587000 @@ -241233,12 +241233,12 @@ CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a2 CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000 CVE-2023-52684,0,0,624d3ff1ee42a8c4ff468103f3888505808ec62dbac77ab1863578c7b20407ca,2024-11-21T08:40:21.387000 CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000 -CVE-2023-52686,0,0,78f996d2013a9096341f0d1c834ac1c73fb05606dc6f557d6437920121b61b8b,2024-11-21T08:40:21.573000 +CVE-2023-52686,0,1,fe4597ae9be61acf3d9689d0c9ac79308dcf0087b058f55a1aa08877a4eae3b9,2024-11-21T08:40:21.573000 CVE-2023-52687,0,0,bbc8fc1dedb818bce118b2c7db04aab7b8059594413eb22394ab804738b96713,2024-11-21T08:40:21.700000 CVE-2023-52688,0,0,9dc230fe3db4a9be36210348538add296ace0ab48c31cd4e90194d9bd1a909f0,2024-11-21T08:40:21.923000 CVE-2023-52689,0,0,790089ccb5dbca94271b582a4ae66681f2a34b377a106c082c546248aa1dbe89,2024-11-21T08:40:22.033000 CVE-2023-5269,0,0,62ef4056afab45d0c95a031eeec681aea89f1a71d3adae5c7cfd3da3f7ee0ed9,2025-03-06T15:15:14.830000 -CVE-2023-52690,0,0,aa56fec2ae1f31c32ae4d61e5f7c9e40549ac31b2bf239b1391ddac0420ac0a3,2024-11-21T08:40:22.153000 +CVE-2023-52690,0,1,2dfdf56b745795b4a10e5900420a79a002058917f9b37e7ce27507d86a3203cb,2024-11-21T08:40:22.153000 CVE-2023-52691,0,0,a64baa25fadffa1557a15dc817d7f8c834b516c14cdd512d500df9f6752c0946,2025-01-10T17:59:11.383000 CVE-2023-52692,0,0,35e83f69530051d0eafe3b62cf812c667004e80a63c768d5530a91d5f9405ce5,2024-11-21T08:40:22.410000 CVE-2023-52693,0,0,d1af7447a1f225b1702522258cdac1a9c0485e5f768f8d09ab764c280d778ee9,2024-11-21T08:40:22.523000 @@ -241409,7 +241409,7 @@ CVE-2023-52843,0,0,d4f8bad35cfc21198f623b7db2be9e3dbf34745d3917a93a4d4c5fbf835e4 CVE-2023-52844,0,0,4be95961140cbe40e6ea21580e0ea5f2152dbb2ed1ebadd5e1b5c607a986e0d7,2024-11-21T08:40:42.390000 CVE-2023-52845,0,0,78076631f2c09e54b6918ff3820d4529f731f58b0a27735f2f430100b22df27a,2025-01-31T16:01:53.260000 CVE-2023-52846,0,0,80f2f7dbfdae0a1a37b9f3fe596676b4039695e57bc05e9b354f71e673c3943b,2024-12-31T20:00:30.687000 -CVE-2023-52847,0,0,72fdd2981ec4aedd177ff760764fe0a1ff530bbe6c4340db710b944f3de34561,2024-11-21T08:40:42.820000 +CVE-2023-52847,0,1,acb19ee08312f9fd41f13b9581f99db4f3c31a2d9d9a4244661713d9bbee36b3,2024-11-21T08:40:42.820000 CVE-2023-52848,0,0,459d324dbed98e7d46524ff0a5f74b9fe3a0775dc447bf711ba4b82011689cb1,2024-12-31T20:02:14.890000 CVE-2023-52849,0,0,f6ddd31d6e2b7b97c260676cfb8b85b07561190bd66bad001b32fe754a29cfca,2024-12-30T20:09:41.537000 CVE-2023-5285,0,0,8e1cd37b97e33f0f0685b14f4312036f59f160d705ec149a6ef0ac0f38fce8bc,2024-11-21T08:41:27.130000 @@ -241443,7 +241443,7 @@ CVE-2023-52874,0,0,00067276cb2812ff1d5d476327c93881ac0bc244cd0e16cccb0099434a630 CVE-2023-52875,0,0,78e33790aecd03a18997e6ce86f70a3b0359661e774eb191ed7e9bce65bec32d,2025-01-06T20:31:11.200000 CVE-2023-52876,0,0,0fe2a2041c56729ef164497ed0e5be99079b82c47eda1bde670e60b59d971aee,2025-01-06T20:31:44.213000 CVE-2023-52877,0,0,e88869d2a35190a68a5dd82409da20f8164374740684841b6ca39a4c084d7242,2025-01-06T20:32:18.993000 -CVE-2023-52878,0,0,c7f0627c0d4785adb6f09fe92b2efb3525a65f0ae3debe17c36262279aad039a,2024-11-21T08:40:46.920000 +CVE-2023-52878,0,1,741193322c2723e64970245382b328d62e5392cd9bb4c27c9c19ae8d0159991b,2024-11-21T08:40:46.920000 CVE-2023-52879,0,0,f4c534e013c031ad7d15df3ddad81f924f343df8401142d197ba3a5f481b60de,2025-02-03T15:46:08.837000 CVE-2023-5288,0,0,1d6e77372676e57c617889ffeb07f469824d9531d0d1350af6f8e45c46f3e22d,2024-11-21T08:41:27.523000 CVE-2023-52880,0,0,113f8dda8cd8b9846d9f1e2d1ed597fb40cac1e992da503c15f94daa1440d958,2024-11-21T08:40:47.160000 @@ -241499,8 +241499,8 @@ CVE-2023-52925,0,0,088a6b192a99865e539f8003179173ecf52f00cd52002c4bcc1210ba554f4 CVE-2023-52926,0,0,1997c80b232440a4936c2e869815525b3626abd22802d0cf618f8ea5e3ada70c,2025-02-25T17:15:13.367000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000 -CVE-2023-52943,0,0,f6ed6bafa02a627fd8483d5444c81747a611e4e8a768a1c76804639f41008cc5,2024-12-04T07:15:04.033000 -CVE-2023-52944,0,0,5daf62785974cba685a545e3a278455a59f1180c1cadfc012245f208f88d275a,2024-12-04T07:15:05.790000 +CVE-2023-52943,0,1,762e94fee2c5de62316d3b7e8e7aec19567666c22a1e731bc36e75784cc70d88,2024-12-04T07:15:04.033000 +CVE-2023-52944,0,1,4b463fd296ca3ef7ae6f780eb5b1db49c0b40f193b789c3015e5d84d7d0753da,2024-12-04T07:15:05.790000 CVE-2023-52946,0,0,3d7aae165a174e48796900810af5199f23129c11121058d52b8cf76c8e8211b0,2024-10-08T15:55:07.543000 CVE-2023-52947,0,0,ffdf9744de21fbdd696ad023bccd09f193c6be4512b46150ab25ab25eea3fe1a,2024-10-02T15:26:28.213000 CVE-2023-52948,0,0,dbdc9e2002a091c7ed1e1c26a663f3bc3766aadd7e724d8902cdebf241e4fb7c,2024-10-02T15:26:30.160000 @@ -241512,11 +241512,11 @@ CVE-2023-52953,0,0,505d22422517c509093e20be4fa6cef03d81124377bff73b0554278d7ae4f CVE-2023-52954,0,0,8b4c2bb5bacf8eb27f78e90b0f6b79604ad46840b6b95dc0e1c12132d9665f10,2025-01-13T19:09:19.737000 CVE-2023-52955,0,0,13e36a7d0105631ad28d1b673d8b8d79157696f3624304a40ce36ea78894df3c,2025-01-13T19:09:36.110000 CVE-2023-5296,0,0,b04d4fbd343c2e856b8ac0aee32ec4da2662cf244be6db174bfbc8064e9c4681,2024-11-21T08:41:28.453000 -CVE-2023-52968,1,1,7d7017d47fdc41e3e4382ea18c9a97530a26e09292e7e2f297d71870121f3415,2025-03-08T23:15:13.173000 -CVE-2023-52969,1,1,c90b0b9b94f7aa6094165ea47bf25e4d4f6a2c547333196d3f390267e432056a,2025-03-08T23:15:14.357000 +CVE-2023-52968,0,0,7d7017d47fdc41e3e4382ea18c9a97530a26e09292e7e2f297d71870121f3415,2025-03-08T23:15:13.173000 +CVE-2023-52969,0,0,c90b0b9b94f7aa6094165ea47bf25e4d4f6a2c547333196d3f390267e432056a,2025-03-08T23:15:14.357000 CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000 -CVE-2023-52970,1,1,6a433af374dbc904a0840bdcb33e1cb62cb25ebe64fba086d6a5d24ddabace61,2025-03-08T23:15:14.527000 -CVE-2023-52971,1,1,4c48cf99780e3a1c16d35329f6b3db8ed3324f7f365e0b184756cb780a4e30a4,2025-03-08T23:15:14.683000 +CVE-2023-52970,0,0,6a433af374dbc904a0840bdcb33e1cb62cb25ebe64fba086d6a5d24ddabace61,2025-03-08T23:15:14.527000 +CVE-2023-52971,0,0,4c48cf99780e3a1c16d35329f6b3db8ed3324f7f365e0b184756cb780a4e30a4,2025-03-08T23:15:14.683000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 CVE-2023-5299,0,0,d1a3f4df2181486873f0f83a21c7898914e70351cf79e1f3914b8afd11231fe5,2024-11-21T08:41:28.867000 CVE-2023-5300,0,0,eada94012fd708691ea3792cf6b054b3ad0de381a1556cd7e6c92c322c4e2e74,2024-11-21T08:41:29.013000 @@ -241667,8 +241667,8 @@ CVE-2023-5451,0,0,f74192e0a1a18f9eac18e82bc17661387cab855fb616b7c2d929d12f4eaed8 CVE-2023-5452,0,0,8338e39c9bea30f4d3c6e96dfc6e2e3b4c6df187407a48fb4b33ab50200d74fb,2024-11-21T08:41:47.753000 CVE-2023-5454,0,0,dc536bf1b884214132b4124a4d0fd5485006c40e56909d4668b90f88941a12a6,2025-02-26T22:15:13.807000 CVE-2023-5455,0,0,3a160478e5901f057d75d52e868e4433cb057ea901568f6597eb8a2d6da1e1de,2024-11-21T08:41:47.993000 -CVE-2023-5456,0,0,cd8a2d89faa9bee88e6248d2b953edc2a62b58fdb9f6968e4295092408f4bfa6,2024-11-21T08:41:48.190000 -CVE-2023-5457,0,0,b19145d8a55a22c0d5b90f4b5d9c999642d21b3e32ce0246701f49687b90e55c,2024-11-21T08:41:48.313000 +CVE-2023-5456,0,1,3be70d651999a9d52ba387c9f0e49d0b6636255477bebe28c177acd442d79ba3,2025-03-03T19:36:13.823000 +CVE-2023-5457,0,1,743c8baf783314beffd23588f78559ba8eb813c1fd9fd123e6f5f3e50ad5f483,2025-03-03T19:36:13.823000 CVE-2023-5458,0,0,20fc50f28da8d7adf35c08f4bb3261eb3b24302a742f7974b8ff9ded92374c2c,2024-11-21T08:41:48.443000 CVE-2023-5459,0,0,5d6aabe7cc51ca5631fbb30f2c16fcd8622f11294411b02c602cb14ba70c79b8,2024-11-21T08:41:48.577000 CVE-2023-5460,0,0,a87e91b98d52cb06436a3ddc397ad0dc2193d8c8b4f5a7dee181ad1960a2754c,2024-11-21T08:41:48.760000 @@ -241858,7 +241858,7 @@ CVE-2023-5659,0,0,90bec3abaabcae7fb3bfa0cf6da0fcefb1e3e730c1c2b218ac7bdca3c49b99 CVE-2023-5660,0,0,00f09116547c937e9c0184ff61209a2d81de417f27b12504918eb6e601a253e3,2024-11-21T08:42:13.240000 CVE-2023-5661,0,0,153d81aec958b8a1d7806537425a88ea158d41f855e567f08d39fe5389f2c85f,2024-11-21T08:42:13.353000 CVE-2023-5662,0,0,d1ccde7b8e95048e20bae2168862020bbd049373c7da1e6a79b1c32f8782b085,2024-11-21T08:42:13.470000 -CVE-2023-5663,0,0,7eeae02ceaf4a4f23336bddaf46ad4e19c8a629aa6f265176b90615a6d5a6de0,2025-02-13T20:07:55.597000 +CVE-2023-5663,0,1,b680fd937ba60166eb9e86c17d2778543faff6ec8e91060aa4c9b146902b81e1,2025-02-13T20:07:55.597000 CVE-2023-5664,0,0,e2b99e1c09c1569745a988b9d968cc63f2c56b490c93cc8f8a566dbb1762799d,2024-11-21T08:42:13.713000 CVE-2023-5665,0,0,43ad4254c50ffce86336ed9f68a64e6560d45fcf439f954b8022ed5897f81976,2024-11-21T08:42:13.840000 CVE-2023-5666,0,0,37afafc64470b9c4412022b29b570165476f85d1848a92527d166585715bed6f,2024-11-21T08:42:14 @@ -242175,7 +242175,7 @@ CVE-2023-5989,0,0,a78cc9c0b47ba0e64491d91939e577fc68c13043d87ea9e6cbb65ab00be2da CVE-2023-5990,0,0,d8636460013d81561d75321d4eca29771b7c0b472c3ac8164e20e4e79608a6b1,2024-11-21T08:42:56.103000 CVE-2023-5991,0,0,5994b91a7bcafb560c3db2b198798e1c8ba7fbf8e3b7824583749eb6aa3b37e8,2024-11-21T08:42:56.233000 CVE-2023-5992,0,0,764edc002a480ee8d13c5c7e4518108b2dc88b6cab4bd72a3046ea4f3840d9b6,2024-11-21T08:42:56.353000 -CVE-2023-5993,0,0,07e80aad044cd167c13c36aa96ed923a20e4969cc4f728c6b3b4118df8a3d584,2024-11-21T08:42:56.533000 +CVE-2023-5993,0,1,079c5a3e834b81f624a94f24796190821dbd0c3b2ee71682e92d07d7ceac3faa,2025-03-04T12:24:19.653000 CVE-2023-5995,0,0,186aec097709754ce11416ac941160b935cc9d301d3a1c4ed45eb65c565d18a3,2024-11-21T08:42:56.657000 CVE-2023-5996,0,0,2ef4eb71d4f52756fc81dd28e5d694685ca3c6e06dc394abf18df054f57e6035,2024-11-21T08:42:56.790000 CVE-2023-5997,0,0,5edb59333917a38c7b27862996d1da7c614954f16407a701255c21d3947aa9df,2024-11-21T08:42:56.963000 @@ -242423,7 +242423,7 @@ CVE-2023-6263,0,0,842a651a8dbf1703d4668b71be062263b7bf559c02d4bf6501171c372d199a CVE-2023-6264,0,0,628fbfe22018e5c0b4317b0dd4ec1f1147081fe8264d1446d5a739ed479fa707,2024-11-21T08:43:29.310000 CVE-2023-6265,0,0,55ae51b074bee9f061d5fb2343bc9df3fcc58b2200088b112550f33ca58d805f,2024-11-21T08:43:29.440000 CVE-2023-6266,0,0,a56f8b494bda94a0aea5fc951b820c3c14cb27f985c2c86369168d4567d8fd6a,2024-11-21T08:43:29.590000 -CVE-2023-6267,0,0,dee65e356e3e4276e2c163d1c8301624af12daba4da3110a5be52bd415de11eb,2024-12-04T08:15:05.740000 +CVE-2023-6267,0,1,7dc2937c2a6649862723ca3743afea6856e7e00bc8faa09b22a37d7facffa9eb,2024-12-04T08:15:05.740000 CVE-2023-6268,0,0,211e77c9038368c185afb02eac588148c8912da350a3688df0a8570fb54e308d,2024-11-21T08:43:29.870000 CVE-2023-6269,0,0,67ef793edb72877a7d3f1597c65d7c44418af3bd0b7297fa5b905dfee1679e58,2024-11-21T08:43:30.003000 CVE-2023-6270,0,0,bfa2c5bb5ca49d110cf1c3cbd179c0891b73fd622409b7e41a64036792370f17,2025-02-07T03:15:11.343000 @@ -242478,7 +242478,7 @@ CVE-2023-6323,0,0,c194a6f766b315e056c844c2da16e0435ee12006aa6a62cbec2ab238cf4c55 CVE-2023-6324,0,0,2fdd77c144dcadc116bec7e8e0b46b27b3c0a4f3069fdab6dc4d79581a46d676,2025-02-11T21:32:50.220000 CVE-2023-6325,0,0,e17101d7e855c4f4674887a9fc98e3c8c9faa0a57755c37cf1b80bf7c278189b,2024-11-21T08:43:37.750000 CVE-2023-6326,0,0,334e197b7eb5ade58bd24c55fbe2967b55abe19c0a21fd69b918be44424b2471,2025-01-07T17:39:16.927000 -CVE-2023-6327,0,0,229cd98a59968c7ceafcea3076ebe295ea24e58113b218a562b165e510d8dd23,2024-11-21T08:43:38.007000 +CVE-2023-6327,0,1,3501e80d5828b88c1388859a9a8f98cdd39d9d123d23b068f0f48068ef35d850,2024-11-21T08:43:38.007000 CVE-2023-6329,0,0,4c2ee01ec4e81d5caa17fabee54fcc52d6be16725c3211c88533d88574dbd9cf,2024-11-21T08:43:38.127000 CVE-2023-6333,0,0,961ff0506817d5b19435905357d5cda18c6d500dab05b45ec6426977d561b32c,2024-11-21T08:43:38.257000 CVE-2023-6334,0,0,44c0b233e657c80f8a888c49a907ad69304e647baddd5ba3f70873ddd10a4c5c,2024-11-21T08:43:38.400000 @@ -242492,7 +242492,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37 CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000 CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000 CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000 -CVE-2023-6345,0,0,ec91a16b71fa4cadf2e2c00690ba802691a2d72b1f72f5aad4ab6170010d8493,2025-02-03T14:15:37.710000 +CVE-2023-6345,0,1,19086f0fb3afb61aa4695d13885be9ee216abace4a98ffb69bfbdbc7ce12d013,2025-02-03T14:15:37.710000 CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000 CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000 CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000 @@ -242684,7 +242684,7 @@ CVE-2023-6561,0,0,1be0360627d55bb08a8e0cdf24f754177a21066cc59c1c91f4d148b22e0de6 CVE-2023-6562,0,0,8141ea0527c14635008848acc57a06e0f509b1df7905aa60f012831438856c25,2024-11-21T08:44:06.340000 CVE-2023-6563,0,0,89ec464c4081aa03f870c9907ccfa6038753aed92b2c0d289ef13427b9eac40d,2024-11-21T08:44:06.483000 CVE-2023-6564,0,0,214172726a6cece16c2282a448841b86253ff9d924f7506707b9f3811488473a,2024-11-21T08:44:06.647000 -CVE-2023-6565,0,0,4f62e604e749688756c48d887bad4b13c78a0f15b495bacb1879186e57b0174d,2025-02-25T22:54:36.040000 +CVE-2023-6565,0,1,9cb5f957ac91270f5ab50c6b4de6f779da765af9c828d9765171d9c50f39b0b4,2025-02-25T22:54:36.040000 CVE-2023-6566,0,0,7b0a9187e14ffceeea8acf7296cedd5a20e27a43cb54f5ae39cabae76463cd1f,2024-11-21T08:44:06.907000 CVE-2023-6567,0,0,31e2787fbb39a1d10343dfc387bdc38b8efdde38e0c998ecbef0d05bb9f90b39,2024-11-21T08:44:07.040000 CVE-2023-6568,0,0,b7bf68178b4bb7abd219eaf1b48c6467f0bc6bbbe0e6b082b779bab1d11d6b28,2024-11-21T08:44:07.173000 @@ -242972,7 +242972,7 @@ CVE-2023-6893,0,0,86e535f2c03fe67a97f966101d15e7d0d43bce33ec12518076ca5c98b82e44 CVE-2023-6894,0,0,b9a0d9f857946c4e82d7251038d90e79aeef6529eaccb516826d27947e96c878,2024-11-21T08:44:46.827000 CVE-2023-6895,0,0,aa18be8f28e715811e0423d7ccef00859c92670ba321790e397573610a7b5d77,2024-11-21T08:44:46.973000 CVE-2023-6896,0,0,0bc39a10dfa5fa76b77ee13fee87163eadc827d4f2f2ba425792cb607fcc1352,2024-11-21T08:44:47.140000 -CVE-2023-6897,0,0,4ad6e5088b13e7e3f8a8761ba1947bf8242d6a88a835500b1c513b363037a4eb,2025-02-11T20:31:53 +CVE-2023-6897,0,1,fd39b402a3b7c96d69943aeea1e19c92433a69d1e2b8677cb27835f7999ae4ef,2025-02-11T20:31:53 CVE-2023-6898,0,0,6f20638fe839aa32304e30292388597aea8dabeb565fe9b151cfc6c55658b0b6,2024-12-23T15:18:44.853000 CVE-2023-6899,0,0,fc908bc9821e6cea77916504532f3dda07ac3462bc73f09412a574870d2948a8,2024-11-21T08:44:47.563000 CVE-2023-6900,0,0,d87740807a0488fa1cb72e810ef0e999056ceed000408bbe25e5977828e6eba4,2024-11-21T08:44:47.710000 @@ -243035,7 +243035,7 @@ CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f039 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 CVE-2023-6961,0,0,89cb45433f8e26b14f3306b32b46bbf8e80e67eb64de5e5403e5343a8f274c7e,2025-02-06T18:40:11.367000 -CVE-2023-6962,0,0,66f618900fdfaaa22e9c739afd3f162cdb00b1772d51df0f7631afccc4d25161,2025-02-06T18:39:37.717000 +CVE-2023-6962,0,1,6eec8eefbc89330dd3d5b93594f7e8cba59d8fcce03699860b236b77ee6bbc95,2025-02-06T18:39:37.717000 CVE-2023-6963,0,0,01c79ae6ebdcef8bfb9c31ad967ef0972931fd93edc1bd88ea5a1b8e1c328f53,2024-11-25T16:47:33.943000 CVE-2023-6964,0,0,62ee2c7d615f8230d7786e86f6b4b3fe7611f5b3ff7341e4c5e53f2b3ca4a14c,2025-02-06T18:53:58.280000 CVE-2023-6965,0,0,883423a54a48ad510838957fb44f754f7eb0a22c8d57e1007ff51830ae4bb666,2025-01-22T17:38:52.513000 @@ -243084,8 +243084,8 @@ CVE-2023-7011,0,0,6d4b7c148a188ea77758cea520edfe0357813276fd6d84006cbfa3ca6c8f0f CVE-2023-7012,0,0,5c1ae12587a689695a3c07cc39f89391bb45d6735687677ab3130a98835fea9b,2024-12-26T15:43:32.457000 CVE-2023-7013,0,0,7b6b201772be0aba336e92b627046a6ba51720df3756a6d97030ef66c2c200f0,2024-11-25T19:15:07.563000 CVE-2023-7014,0,0,653f0c93c2effce325dc59ce969f80644077c8f621b768b2909654e991fcf9ec,2024-11-21T08:45:02.353000 -CVE-2023-7015,0,0,606bfc2629ccdc0b04be84858f5d84e7b4e740704995c6dad6808b47d514bb81,2024-11-21T08:45:02.537000 -CVE-2023-7016,0,0,4274241519770c019db77358b068d7e264c858a01e16e3cc52fb615f0c2be0f0,2024-11-21T08:45:02.697000 +CVE-2023-7015,0,1,91abdaeda3bdb7ea29e1e14a877de8fec852f042c1c7ba0ce248d773814188c6,2025-03-05T18:25:53.837000 +CVE-2023-7016,0,1,1bddb2f98c01dc9e1ed0e8e402527b0d02ec6b7e00247f63b9be6e5ce89d8928,2024-11-21T08:45:02.697000 CVE-2023-7017,0,0,a7d76a9613a406592ea0d3b77deef438f8a559b81e5dbf4800b4015e18fbcec7,2024-11-21T08:45:02.830000 CVE-2023-7018,0,0,1290b1c32659b3fcd542bcca682f3223abc0de7d6b3c98e245baa0204fc8197c,2024-11-21T08:45:03.013000 CVE-2023-7019,0,0,d5593188720056230c3acf1620e5e2ad03ee71cc5f934f9bd3fe8cb3fa8c2202,2024-11-21T08:45:03.143000 @@ -243135,7 +243135,7 @@ CVE-2023-7063,0,0,eb7594f6d961ff7819ef655c73a315f5ae94ca53f32e92ecdcf503cd5e6e5c CVE-2023-7064,0,0,612658789abe3cfc665863a7be8ca207f4ad27b6870845c92ff7e9167d473373,2024-11-21T08:45:10.193000 CVE-2023-7065,0,0,2d3d4df514be608b4d03797d3096de4a310b34382c4830e6ae3c077e83e24f5e,2024-11-21T08:45:10.333000 CVE-2023-7066,0,0,447d294a3a11f8bf4a3bf34ee6c67274784e58a6635ee5d40ccda18a0b30681d,2024-08-13T12:58:25.437000 -CVE-2023-7067,0,0,3557c774cd9005f77b4f13966ac1f680f4b17dca555d8b83f1a0e5c48917fb94,2024-11-21T08:45:10.670000 +CVE-2023-7067,0,1,d703ff75cd0311e2934c68e550aa7f54efe3cdedce6faa928bde998da7043c56,2024-11-21T08:45:10.670000 CVE-2023-7068,0,0,66612add00985bee1cb0a47a183f4ec85fafb21e3c327acc340b0d97270e845b,2024-11-21T08:45:10.813000 CVE-2023-7069,0,0,34c08207af52ed58978c3a450428597e03be145f6a2130e41378d9419807b940,2024-11-21T08:45:10.960000 CVE-2023-7070,0,0,d4f8c7975a3506a7dcc8c4cfe544d8efda7b15b1eb3e3eebf34fdba11847a94d,2024-11-21T08:45:11.107000 @@ -243149,7 +243149,7 @@ CVE-2023-7077,0,0,20a538ff690ee7669a6b7becf4d527d8c10e60b9150e28ffac2a747a00df33 CVE-2023-7078,0,0,f7d7fe7655b5566666f340379eb2eacc725fc271aad9069efc986b62c2b4df19,2024-11-21T08:45:12.253000 CVE-2023-7079,0,0,46c393c570993abb391f057750b5f3d862f3a7268c200e5fdd089347f6f96ee5,2024-11-21T08:45:12.460000 CVE-2023-7080,0,0,0dedea4579e0ebdb20487dc410d73c81f344d084a8525a398527f331a9f27e4d,2024-11-21T08:45:12.610000 -CVE-2023-7081,0,0,cbaa9786d6ad482915b5f22bfbcb479ed5078e23977a450744b2c7e5c413ed38,2025-02-26T07:32:59.377000 +CVE-2023-7081,0,1,91c63ea627dfdcc942a01ae71661456a1ce0179dd752d7ae102820022c20b567,2025-02-26T07:32:59.377000 CVE-2023-7082,0,0,01da1b16e99cb894b19b28e654f0eb0d1f946ad3cc9cf73b506a5d550a9446db,2024-11-21T08:45:12.920000 CVE-2023-7083,0,0,c5aa53dbff112a3d086d0b26f297d981e1f6ee6c887d1ac2941e9a37a179680a,2024-11-21T08:45:13.047000 CVE-2023-7084,0,0,d9889df429199caea86387e661e3ff9a19490ddaa4c78a76e3ed6d89055dc2e5,2024-11-21T08:45:13.180000 @@ -243168,7 +243168,7 @@ CVE-2023-7099,0,0,e5a2b72389968a01cc4f6096c3e1ce4ac890861a6e3386a7275b06db2e27cf CVE-2023-7100,0,0,d677b41de093998f0edb23384ca32d3a17e346e2181a72ddd7db4fe96959d1aa,2025-03-04T17:15:11.650000 CVE-2023-7101,0,0,78a85b1311a31dfa9c8b894c9505c43b5a39d6d339543bcf68dc72fc2d6db90f,2025-02-13T18:16:12.690000 CVE-2023-7102,0,0,eda46931e4d5cc965a4562425a4a4a96d50c0b667307576457f7ed3697edc4a3,2024-11-21T08:45:16.750000 -CVE-2023-7103,0,0,b2b8227ac2e0796238c704873dbc5543721fca2e7ab91f34fb3c87b288acac1b,2024-11-21T08:45:16.913000 +CVE-2023-7103,0,1,504008c363eeef54a14a16075674b14134fa024a6160feecad6805fec06dbee4,2025-03-04T12:25:10.853000 CVE-2023-7104,0,0,685626b29f6edd04d4660abe291361929ccac331b20f76b48a7d8dd8219b4857,2024-11-21T08:45:17.067000 CVE-2023-7105,0,0,0849de347af7718080d5740b075c60e353848b9b5954d2327aed064ddc313f1c,2024-12-06T19:56:16.997000 CVE-2023-7106,0,0,c57c761c437afe67535c5ea2a0aed1b8f1f12ed9ddc28e7cf8548e754b07890a,2024-12-06T19:54:34.153000 @@ -243435,7 +243435,7 @@ CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f28 CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000 CVE-2024-0112,0,0,a93867826173d52b069ba4bc756915acbff36c5eb60fb96b794508434a58f379,2025-02-12T00:15:08.263000 CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000 -CVE-2024-0114,0,0,708e24dec8459f8bc67865b836205c7a2e3be17f2289ee1bea615fa4716b15df,2025-03-05T02:15:35.830000 +CVE-2024-0114,0,1,4ebd0af82a037e334ed7d136823a58e12873828f4d30d91ced2ad8669c229bf3,2025-03-05T02:15:35.830000 CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000 CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000 CVE-2024-0117,0,0,84b7d2152c61433ae8112e32e5f606da7b00d4d29b6701eb589483940b681c6f,2024-11-21T08:45:55.250000 @@ -243462,14 +243462,14 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 -CVE-2024-0141,0,0,84b00f25b6997f819af1aca9f8be51293f801f978ea0baacd055d7bf18cf772d,2025-03-05T02:15:35.990000 +CVE-2024-0141,0,1,567c31b8cd264130a69316d457fc264ad99b5eb55b33510d79465b0f28137f30,2025-03-05T02:15:35.990000 CVE-2024-0142,0,0,ab91e4f89023d5fa0e0918df6d387ffb7317705e556bb93dc7ee303e05180788,2025-02-12T01:15:08.230000 CVE-2024-0143,0,0,373bc5cf4b7b47e3878a4267a11415b51c043adff18c18154b4310affb61efbf,2025-02-12T02:15:09.253000 CVE-2024-0144,0,0,62b9924272d497b69906b0eab483f0a669dd3b052ae52931761b3c04972ef923,2025-02-12T18:15:20.557000 CVE-2024-0145,0,0,7d01cb77c5d157bd7abc17279e81a20c5c2c78a8e9874d3f3a50cad415c9ffbe,2025-02-12T18:15:20.700000 CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000 CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000 -CVE-2024-0148,0,0,8d95591371d1726a4fcb8366fd2b818a0834180ebc1e03e554e9fe02d91c5da4,2025-02-25T21:15:14.700000 +CVE-2024-0148,0,1,2a89f4eab8868e793fcc1d57971f0539f43e40d46615bff4106e8db8b0d25b2e,2025-02-25T21:15:14.700000 CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000 CVE-2024-0150,0,0,a0819331f8fcd2317c8b0a40ccdebab71000a4816dfe15eb899f5f94179926a1,2025-01-28T04:15:09.877000 CVE-2024-0151,0,0,47427b70774487ec12e517511137a7ffbbb3bc25062c399b4c4cdc16ab998934,2024-11-21T08:45:56.783000 @@ -243511,7 +243511,7 @@ CVE-2024-0193,0,0,6220902bc14f1503ff2dded369c39a69fc976c2b711847037b79014afe200f CVE-2024-0194,0,0,7d33c63c40ca62941c9fa952cdee085f0cbd98a2df2405ded0a2be19225eb87e,2024-11-21T08:46:02.327000 CVE-2024-0195,0,0,20d44a923469cd72437093c52a9988a6ea0c329c670153d613e10fe01c1f003e,2024-11-21T08:46:02.473000 CVE-2024-0196,0,0,9823935c03d4905ecd0aac681f11a8cf50cf5fa955b018828d278fc5a0ceb6ca,2024-11-21T08:46:02.607000 -CVE-2024-0197,0,0,38b89111bc85e4c7ff3e2665f2bfec06e7f557255ece3f911d322192ec3d76ac,2024-11-21T08:46:02.750000 +CVE-2024-0197,0,1,415721c5462958cd212ce0988dcf3ee1e004ed2a1535dbb4e9657aaffeedbff5,2025-03-04T12:24:19.653000 CVE-2024-0198,0,0,a2d5c350d46809c58c4bca5ec74025c194925554c84f4522a21684d3d8763bb9,2025-02-11T02:15:32.910000 CVE-2024-0199,0,0,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893aef3,2024-12-11T20:12:49.670000 CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000 @@ -243669,8 +243669,8 @@ CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43f CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000 CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000 CVE-2024-0367,0,0,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000 -CVE-2024-0368,0,0,bfa306a23e7966d1a3c6df3b8acffa6f89a82da259d0056adf68cc23dcc9c766,2024-11-21T08:46:25.077000 -CVE-2024-0369,0,0,815d4d3c71949ae70cf07ecb35d9ac59749067f82a962ed4f0d9c0bfcb838f2e,2024-11-21T08:46:25.280000 +CVE-2024-0368,0,1,01599c55a91425e2ba7730abbc41f61a2e52bd19c0845871043d03d028cadb76,2024-11-21T08:46:25.077000 +CVE-2024-0369,0,1,5ff93566d28a0ecc5b41044532b8462289ecee111c6146af9553d30292e58558,2024-11-21T08:46:25.280000 CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000 CVE-2024-0371,0,0,5c3d442f8ecd87f51d1c113b9afa4febd80318afc8cd2eb08f21826e97011962,2024-11-21T08:46:25.620000 CVE-2024-0372,0,0,cdefb651d58754406381dc11b785774bfb0c82915c9d61404379e3d0e8cdf370,2024-11-21T08:46:25.763000 @@ -243679,7 +243679,7 @@ CVE-2024-0374,0,0,8a8885831ece676186f8806efeec3a4eb9c300cbed5e4e0d0e9da25264b198 CVE-2024-0376,0,0,e519b0b3ccb0380dc644ca1c0a0d806c3aa99c34eb8019def3cd5d2de9305e23,2025-01-09T15:13:53.520000 CVE-2024-0377,0,0,0e353b2cc17ff573216a0d4035ee71ce75ad1473df46058436429c0fd8b6187d,2025-01-23T19:50:08.837000 CVE-2024-0378,0,0,6327e42d183029a8d5af62628ec61e961d0148256785c05c3ae05fdc51bde6b0,2025-01-16T18:30:44.367000 -CVE-2024-0379,0,0,655129da83bf7b78f99b2d842cc93a793c4b9dead86fb37c1ebfba25f8a6af6d,2025-02-05T18:10:45.403000 +CVE-2024-0379,0,1,475cbad042878d51f320d58661d629586a1d37bc9b3d13df1876a09ec0653a25,2025-02-05T18:10:45.403000 CVE-2024-0380,0,0,b13ba26b2c93293898a30471c8b142088e326e5cfea22174ba924ab8efd84293,2024-11-21T08:46:27.490000 CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db08a,2024-11-21T08:46:27.643000 CVE-2024-0382,0,0,89dea95cfa60010212418517f6858b68d57b6774bff452bfccc38c701002fb49,2024-11-21T08:46:27.790000 @@ -243690,7 +243690,7 @@ CVE-2024-0386,0,0,9a86b84ea8daa10a5ecec2032f545acedf93668b25f5a695f09f1a66ecd589 CVE-2024-0387,0,0,ff60b9ba2b1b10c6d0b324145a99cc181884bd35b90baf10effe2a023c81187e,2025-02-25T22:56:10.743000 CVE-2024-0389,0,0,c19c30c9c655e264df646c294b1eceee85d06503afb553e693b54f02f8287a16,2024-11-21T08:46:29.147000 CVE-2024-0390,0,0,ed1db3b028f3402293d95196ae4537b38c8c3195c736ab5fe113280f0fa8d20a,2025-01-23T17:16:26.520000 -CVE-2024-0392,0,0,54a8d0a86a4bbc5c7a5a53863ac7e67508867152530c2c096ca4ede3d0bd85da,2025-02-27T07:15:32.243000 +CVE-2024-0392,0,1,8db9c48dd5d16922c9c9eb5e6b8817fbac6faa4b93efa0d57bfbaf47a34f59a9,2025-02-27T07:15:32.243000 CVE-2024-0393,0,0,12dd170d2fc156ebb8fbf17ffdb29e3ee860d25577cf7ee28b77ed0f15e7a39f,2024-01-12T06:15:47.157000 CVE-2024-0394,0,0,33f678379ce4dda5d7d36acf798fd3656df13a3d2d3b49b3ab7653be71454e99,2024-11-21T08:46:29.437000 CVE-2024-0395,0,0,d15fe2b1f51b19968c48a28eea8138c91ece05366453d27247985892e7aca48a,2024-01-10T14:15:44.970000 @@ -243743,9 +243743,9 @@ CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d477 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 CVE-2024-0445,0,0,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000 CVE-2024-0446,0,0,124de0675cc01e13555049891a9a6623c7dacc61fc8dd34a8640dbaebb1bf4be,2025-02-10T22:15:32.380000 -CVE-2024-0447,0,0,ef82dbacc24448559fe1360e1922a6f76a74074d981e7a70149369df2daa3ad4,2024-11-21T08:46:36.667000 +CVE-2024-0447,0,1,7548d345fbc58c2a7dc6655a6b70a54701d5e8b807502de5f85fcff9a6f1eff6,2024-11-21T08:46:36.667000 CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000 -CVE-2024-0449,0,0,8854cd54724d4c1c1b7e946964875052779b5112bde9aaed91a265191b2b3659,2024-11-21T08:46:36.907000 +CVE-2024-0449,0,1,6d075a833530dc7bf5a3b691ee9e41b5afa9e0f8be26a593c77ea2c5a8a57e9d,2024-11-21T08:46:36.907000 CVE-2024-0450,0,0,a1b920c11dee63a8e3076083ddfa38e003146c3343c7cb62828f303698cddd99,2024-11-21T08:46:37.017000 CVE-2024-0451,0,0,5ae993f8fa6f67f9d1878c2219b82442c9f9c27de5c52f54d2bec468f56d2b20,2024-11-21T08:46:37.177000 CVE-2024-0452,0,0,e6fa2ac1a01ec8b171e192e303abcab51e8cb5be7741930dcf71a5f39de8743b,2024-11-21T08:46:37.307000 @@ -243844,7 +243844,7 @@ CVE-2024-0547,0,0,acdf7429bd2a8e4ffb2eba3a58ce97308993aa35cf10e231618cc925655b33 CVE-2024-0548,0,0,7339da5c871dd9c3dde4fd1f71a397a1ee8b50f50947dd5273374eb9d6615a92,2024-11-21T08:46:50.803000 CVE-2024-0549,0,0,cc96a4390d8e86a1f1759399f91a685c83665e265ae9ab97e0238641ab816e82,2024-11-21T08:46:50.990000 CVE-2024-0550,0,0,cf66f5d426f4732d6d5e859a65b202b54f97a6046ca6eb70c9b2f823e39166d9,2025-01-10T15:22:26.327000 -CVE-2024-0551,0,0,e2b5f4978d2576c5755c201bd2ac2b550e457746c387eba2921c6e05c321d4bc,2024-11-21T08:46:51.247000 +CVE-2024-0551,0,1,5ae1b2fa466009f13574dc293d22be50414948c5a2fe1050d6424bf0819d1751,2025-03-04T12:24:19.653000 CVE-2024-0552,0,0,c26b1c609bfcd4fe299be1c0ec993046f357cbd73ad3f5ab06c2ddafe3ab56d8,2024-11-21T08:46:51.370000 CVE-2024-0553,0,0,987e9a4a2c3b1fc25d14af5316d4e93ca2ad5d357637fbcb0cf6b975b15d1c20,2024-11-21T08:46:51.507000 CVE-2024-0554,0,0,bd6d6a98e9d31546946eae4402c136c8f50317ebfa41ab0af85baf3bb23a24d7,2024-11-21T08:46:51.720000 @@ -243882,9 +243882,9 @@ CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000 CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b24224,2025-01-17T19:25:52.137000 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 -CVE-2024-0590,0,0,53989da270cb20c446f6b86c37429c71c35e9443c05ed547b28f375f83f5b82e,2024-11-21T08:46:57.473000 -CVE-2024-0591,0,0,c89c0e488100ca24f339ffbc72302eeffcd2a731ea98b3a23b8f1a765fe43e75,2025-02-07T17:53:51.437000 -CVE-2024-0592,0,0,26fa4db326cba8f700c0d7b4ae70996dd20d72f88488f65aafcff009c85af9b9,2024-11-21T08:46:57.690000 +CVE-2024-0590,0,1,f481ef28d4575792e39f3242fc31f5dcf3d5ce08c797600680221de34f5472dd,2025-03-04T12:24:19.653000 +CVE-2024-0591,0,1,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000 +CVE-2024-0592,0,1,1a17724febf8153342670e1a2ae0c506c1f9d961e5fb4933bcc637f6677b5b7a,2024-11-21T08:46:57.690000 CVE-2024-0593,0,0,f4e7a74601373b533789dea3664523c6cc99316255f76051d128ea0eea35276e,2025-01-31T16:36:29.673000 CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000 CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000 @@ -243901,7 +243901,7 @@ CVE-2024-0606,0,0,53f79eebfbe885d8ad157dbee910f37431bf9f4a0163dc066767f58dce4283 CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a05f,2024-11-21T08:46:59.383000 CVE-2024-0608,0,0,0cc7c37afdcd59b0ea35c17368f1a5b12959106382c47e8365534485db6e0533,2025-01-30T15:52:57.747000 CVE-2024-0609,0,0,b037adfe873979e9631c500b4662f0f92ea6276d81bb84225d3e18e35b4416aa,2025-01-30T15:53:29.597000 -CVE-2024-0610,0,0,2055239952d4db7cce4ed0ffa7c52adce1ff7984fe2d952bfc3718691928358c,2025-02-26T15:14:42.477000 +CVE-2024-0610,0,1,40a6f84955777ee2020b6541a8a286d2270a81da5af9384d6ca846def2a4568f,2025-02-26T15:14:42.477000 CVE-2024-0611,0,0,663347c1724ebcd33ea935e789f8fa6bd6a3de9942c2f6663f2c2af22f7bbc3f,2025-01-07T17:38:50.460000 CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f266,2024-11-21T08:46:59.997000 CVE-2024-0613,0,0,da8643fc97b531c82d214469e3fab5ad51b81a35aa2fb83e969424e9e3503eb0,2024-11-21T08:47:00.130000 @@ -243912,7 +243912,7 @@ CVE-2024-0617,0,0,efd125e5b2fb1e127ba81b6d2e9a7eb42489f0212a325253773851856ce45d CVE-2024-0618,0,0,c8d16847fce9f2cb03aec797634d2ee65c6d6118d484ea1e5f62d29664b2ea49,2024-11-21T08:47:00.750000 CVE-2024-0619,0,0,4ede4c2ce234de077beb2d58c2dd52c1638a5586c5e1ad672034f0e43cb50038,2024-11-21T08:47:00.873000 CVE-2024-0620,0,0,01a806fc8fc8f79aae8137b86300824b12d7d0439315b4c96502fc26c172ec9e,2025-01-27T17:28:48.890000 -CVE-2024-0621,0,0,9bfd7da13c6095312460f0b53f4c73c75f1f58a882ceef8407e5636be2e809f3,2024-11-21T08:47:01.137000 +CVE-2024-0621,0,1,3d5634de55c47fd1f2b908c2adeaa0c1c1ca933c07841ffc2278a9054d6f369c,2025-03-04T12:24:19.653000 CVE-2024-0622,0,0,bef0e087ddfd4a0233efb4c38eaf0e60aea1ba239bed5e5e8e26c084ac2ea3e3,2025-01-23T16:52:07.417000 CVE-2024-0623,0,0,dd5f29435e15338dc985fb5551595a6e34d69131f116d209222d2e5d483144bc,2024-11-21T08:47:01.423000 CVE-2024-0624,0,0,09352035dee59fe02f2fbab48ef8ce9be3c361adfb9ff0690caac0c5912794a6,2024-11-21T08:47:01.550000 @@ -243944,7 +243944,7 @@ CVE-2024-0654,0,0,f5c9c0cc6adb45c4ee4ccb32c94a93e5b4b752ebb5ff8e90536da2b68b43d7 CVE-2024-0655,0,0,b45ce71828f08de5e906828c46c08f690573b8e416f2e010774f774288516f19,2024-11-21T08:47:05.057000 CVE-2024-0656,0,0,95391c4536a389d37f451ebd2930637a96631797f5ee6bd41f68ef3899f9f6f3,2025-01-27T17:24:42.410000 CVE-2024-0657,0,0,b5ce6fbcc9ad9c2ff39fcf9e66939ed62391e858e4a9f088a94fb15f49f59acd,2024-11-21T08:47:05.317000 -CVE-2024-0658,0,0,6741a56a143fe687901f1e7b4904d5f01e2a3543429c58da80e6090f1f6b1337,2024-11-21T08:47:05.453000 +CVE-2024-0658,0,1,02a039fb80931f59514b525c25159868d3884229ec996befbe832590acdf313c,2025-03-04T12:24:19.653000 CVE-2024-0659,0,0,b99e9ae32a582135e50e1efb67fe922b2ab11594e1e54191377ba5a214c9819c,2025-02-07T19:44:53.660000 CVE-2024-0660,0,0,40e8f123bc8b6f1561e3260fde23503a0610cb7a90946a4987ba73f8e90e7d44,2024-11-21T08:47:05.710000 CVE-2024-0662,0,0,433dd086e0aa2793f2d2e5659eb88ded93f9c7d18e42a95ccbfc57766429463f,2024-11-21T08:47:05.840000 @@ -243964,14 +243964,14 @@ CVE-2024-0676,0,0,2a2c795a38165b563f05dcf698a33c166b6d78ba9b189159a7f0b453d85580 CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ffcb,2024-11-21T08:47:07.893000 CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08 CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000 -CVE-2024-0680,0,0,e50d1c64e30fefd809e68c119f37f573f84770ca6e268f24bcd8caeef5483273,2025-02-07T01:27:25.297000 -CVE-2024-0681,0,0,f85697f60d4d66e388793935f191c4f5e53ccdfce9c9dccf353e5ec6b0e157e9,2024-11-21T08:47:08.380000 -CVE-2024-0682,0,0,7f99e9ee6a5c25acd2747510e7a0fd52f526cf650049286226e9c0f5d163dfb6,2025-02-07T01:26:17.227000 +CVE-2024-0680,0,1,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000 +CVE-2024-0681,0,1,f645422d5607df145d2f13ec1fde9bcc05e65e868187ec4712f7463c2b7296a7,2024-11-21T08:47:08.380000 +CVE-2024-0682,0,1,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000 CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000 CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000 CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000 CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000 -CVE-2024-0687,0,0,d93998c18d64bf210c2a399ddf1aafa937567f61265f0453c37e7cb6ae0fcbfb,2024-11-21T08:47:08.990000 +CVE-2024-0687,0,1,534bfeb19e6ba9869a11b31a1ca1a982071d11c9ca518a7d172a828a4300754f,2024-11-21T08:47:08.990000 CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000 CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000 CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 @@ -243984,9 +243984,9 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8 CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000 CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000 CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000 -CVE-2024-0700,0,0,9e9c8bf219c29674096e5a8282dded6c6431baafd24d9d34f2a63dc1a0dcb1fd,2024-11-21T08:47:10.523000 +CVE-2024-0700,0,1,bfabb4efa6fdf9f50f68320c2d044f053fedad17789b2542e360155a24cbd155,2024-11-21T08:47:10.523000 CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000 -CVE-2024-0702,0,0,48d59d99feea9f691812324ab9747052278b85a365cc606684de83ea94dcee0b,2024-11-21T08:47:10.760000 +CVE-2024-0702,0,1,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000 CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000 CVE-2024-0704,0,0,a1f858ac7440853e6eb3815ddb83c901d10a15321e15c2aa01e99aa9a6669df5,2024-02-01T15:15:08.080000 CVE-2024-0705,0,0,5bf931a358cabda70b8b80f0cb82ca3341575ecda7a2685b6d892e9aebe15ff1,2024-11-21T08:47:11 @@ -244042,11 +244042,11 @@ CVE-2024-0755,0,0,6d0822b953773faae30b0621d4bdbbae07c3bb5a3b47f595baf288ae2398a5 CVE-2024-0756,0,0,45c6eb631450683f719bcfada467bd2a3a2ec8bb87553a4b0d09802f63499d73,2024-11-21T08:47:18.357000 CVE-2024-0757,0,0,946a152258210ddf800742de2d2343ce7559594b796f9e76d968aa0487d9bd5e,2024-11-21T08:47:18.487000 CVE-2024-0758,0,0,e2cbb6a743b0f38d8763d67905dd1888ec1c82e9f64e59374dd3f997e1e4d7e2,2024-11-21T08:47:18.590000 -CVE-2024-0759,0,0,677d327eba406433dd53426f51a36e1f8459ebbc22285b5af6d7abc3cd332d12,2024-11-21T08:47:18.727000 +CVE-2024-0759,0,1,13d2bf17d41521c63b6c61972a900c84af6a8b7670631d5d7f62eee2bd29cca1,2025-03-04T12:24:19.653000 CVE-2024-0760,0,0,28b1688290a8429996cb15aa4a590dfc852aa2c256b386e9997c92991939332f,2024-11-21T08:47:18.850000 CVE-2024-0761,0,0,3880824002a244098dc4a9d203545fa3dda9ea94020902bbdff8af939e9833c7,2024-11-21T08:47:18.990000 CVE-2024-0762,0,0,5a9bbb31c63619e68757e176832f3d110d2b2f096fdea8e0bdfb5fcf207ee1e8,2025-02-13T18:16:15.227000 -CVE-2024-0763,0,0,117b88ac4422f3ffabec2dc8dbfd7db0da7e8eb3347c3e63da6877654fc5332f,2024-11-21T08:47:19.257000 +CVE-2024-0763,0,1,930e06d2c7f50ad028a649c96251574768a2fa9e0767ed9af02b9e3fddefe9e9,2025-03-04T12:24:19.653000 CVE-2024-0765,0,0,bd1e10ec0269235d1f805b41ab6a7621e35014767ca84eee6da95b2930039ff6,2025-01-08T14:32:04.447000 CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000 CVE-2024-0767,0,0,a7ee481ab1c66b7c498da64ae1084c6748849512829a473ad9f194f786a0f5bb,2025-01-08T18:42:46.573000 @@ -244101,16 +244101,16 @@ CVE-2024-0817,0,0,645aa1dbcdd724c805269a6bc483078ddd297eb68b5212ffcf08ff402f04a4 CVE-2024-0818,0,0,fe089e90636a542d4168fe50d998b0b99a2c40b251dd94f21e3f0abd0e1507ce,2025-01-23T18:50:54.023000 CVE-2024-0819,0,0,5469d1ce92e5faf0fd2bee6af576d4d80c53ef725abc01403de878a161345e39,2025-03-03T22:42:27.960000 CVE-2024-0820,0,0,0b8e1c0c11194ff4c81a16d62a8163b193a628754a8abc4539dd167721ff3ebe,2025-02-27T03:34:34.637000 -CVE-2024-0821,0,0,2cc0e1b48267fbc5256a37c0bda0f30902265d895ec1b2f8ca25e482be9f6092,2024-11-21T08:47:26.803000 +CVE-2024-0821,0,1,8d0f135a1bde00f8a9f6278553dfaf4cfb224409407e8fbdd3c58db9c4b99611,2025-03-04T12:24:19.653000 CVE-2024-0822,0,0,ef76e16156f0ac7ca3043141b54dd9d9595137069497b8b98eaa4426b49c0d84,2024-11-21T08:47:26.913000 CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d0967,2024-11-21T08:47:27.097000 CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000 CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000 CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000 -CVE-2024-0827,0,0,e957f2d937603729338393f373602f5dea8b2b0693df2415eb5256e4bc6d86fc,2024-11-21T08:47:27.590000 -CVE-2024-0828,0,0,51e649465ff9137dccab1ee92f3af422b34e76e2c64362e9361512d9b7f012d8,2024-11-21T08:47:27.710000 -CVE-2024-0829,0,0,0eb24ad21fa9bb626c8f70ed128c5cd807556aba92718f44b880cabd39632b3c,2024-11-21T08:47:27.827000 -CVE-2024-0830,0,0,2281638bd203cc4fa6a2df5430deb1c927a5e9e669a45da6aa3c07cf0853a2bc,2024-11-21T08:47:27.947000 +CVE-2024-0827,0,1,b8d473bae80c3786e457c5f783fedf263c8e674dd54031a1e24f4324c8dcd46d,2024-11-21T08:47:27.590000 +CVE-2024-0828,0,1,ba93b2394e0f54da2d83908a611a0c569bc1e1721bd856d1be4c756b613e20be,2024-11-21T08:47:27.710000 +CVE-2024-0829,0,1,dfb75e76094313d0c7f20b8821d20ba5cb2f5a375032f4535dee50287735b733,2024-11-21T08:47:27.827000 +CVE-2024-0830,0,1,f3f28bf82ea176a81ed1bccad42ef59ad4aaefe36de7d06fc80fd37f620a7454,2024-11-21T08:47:27.947000 CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000 CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000 CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000 @@ -244119,7 +244119,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866 CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000 CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000 CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000 -CVE-2024-0839,0,0,49086e11eae50fdeaa0fd1455d8cc94d52d9a0af6af252bac9ff62fabed8f3b8,2024-11-21T08:47:29.143000 +CVE-2024-0839,0,1,7140f6314accc17b94e194d6f89d0691ad19ff9958d076096c8fdaebd4f845ed,2024-11-21T08:47:29.143000 CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000 CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000 CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000 @@ -244169,7 +244169,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000 CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 -CVE-2024-0898,0,0,cc5980de47f10b53bd5ab17cc469f4926cabbd6d885b5faf4e6abc8509f3fbec,2024-11-21T08:47:38.930000 +CVE-2024-0898,0,1,37fe6f69a0f959f2e8b7339b10784223f09060868383c6ffa044458e6391fea0,2024-11-21T08:47:38.930000 CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000 CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000 CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000 @@ -244224,7 +244224,7 @@ CVE-2024-0953,0,0,4e5d3a1c45342dc8d38179e760f7a87aca49f701a93f9665692636183c6efb CVE-2024-0954,0,0,717a5c9403a3a07aa79c1ee4c08e713ee7256149b246efe8ba9171429caaa223,2024-11-21T08:47:52.137000 CVE-2024-0955,0,0,b82c47be2ec9da97623c1ad2fda129765b858d770c87f2b3152d69dcecc86ae7,2024-11-21T08:47:52.317000 CVE-2024-0956,0,0,2fa94b188a1697121097e575aa78c7201ae82a4ff8e040d62d6cc88d336e7a9e,2025-01-30T15:54:22.557000 -CVE-2024-0957,0,0,0d0257e54172782738e952067e050408877cd069668925c94a664ad3ffb52f99,2025-02-11T21:43:26.183000 +CVE-2024-0957,0,1,f0ea1be47b87353b4b149c0d4db2d5b56fd22b9b2b8e761576f6b2a52f99ceb8,2025-02-11T21:43:26.183000 CVE-2024-0958,0,0,3aa53b191242b950a32bcb21cf8d6e0b144782295a7440504d8e624548be996b,2024-11-21T08:47:52.920000 CVE-2024-0959,0,0,54637bdc424270c73101fb55cd51e65b8630fde2a9ebc7835ba4638afe262cb0,2024-11-21T08:47:53.143000 CVE-2024-0960,0,0,5e6fa1dd9d39f9e3c014dc995f60e2d67c08e454caa26e9485ab70363c2b40ed,2024-11-21T08:47:53.357000 @@ -244241,10 +244241,10 @@ CVE-2024-0971,0,0,0fbf66131068316f18a459309bb5abd202482e32856952ee011afb233e5074 CVE-2024-0972,0,0,e58be32866f33c67069bcbf1a6ed4e3bd511aaced28f98cb0cc22c6a351ffb25,2024-11-21T08:47:55.493000 CVE-2024-0973,0,0,ab6b271e3ae815727e5bb0b8b1c986e5bbedc6512e7dcc4efc95d27d3c0086af,2024-11-21T08:47:55.720000 CVE-2024-0974,0,0,30450b1e1be60ec4560e59f53aeee211010a354cbda6e8888e0d09007531d84f,2024-11-21T08:47:55.893000 -CVE-2024-0975,0,0,94d63f1b42a1b3ef10fee2f1a2f5c46ca74a389e4a95554098e88089aa7ad325,2025-02-07T01:11:02.703000 +CVE-2024-0975,0,1,927902427c81e78a820da29ca78a14e906507ae17eb4d8834d59df87d8387cd2,2025-02-07T01:11:02.703000 CVE-2024-0976,0,0,748517121b0f45ea98f9da01d29843e5afa8ff033ea66d389a6c6cd716a75e8c,2025-03-07T19:37:57.623000 CVE-2024-0977,0,0,35ddbdf47de5d8a387b9c11235d17fbe38212db92abcf7af4a134a44c909b461,2024-11-21T08:47:56.303000 -CVE-2024-0978,0,0,27bc4a4c921414c1046a075815afd2035d816b8c9333eca10ca3840c22b357e5,2024-11-21T08:47:56.427000 +CVE-2024-0978,0,1,95265492110738a58be6f213681948acc15e33c7f71de70e753588c32499dc6b,2025-03-04T12:24:19.653000 CVE-2024-0979,0,0,baa5d9094fbc29dc7aa565142f1c9b80958eef1deb5e225475c26bd3e852a37c,2024-11-21T08:47:56.553000 CVE-2024-0980,0,0,0b0cf2cf274aa5011f1334c9bf9f827ad2c15dd7211176348585ac6956002ccb,2024-11-21T08:47:56.703000 CVE-2024-0981,0,0,ff5d0045d5a8a398c8154a7c935f4019293c97480e88e5858137ddb0060d7f11,2024-11-21T08:47:56.900000 @@ -244337,7 +244337,7 @@ CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9 CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000 -CVE-2024-10094,0,0,e63fac5d529dc5bceb010fd479146f46858cd90c1e360601f682aec7c32291c2,2024-11-21T13:57:24.187000 +CVE-2024-10094,0,1,28f6d79098a2903c13088615e2c52d9f1304fba1411c9171ca7cebbc7d051ee4,2024-11-21T13:57:24.187000 CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 @@ -244390,7 +244390,7 @@ CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70e CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10151,0,0,196e4fe4a8a05e0a3b22ed32baf3158e628b58ccada6bd06daf1c3495376c183,2025-01-08T16:15:33.753000 -CVE-2024-10152,0,0,bbd73706a50e34db5130fe141105daac25de63234e070646f36d5e4cf3c20eea,2025-02-26T17:15:21.417000 +CVE-2024-10152,0,1,e70dda99748cb4f840e29333dec3d9f83e01b068635f8a9c005b3b78503424ad,2025-02-26T17:15:21.417000 CVE-2024-10153,0,0,2f333937ac1cd6eb354355eaca9c7cf481b7802384e6fa7c27d5e638db3b56fd,2024-10-22T14:45:04.670000 CVE-2024-10154,0,0,881067e74e39ed69d1e96d86c551a91f65aae8723617d9113c95819b20a5b961,2024-10-22T14:44:47.807000 CVE-2024-10155,0,0,69ecac29dc7d85f6dc32fa941cb477f1015cc4923a81013963fc8d1644072128,2024-10-22T14:43:42.607000 @@ -244414,7 +244414,7 @@ CVE-2024-10170,0,0,d7a54e66524a3185196c595f10afd1c47fbfa8cc73a2b98f97b499ba5a1fc CVE-2024-10171,0,0,2e465393b58307e9723c68c1ef907c7f789970453ac0fb870ea674d528d5a302,2024-10-21T21:33:26.937000 CVE-2024-10172,0,0,089f9b9154e259551fe25026dec57a853d4e043a13ae25fa28683b26f855fd61,2024-11-21T13:57:24.187000 CVE-2024-10173,0,0,f74c479556333038d7eddc13a9cbbe7fd4da2bc69b7259387a3ad4b326f43186,2024-10-22T17:05:13.483000 -CVE-2024-10174,0,0,ac6027030246f07910222b1c799a2d10453990e0f685176dc66152b5997d2800,2025-02-05T16:48:14.820000 +CVE-2024-10174,0,1,785a071e6368bc2088e4db78385725926f2a07259384fdc6bb75eccf5b5d73d1,2025-02-05T16:48:14.820000 CVE-2024-10175,0,0,9d6bfea3124cbe12dc8beb6acba51208007e696098af51abe0ae1ca1472cefb0,2024-11-27T07:15:07.020000 CVE-2024-10176,0,0,1de5b7d5d65c843af328510cd44a4854ad1f122b5f1e61c8537a88d779b02fab,2024-10-25T12:56:07.750000 CVE-2024-10177,0,0,5e7ad13ce4bc9b20ada91706797a1ac84252114dfb41c003c452005f96c1bccb,2024-11-21T13:57:24.187000 @@ -244572,7 +244572,7 @@ CVE-2024-10352,0,0,727a0b6e44a1ced75fdf48883b49943d9d2367b26bb2b1243b889c334fa3b CVE-2024-10353,0,0,dc982688ac2e456dbe5c6dd48f122766937f3263880e9b3a51b4174548808855,2024-10-30T16:21:35.113000 CVE-2024-10354,0,0,debbc0402baa36bee3a1106346fda3b06c758de0c15108cc449220702ef0e4a1,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,bb1030264c200917c61c6d06637f7c0ba74c7056fdbdd3d5219d06567dcf1249,2024-10-30T17:13:02.417000 -CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000 +CVE-2024-10356,0,1,b40dd5e78d79a7801561b42d2dd020287c1a667fab89e5f76110013c9ef18bcf,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-10360,0,0,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 @@ -244641,7 +244641,7 @@ CVE-2024-10426,0,0,708cebc8101c81c7831edb44b5b1d4233bb8b5a39162fbd1e23656e5fad47 CVE-2024-10427,0,0,0526c6ea72c58be9159a146cc4c5df0a88b03fc8a1ce1c20aad86f330c31bb94,2024-10-30T18:21:48.327000 CVE-2024-10428,0,0,4a5435195206e6260e7bf5963e894cb7058b56beb049cf28a7512c345ff1a2e5,2024-11-13T17:57:51.100000 CVE-2024-10429,0,0,6c35190f53641bcde79aa342443e2e37526d193833a72d923d99012c32e9112a,2024-11-13T17:58:18.040000 -CVE-2024-1043,0,0,d07c5194479aa63ee1378bb84969954b63b0297d598b561222ad5f2e0fdfa314,2025-02-26T15:14:42.477000 +CVE-2024-1043,0,1,77110216aee695bd0e7bb0e114852f4040637c4392f11e4271cd9cbf090ec353,2025-02-26T15:14:42.477000 CVE-2024-10430,0,0,90deb35e1f56a0e98e380d8277b945dfdf78e6283e93ff7277647f2fc5c15c6b,2024-10-30T18:48:43.473000 CVE-2024-10431,0,0,9e87f8f50d7c11b6ae07f663a42b799e439ecbfc1bd7c8602ab94774ddd90f77,2024-10-30T18:10:49.883000 CVE-2024-10432,0,0,65bfdabb8bfdf4d110f549362929576f6316477bd81e399192996c090b8d387e,2024-10-30T18:45:59.990000 @@ -244652,7 +244652,7 @@ CVE-2024-10436,0,0,44f06f3a87e685276f3a35fbd1af09c953e5e2381cae8d5060bcc2bfe9da5 CVE-2024-10437,0,0,da611b25a4ebcfa0b6c3629b527c647275c6f60514e79b5e9ead11a83b0ab096,2024-10-29T14:34:04.427000 CVE-2024-10438,0,0,9ced19709ace1d6bfb86b8de1801377c2112b016d1dc92ec0264f2bb581a39ab,2024-10-31T00:52:18.370000 CVE-2024-10439,0,0,dff63217c69fae9244806d074600acaa18035b339be2a233d07b224cb66e4434,2024-10-31T00:35:36.173000 -CVE-2024-1044,0,0,a2f93265f44101807a367f99d1aabba94b891b5e6c601186caedeccf2aa8e46c,2025-02-05T14:39:38.177000 +CVE-2024-1044,0,1,afe542ab3d14120a4dc6f87d2e56310efaf4c6644bbb29e84c8a93856ebe6be3,2025-02-05T14:39:38.177000 CVE-2024-10440,0,0,28edfb6b2838e0c83bba465fa859f9eabfcf16c21fbb114f33945ddeeeda5c34,2024-10-31T00:34:23.870000 CVE-2024-10443,0,0,9a248fde514219a3f9853f6d0a6319c7fe25a6f75bf2697069d2e08ef9a76558,2025-01-14T19:29:55.853000 CVE-2024-10446,0,0,3d25a165556e0fad6d8407d42b9edffae95ba1513463aa6427887274dcd60e3e,2024-11-01T16:39:25.890000 @@ -244691,7 +244691,7 @@ CVE-2024-10479,0,0,811b1748f8f2e39c5f18d0e1187982bc27518243716716c5b22bf3fc13a17 CVE-2024-1048,0,0,54e99ba5d606327e8cd421651df7663c241b0b270ee508d9aa21b93e6a9e6b78,2024-11-21T08:49:40.727000 CVE-2024-10480,0,0,7894126f69863ebba896673129291ae9eff10c4fb83c9a1fac904578f4cb0c65,2024-12-06T16:15:19.917000 CVE-2024-10482,0,0,013e4e3e7c5efcb95927d9e3afa178ce62a1a2e48695c55ee7ee215f26d9fb38,2024-11-22T00:15:04.100000 -CVE-2024-10483,0,0,968200170154daf573665edec65461b314a4ff173c169327d263c4750136e658,2025-02-26T17:15:21.570000 +CVE-2024-10483,0,1,d3bfe1ae52e7ef5e2ef333efe80ac2227f120f18b7cfa1d1e2d445ddf24ab4ee,2025-02-26T17:15:21.570000 CVE-2024-10484,0,0,32383c32bab139165d502eb87b607c0e91c14ee68b6619e8eae708d878fe5bee,2025-02-07T17:14:07.230000 CVE-2024-10486,0,0,a09948eabf8cf605227a081403b7e15d5d2e278cefd9b515ecda82689c86d786,2024-11-19T21:57:32.967000 CVE-2024-10487,0,0,6432070ca0d8b9d5f61bfa9588afb65704f780affb8c7aeb91dd110781a88251,2025-01-02T18:08:38.297000 @@ -244726,7 +244726,7 @@ CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000 CVE-2024-10519,0,0,0f4b4a1e9d73c1dc5e7d90ae91171b7454c700ee85af6548970583aa8f68f73b,2024-11-23T10:15:03.600000 CVE-2024-1052,0,0,f9f471171db3127e337c7e7b487431751b54669175502f925317b3d80dbe42a7,2024-11-21T08:49:41.313000 -CVE-2024-10520,0,0,386d4a707205691aa7c18000d10d01ef790e0d155553598cc8ba9e672fac1121,2025-02-05T16:51:57.997000 +CVE-2024-10520,0,1,ac5bf6bb61b521c0246a0bde539bac91db0754416631e077f810e1376ff7a8e9,2025-02-05T16:51:57.997000 CVE-2024-10521,0,0,f7bfdcf48e9bf7480e023febd093f90408a44bab6aec43e2cc338ab0d3f56055,2024-11-27T11:15:16.377000 CVE-2024-10522,0,0,1e8d26a1978fe59d2c13acd7d1429d6305d44d553647bab9c6da717f248808f0,2024-11-21T13:57:24.187000 CVE-2024-10523,0,0,09a255d65c1c3e25b231ac7ea184bd30a4beb1072e5dff26cde68b295f46067c,2024-11-08T15:14:30.070000 @@ -244736,7 +244736,7 @@ CVE-2024-10526,0,0,902893a06c98ca080ca3096686c6505ee78209378b1d48cfc61b1cbf7bae5 CVE-2024-10527,0,0,20f6d41e5e29e0e302182412500b2eb2a130577c2466d9fefa23d1fc9b785595,2025-01-07T05:15:09.497000 CVE-2024-10528,0,0,f5c6e7473d1f4052ae5c878df5943bc6240b1f4930c345e8328b5391ac414231,2025-02-21T19:40:08.373000 CVE-2024-10529,0,0,09425f1304014f480214fdc78529d3afec9b9229f4210dd5066c18fb4e21651d,2024-11-18T14:59:15.043000 -CVE-2024-1053,0,0,bb64e743014ddcfb58751426b5176fb2a5cb635c0fdf6e950271139e7c33745b,2025-02-07T15:24:56.923000 +CVE-2024-1053,0,1,c6841c1ddac852dd77c14ab05f24c08070e9a2ec874e21a81d5331e84c83ccb6,2025-02-07T15:24:56.923000 CVE-2024-10530,0,0,4112225085ff11eb9d3986577f052980cdd1784e904f260f1a8f91c34b8e0d6b,2024-11-18T14:59:30.173000 CVE-2024-10531,0,0,2deb845713af637809ac307afe5dadb54a51a61b16e39c9bc4acb92824f662df,2024-11-18T15:02:30.197000 CVE-2024-10532,0,0,f3826ce705d2650c9f0c8c72a6418942413100eab375a8315e8ccfd6195f3c15,2024-11-21T13:57:24.187000 @@ -244767,10 +244767,10 @@ CVE-2024-10559,0,0,c8d062140f2ef6eed0dfc622284881dacca3b7549dba8d59c8cf3df34e9d5 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,8bc2c05db76aa376d335351430f1359bc8af3088a8d507bfe4a1e2db13ccce63,2024-11-01T20:42:12.303000 CVE-2024-10562,0,0,797cf6d554ba2a4f7d13cc51d352a15019c8c3fe24a53e57cef8fc7c31733023,2025-01-07T17:15:17.290000 -CVE-2024-10563,0,0,72fee93e019af57174fd88ce9b4f86808499c7746fddaaa2a08112bb4736f598,2025-02-26T15:15:20.480000 +CVE-2024-10563,0,1,4e593e37a3aa1652f5216139946bd89b7a3798f9797cb1cde919043c5c7de6a7,2025-02-26T15:15:20.480000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 -CVE-2024-1057,0,0,d08e7611ad76629cefd4343e87f43db05abd957616c37974b93a789bad69969f,2024-11-21T08:49:41.890000 +CVE-2024-1057,0,1,82d074eff87805c0c8af6f292d67be991df4f6c4e8e298eece318c63dbd97000,2024-11-21T08:49:41.890000 CVE-2024-10570,0,0,d14f79535077a039c8f0d0d1b0a6c4a3ac35cc316f33ff69affb05a342db6337,2024-11-26T06:15:07.880000 CVE-2024-10571,0,0,f71ab1f371691490f777d99e9ef171c06da239e7fc0febb0c87d28cd50afda7c,2024-11-19T15:46:52.187000 CVE-2024-10573,0,0,621e588bdb3cc973a61681ae42e38685083b0c2a5f1638656bd9e4586db91816,2024-12-18T09:15:05.593000 @@ -244824,7 +244824,7 @@ CVE-2024-10616,0,0,ee0bab9c7de4ecf011caf4e9e3507ec0a93ee1e9c437b0199981fce68831f CVE-2024-10617,0,0,157d39afc76a7e756125f0e5fd65ef6aa7c02a530c21e005d46cd066ede9ee14,2024-11-04T16:44:40.280000 CVE-2024-10618,0,0,2a9ab5d8bbe859eb6df2246cfb8a9a4db477c9f39a51123b223b1491a32da7a5,2024-11-04T15:11:29.697000 CVE-2024-10619,0,0,b05b0d57ba13664c548002f286babd5e260d83c40ed736c039406ce0b79d6488,2024-11-04T15:11:44.627000 -CVE-2024-1062,0,0,93332fe60f068e9cb056d0d2b6b480126af8205d38ab14ad34922652d0234049,2025-02-18T11:15:11.903000 +CVE-2024-1062,0,1,618adea4ebd3c3fb9922cdf7b7f0a8aa83b8ec4840fb289059aa1a2ce0c3cc2d,2025-02-18T11:15:11.903000 CVE-2024-10620,0,0,0eb14f482a9081e02d6a6fd26a889c7e6345aa78b9963ca02bd7fb406a22dbaa,2024-11-01T12:57:03.417000 CVE-2024-10621,0,0,e653f9c261d51ef748d8caf5df8f99c49516cc3db939e790a4d7a4778b35fb6f,2024-11-08T19:01:03.880000 CVE-2024-10623,0,0,6e237096fbd094bbf3471247b87238053c5a778164061b5929cdb16711f26aa3,2024-11-21T13:57:24.187000 @@ -244849,7 +244849,7 @@ CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d07192 CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000 CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000 CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000 -CVE-2024-10654,0,0,e3cfbcc33ef94eca80d8b53b9caeb5596b1d7a0b2d62063f923d2eb3b435f175,2024-11-05T07:15:13.730000 +CVE-2024-10654,0,1,db53840779ddec5f4fe97e0b88fdda120e99891fafcf9ff76f134451a0a61ed0,2024-11-05T07:15:13.730000 CVE-2024-10655,0,0,c1605174ca0bb72f5c9612ecc61dcf97fbbb993d8c4109db39f86f93e1de224e,2024-11-04T19:47:40.207000 CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96617,2024-11-04T19:47:22.733000 CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000 @@ -244905,11 +244905,11 @@ CVE-2024-10705,0,0,d9ed7dfbd93f39275a245485013f732374d0e600783f5361f2946a662c053 CVE-2024-10706,0,0,3ec222f321cd144b9747414b2388ca8377b75fdd1ec931604f451b9a1a761bac,2024-12-20T17:15:07.260000 CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000 CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000 -CVE-2024-1071,0,0,f4ef5362bcd385a9d4c19f21a338a83d3a6a22ac7f13dc59a18c514be6760305,2024-11-21T08:49:43.920000 +CVE-2024-1071,0,1,e6e66a31030e5d4a8e7e31d94daa1da52177a24d48ecbc959537586cb3124621,2025-02-21T19:33:40.050000 CVE-2024-10710,0,0,e03984cb3009dc782d788c1b806be248c0ef7aa6de922ac24071c55d616e1630,2024-11-25T17:15:11.747000 CVE-2024-10711,0,0,76ce467d174da0d662e335a35863791744767b2a9f1ee69eb1d3ac93a2b75e30,2024-11-07T17:04:37.663000 CVE-2024-10715,0,0,6fa55f97ae5fcd6312de37986afae22727e013700ca28ac779704d7aedf50d61,2024-11-08T20:25:37.380000 -CVE-2024-10716,0,0,d4b2bd656d2aeaba0bf8b13ed93373d563c5e9a0a6e4c81c71bcefdf1c6b4d21,2024-12-05T16:15:23.767000 +CVE-2024-10716,0,1,c2153701344046d494f0f702aee4feed8ee43de286126d49c0101c84f2bfca8b,2024-12-05T16:15:23.767000 CVE-2024-10717,0,0,0409fd2fec9c27a01b7762b7a1218f1a8d9b085105d1da44f396b6817ee08daa,2024-11-13T17:01:16.850000 CVE-2024-1072,0,0,072588b3ad9799dd1be77562cbf99842d770c415df8f6c79982601d36efe8be1,2024-11-21T08:49:44.053000 CVE-2024-10726,0,0,5475fa5549afc4fbef980386ad0c6e7a9aed370bbf8fee25547b92da6615d02e,2024-11-21T13:57:24.187000 @@ -244987,14 +244987,14 @@ CVE-2024-10794,0,0,6f8ceb4c0f98e6c8bc90c98ad4ecb0f01407f8f33a336410443b0ea0486c5 CVE-2024-10795,0,0,5bc2d3f4fb08450344d88a7dfba7a1c7679958fe7d3fce7094a4faa9172305c5,2024-11-18T17:11:17.393000 CVE-2024-10796,0,0,dda2b7fbd241d302e4d7fe3b0cebe9356d590a752fa7379cb5f8f9ccb23ef304,2024-11-21T13:57:24.187000 CVE-2024-10797,0,0,006c7677b07c5456cbe5c08179f34fd3f2028bc42d7da5ac2dc3b47f1c38f590,2024-12-21T09:15:05.410000 -CVE-2024-10798,0,0,a4ec29fda547f9767ac45cc18d8959d2aecc777ac38ec6aff74748b9cd7d6ef8,2024-11-28T10:15:05.673000 +CVE-2024-10798,0,1,5d4b738b5b2ad265237c3878d69d02e1bf080a6b19ee78883ba10a1e253f8b95,2025-03-04T18:19:12.327000 CVE-2024-10799,0,0,b7797680ead18fe1a9dbc326dcd7a283091231615844b518b1ae8761c552ffad,2025-01-17T06:15:14.847000 CVE-2024-1080,0,0,d419649d3c046728f86e0db4ac875d93585cb28b1dc1d2ccb108b64b9ccaec06,2025-01-02T16:41:30.747000 CVE-2024-10800,0,0,7c09a66fe19ec81d72fb3dd0d5d6c10275f9b97966090fbd36ca1fbb77eb71bd,2024-11-19T17:08:44.767000 CVE-2024-10801,0,0,2fc64baaadc32ead3d741647c105d1e5f90766977df6a21cbb5fc7403bd4ac96,2024-11-12T13:56:24.513000 CVE-2024-10802,0,0,b7feb7ebe52eb8db8a9baa996e86eced87d4bac434a7762e0015dc60993dd694,2024-11-13T17:01:16.850000 CVE-2024-10803,0,0,9af0bc02a023809c570b91b39f544b58f190424cc5b458e31af90eaf403aa364,2024-11-23T08:15:03.413000 -CVE-2024-10804,0,0,6d6819b56e10bbc10de9260f9481c4e27e1533fb059415e5563af82d7eb98f26,2025-03-07T09:15:13.340000 +CVE-2024-10804,0,1,224aca2863cf0726b0fb64a16e69ff9a8959f8484412effe4d27b5a78f4d5629,2025-03-07T09:15:13.340000 CVE-2024-10805,0,0,2dc6a50e2e5435811e45bd9587f57ddf8b9be0610ab96cbbf1bcea689c9000fa,2024-11-07T17:09:07.057000 CVE-2024-10806,0,0,ca9a68b781644596029c391d94444c2623bbc9374d6ff13368dfcdbd19e47ddb,2024-11-06T15:06:48.493000 CVE-2024-10807,0,0,3c2e744eeb3be7c153fe7764570a505425925f37863de8d29ad803fd6802e97d,2024-11-06T15:07:09.930000 @@ -245014,7 +245014,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000 CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000 CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000 -CVE-2024-1083,0,0,02d3e8f2ed4b6ae8468a8b61be1b5cf2101b027ce6de04f6b4f701c44dfe9c4b,2024-11-21T08:49:45.600000 +CVE-2024-1083,0,1,79156d1367776f4d20d6384b4d457002d1339967a843ba4dca88dafc27af4287,2024-11-21T08:49:45.600000 CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000 CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000 CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000 @@ -245090,7 +245090,7 @@ CVE-2024-10914,0,0,39a276f82f36a91e010722502bc5d8886eec360704c501aa8ecfcd8e9ec9a CVE-2024-10915,0,0,68a82fe4b392503ded9d3c9a1a33ecb75b64ce5b9688a8537852822fa25ab8a2,2024-11-08T20:11:10.973000 CVE-2024-10916,0,0,dbbadc49c06c450d0563acbfb5317dafa625bd4633965f94f3c2a276a36cede7,2024-11-08T20:11:37.567000 CVE-2024-10917,0,0,84897b64fd1cc994ca19c4da8d78c402e8655004c7da87e25c0ffb4739accfa2,2025-01-09T18:08:16.097000 -CVE-2024-10918,0,0,cbb0756686692637b3be1385334c9e456ea79d402786e94d28de15633c790245,2025-02-27T12:15:33.807000 +CVE-2024-10918,0,1,6daf10f4505eac892c43fbb8c7fc309d1bb8ac80de16b5758171b3ebe6265254,2025-02-27T12:15:33.807000 CVE-2024-10919,0,0,a4fca0ec7b6734cff3fedeb0fb3f65ce81b1ec36f208b75326910d75e57a0ca8,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,47c9be5ad5d6bfb5c86e50521ea7c7460de8f4234d2b7a56d90fcf159ceb457a,2024-11-21T08:49:46.720000 CVE-2024-10920,0,0,10997ab5881a5c9919878f73260180896111aae5947a3688850b9ce0368be18b,2024-11-22T20:05:52.530000 @@ -245098,13 +245098,13 @@ CVE-2024-10921,0,0,532a30e21aaece93c55687eae34d87e2044d8a94ef7a4b02c6829b158c4e0 CVE-2024-10922,0,0,42c13049e6a343c24626502c7e327925a85251677c778153d6b94466554f54c8,2024-12-12T18:15:22.627000 CVE-2024-10923,0,0,225760898dc6fbab011e0d0a07bc69513dc13006559fd556a531afd48981c97e,2024-11-21T17:15:10.053000 CVE-2024-10924,0,0,f1198492ea5d0448c480cfb52c449c77b28f46a760324baad7abe4da889f15a5,2024-11-20T14:44:47.350000 -CVE-2024-10925,0,0,71e9f7261bef551a60ac03df76c17104a2e931160ceb1ec52372df12d4d8c2db,2025-03-03T12:15:34.080000 +CVE-2024-10925,0,1,ec399ca0813b886ab7a47d5f93df7ff21261d906576c4837249abbab13e7cd4f,2025-03-03T12:15:34.080000 CVE-2024-10926,0,0,e76d1df664d864e028d7e7974d5a29e3528a8f4547669cef248ae31c5c23a1e6,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,51dbff092839b5cdc766883cb457518cde87efb23eee9d8146d4558d0c340521,2024-11-22T19:14:48.190000 CVE-2024-10928,0,0,ceaf3b03b939bd800d5c1c0e8522d8c6c53e642e161d3e2104c315d8f30327a7,2024-11-22T19:10:19.290000 CVE-2024-10929,0,0,5249104b33f81585f5d79feff2e8cc0afe8730a77942ffeae12c6a983d8dd86c,2025-02-03T15:15:16.143000 CVE-2024-1093,0,0,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f747481a,2024-12-23T17:03:58.370000 -CVE-2024-10930,0,0,e3fa825c0a5cec409eb003d6a2b8bbe64791576eb4f54ac4167ca9175ba914a0,2025-03-04T18:15:23.610000 +CVE-2024-10930,0,1,c993d02de50198cb716d452a34e4fa773c0b78d01649128b3c9112b451fb564d,2025-03-04T18:15:23.610000 CVE-2024-10932,0,0,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000 CVE-2024-10933,0,0,290d54a194bd2d10a18db40a4b1aa6a391e3833a1d9eb9c0bad921d0d66d51cd,2024-12-05T20:15:21.417000 CVE-2024-10934,0,0,1ac6b03ca6c5955124da6cc79ba064edeca22e200355615d5f571464ca4e3256,2024-11-18T17:11:56.587000 @@ -245127,7 +245127,7 @@ CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 CVE-2024-10960,0,0,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000 CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000 -CVE-2024-10962,0,0,3746ecd0a7c5b8aca7620f7fa6289bd5401c0cc211d5caabb88f17feba18b019,2025-02-13T19:54:22.130000 +CVE-2024-10962,0,1,36368390dcd6472408cc7ff615d4482f34b62d3817e0750c7f8c0fc406bf24c4,2025-02-13T19:54:22.130000 CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000 CVE-2024-10964,0,0,62ffc2aab1d6c4d5455e1863c3e06b146262f6a10b7e420017b3bb6a884951dc,2024-11-26T01:36:31.033000 CVE-2024-10965,0,0,cb2c2bb568c5076e26796864ee70805f131ea8661b84c79073507284721ec93e,2024-11-23T01:45:14.267000 @@ -245192,7 +245192,7 @@ CVE-2024-11029,0,0,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62ab CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000 CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000 CVE-2024-11034,0,0,3ab7c1e6f92ed311ef7c84bc99d8afea9fbbf7ceee2269128230e97b66af0fb8,2024-11-23T12:15:16.090000 -CVE-2024-11035,0,0,e116ea7bf6efc76b9fedb36d61f39965068a01b85d4a74c57dac256bea83dfbe,2025-03-05T18:15:36.523000 +CVE-2024-11035,0,1,712150cca938636156d26755b4d0f753101bc8e76045f65ea5d6ecc8468e6757,2025-03-05T18:15:36.523000 CVE-2024-11036,0,0,cb568211d88e95057f50625b3b2d9e73f075acca4f066000c5f19e1ceef18c3a,2025-02-04T15:44:41.967000 CVE-2024-11038,0,0,b081c95425ffdb28a4796f93241b66af2f4b7d8ba42742ef93d502aa5f9c9555,2024-11-19T21:57:32.967000 CVE-2024-1104,0,0,1eae50c75d8d746ca0f746c7f8113a7b95b6cc5ee3b09f81f9dcc34a01c59d82,2024-11-21T08:49:48.370000 @@ -245282,10 +245282,10 @@ CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51 CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000 CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000 CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000 -CVE-2024-11132,0,0,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000 +CVE-2024-11132,0,1,0312d3d797bb5460aba64d8d401d63183373de47d488e76f3126b4c392de5cf6,2025-03-04T14:53:43.637000 CVE-2024-11133,0,0,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000 CVE-2024-11134,0,0,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000 -CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000 +CVE-2024-11135,0,1,a54a4be1e130e3ff63b2317724c9857476d335893d3e9fe3ef63d1cf7004be5f,2025-01-30T18:03:45.843000 CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000 CVE-2024-11139,0,0,2d6fd6ceae8e9f801cb28510138174f054ac674fa052625032eec6de670d70fb,2025-01-17T09:15:06.370000 @@ -245299,7 +245299,7 @@ CVE-2024-11148,0,0,f1a9b14e986a1cdbe7196e88d3aefe9d741f79a0512dc67842ac7d7556ea6 CVE-2024-11149,0,0,8ad93fc62008b87e3a1f42f9b1f7c4174a7c4102476e1865f181fd8fd630ab52,2024-12-06T02:15:18.127000 CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1bb8,2024-11-21T08:49:49.887000 CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba9086e,2024-11-19T16:57:05.407000 -CVE-2024-11153,0,0,11f526a66842234fb7480415b0e2ca7bbb8c158ecfa0ce80b582af047f25caf6,2025-03-05T12:15:33.287000 +CVE-2024-11153,0,1,c523f41a40bc2e1e30a124e80d31783bc9d0c5146d6445a46b0d9a152b187fc7,2025-03-05T12:15:33.287000 CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000 CVE-2024-11155,0,0,b7062c0b399995063fe2a625442bd6626c60aa76fcb13e89717b66c8ebee721d,2024-12-06T19:15:10.730000 CVE-2024-11156,0,0,ea1fe2a973d15fdece4824e57dc16a1bcfe810ffcf2d9b4d711f82a25c787244,2024-12-17T15:52:01.670000 @@ -245440,8 +245440,8 @@ CVE-2024-11312,0,0,39341cdfb0c2357e4490f03c965cf4d82efc14956d0fc1a18bbb5519d5808 CVE-2024-11313,0,0,edab9cbd57c169f59ce6541de27f2ded52d60a092858b70f9fd9a567a3f80efa,2024-11-20T15:16:41.033000 CVE-2024-11314,0,0,b137d108dccef1c6c90a4a56585943a065507f9154243875c09e4fe4884bce25,2024-11-20T15:16:25.653000 CVE-2024-11315,0,0,bf2744e6d3b5f23e81b63e95d8d56502188adbf5a1fdde6c469634e9c9d4f142,2024-11-20T15:16:14.550000 -CVE-2024-11316,0,0,0317731372d8339d98713620d1f09ef5f7755aeb8b3c15f2a00ca7d258944886,2025-02-27T15:45:57.977000 -CVE-2024-11317,0,0,31e80f903d773d273b03b1bcdf68980d2f15e3df4904e4994c902668af58942c,2025-02-27T15:45:57.977000 +CVE-2024-11316,0,1,abf86571bc32651228aa75135041c4c65ae6ac483e97f14aac4046da1a52503c,2025-02-27T15:45:57.977000 +CVE-2024-11317,0,1,e836d850ffa9e860d3e829ab7e11f2dfea5530a499be39794906bb6ad46dc866,2025-02-27T15:45:57.977000 CVE-2024-11318,0,0,d4596db364adfba88de2cc26a8c2010c2c8d0e697b088995e2405c7c72d9afad,2024-11-18T17:11:17.393000 CVE-2024-11319,0,0,b2525c1047d7ff1bfba18dd4732d0fdd16b37c4c17410be8f3cbcdb9380d2e56,2024-11-21T08:49:31.873000 CVE-2024-1132,0,0,64c4b3a1b0ca764dc48eff5cdafebd13449c822d7cb009b4886f58138464c117,2024-11-21T08:49:52.017000 @@ -245487,12 +245487,12 @@ CVE-2024-11356,0,0,055bf672f604dcdc8d6666a8d1ab8977bef4c45ecbf5b807b0a3571f26f3d CVE-2024-11357,0,0,c9242aa772722c211ce775905a0ef680d219236224c3a3aff0231e5f2c6bec72,2025-01-06T21:15:13.853000 CVE-2024-11358,0,0,47cd4959cf6059d3ce512e4a70aacad449e0c8fa7c946c06b27cb8a531be2885,2024-12-16T17:15:07.543000 CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000 -CVE-2024-1136,0,0,d7ebb7600523d7beadbd45476d20c6fd58c2d254f35f6afd70e841e7af6f5511,2025-02-07T17:32:39.080000 +CVE-2024-1136,0,1,2d493c9732db16a3792b02aea5b1c76a8310e0b62ac9ac5375d40663f9c43a0c,2025-02-07T17:32:39.080000 CVE-2024-11360,0,0,659b24fc81e4938ca0374fdfc531183f0da8359af24c60f66cd39ca705cc7b8c,2024-11-26T17:36:08.113000 CVE-2024-11361,0,0,a258bcb3f99fb669d7603f67eec83a19db748f78307acdbf1ea168f7db1a2de0,2024-11-23T05:15:06.673000 CVE-2024-11362,0,0,600c443b489e86c090d64bcffdb5d5e1bea467b36951abaa22635fe3a3274b4a,2024-11-23T04:15:08.617000 CVE-2024-11363,0,0,3d278edca29c5b7190896835b6870c778a4e33238dce13474ce4c1f942cd43b4,2025-01-07T05:15:11.713000 -CVE-2024-11364,0,0,7444b36193738a29298650979282d67d415aac470c0f1bbe244265e0eb7b19e3,2025-01-21T21:26:21.980000 +CVE-2024-11364,0,1,bc48bbbbe108c953709358c761b9e8370ae13393775969c361b628a15265b58e,2025-01-21T21:26:21.980000 CVE-2024-11365,0,0,0e66126dac632663f20d3d9475ab7eeeaaf1783cab23902c99ae23613a9ecef6,2024-11-26T17:43:23.240000 CVE-2024-11366,0,0,eac89358fd6d61e1ab632fc5133430774b50e5a3fa0dd5cf3b695ea3fcce5bce,2024-11-28T09:15:04.313000 CVE-2024-11367,0,0,eea02b3c7a7e23b6b50200379882a96782686712f1c754d90239651a5f9c3034,2024-12-07T10:15:05.453000 @@ -245701,7 +245701,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7 CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000 CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000 -CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 +CVE-2024-1158,0,1,ad9d5682c34a625ef9ba2b2db44b1ff292a1ce3bf02e19968ef34d4e9784a17b,2024-11-21T08:49:55.723000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000 @@ -245770,7 +245770,7 @@ CVE-2024-11647,0,0,49b1f02203a27238e643ddbb2fa74f7f6e7b302d72e3a13c67dd605295332 CVE-2024-11648,0,0,82f759d84b97f68575e83d0cfd08d0ddbff984d3824063b459f70293e47d181c,2024-11-25T16:49:02.417000 CVE-2024-11649,0,0,b5b6f917e19026b29ddda85bc908a7418eb5359b77bb916c7cff3d80345a4b89,2024-11-25T16:48:37.237000 CVE-2024-1165,0,0,147ae82fc7da12f28aa758dac0e9f077423e57773054525f0229107e43220ddb,2025-01-16T14:48:55.897000 -CVE-2024-11650,0,0,b8e03f6ea3587f8f060e83795a50c6b5de49ea913ff66aa1154f7124c7e320b8,2024-11-25T03:15:06.707000 +CVE-2024-11650,0,1,d7c9adb2cb0371f0eb99a3a6a163d36c12d12b81d5d620c20d59bf9f3ac440ed,2024-11-25T03:15:06.707000 CVE-2024-11651,0,0,7c0a0a1f134059103424229176b5d14fc86abf94b16628b0a08d196ab1cf7d42,2025-02-12T15:33:04.513000 CVE-2024-11652,0,0,42d6cedcc76cdadb703fd2197cc58032951f64cf6629d0acca6e9ab9f6ac2c96,2025-02-12T15:32:54.593000 CVE-2024-11653,0,0,831546e5982f1664bda73bc8ce4072c0ae32c23f7dd058aab567730349fa205f,2025-02-12T15:33:07.360000 @@ -245856,7 +245856,7 @@ CVE-2024-11728,0,0,5e9159dace0814fc830296f55a0ef2bdfd45169f1876af9b643a1fa92428c CVE-2024-11729,0,0,caceb42e577677b25830d89e8b00977431d6b11836cf2743d53fd41981238f7f,2025-02-05T14:43:07.597000 CVE-2024-1173,0,0,09593502756eff2c1a7f19d3864d082fe5b606a2b3bd8feeb9fa5c26088825cd,2025-01-30T15:55:07.793000 CVE-2024-11730,0,0,66d346922147603139b8a4c96d43965a67c99833d69103da415f26d21f19a6e2,2025-02-05T14:41:42.507000 -CVE-2024-11731,0,0,fa1081a73fa42b77d748f5cc43d66fc2996e7cb469f30ade5cede49dca150ca9,2025-03-05T10:15:10.123000 +CVE-2024-11731,0,1,5165b2bf8b8ef46b9e3ba3a72b83a26cf55c7e6e4f5d859d12119f4cdae4a03d,2025-03-05T10:15:10.123000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 CVE-2024-11733,0,0,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000 CVE-2024-11734,0,0,78c28d43096a77334429bffad85c310a594f71e1430baf5f4b291aea9769bdcc,2025-01-14T09:15:19.443000 @@ -245885,7 +245885,7 @@ CVE-2024-11756,0,0,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186 CVE-2024-11757,0,0,1bc7aae07622ccc6a4b7076dd363e7b8ecfc55de5a0f36b46f6f6ac7ac916966,2024-12-12T06:15:21.367000 CVE-2024-11758,0,0,c32ee02602910c5ac293545d61aefee90e1f292d1954417a6b34c8176d0095b9,2025-01-11T08:15:24.020000 CVE-2024-11759,0,0,721c2f6fdff65f13ac54d162c1b8bb0f862a88123dec2155aa18c28dd98f712d,2024-12-14T05:15:07.287000 -CVE-2024-1176,0,0,ade3cc69c20caab05c727481cc0ec5f568a186d8a0d855f0f768d9d6ccfee82f,2024-11-21T08:49:58.123000 +CVE-2024-1176,0,1,91c816bf297ee58fd7015d1e0d3a7397983665e0e942ae8a0f2f246aff82f52c,2024-11-21T08:49:58.123000 CVE-2024-11760,0,0,72a8fc65de07cdadf0a0f6ed904fea74fd9bb6ba4b9fc9e5c352d9cc3a548975,2024-12-12T09:15:05.040000 CVE-2024-11761,0,0,d23dfba4fec168c27495db29e782d019068846a5ade59e5c067fdb06c9bbac7b,2024-11-28T09:15:05.090000 CVE-2024-11763,0,0,2cabae83986b97ccbbb010b476c687fe71b13b47af24d4118c20dad8b77c1714,2024-12-14T05:15:07.457000 @@ -246075,12 +246075,12 @@ CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103a CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000 CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000 CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000 -CVE-2024-11951,0,0,e9883c17437e660660b4a15b0609483f54271d2d34fa6ff9c1f8df9c2fbd0648,2025-03-05T12:15:34.510000 +CVE-2024-11951,0,1,90960a2f11cf5ceed232dfd5cb39b69832e73ba69d6ab2337e15a2af2936fbe8,2025-03-05T12:15:34.510000 CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000 CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000 CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000 CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000 -CVE-2024-11957,0,0,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000 +CVE-2024-11957,0,1,7bfa9aa55447f89c7b433c26ddfb54a92fcf0551cb888ecfe0ba18871a480597,2025-03-04T16:15:34.927000 CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,98cccdbf2a56893ba844e9a27d11d8e19b411cb229a2ffc9fddc1d1b0c64d4ba,2024-12-04T16:52:34.413000 @@ -246145,16 +246145,16 @@ CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d724 CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000 CVE-2024-12027,0,0,37ec4b44c0b83690aba6eca2d38a4a49f2c2ce6081a618c323d63a584206d2b7,2024-12-06T09:15:07.803000 CVE-2024-12028,0,0,1e73c6e2445828811f3920b16dca38e7a1768853994affcbd716568d4e1eb5f0,2024-12-06T09:15:07.957000 -CVE-2024-1203,0,0,d1f896c2674b7d8b8ac7ccf181e7d9a7e598afaaabec693045eb0f85d52368c5,2024-11-21T08:50:01.913000 +CVE-2024-1203,0,1,62e8d24bf392fdd92a86a0e12020dacc9327613fec64c7cc3676602016852b26,2024-11-21T08:50:01.913000 CVE-2024-12030,0,0,633ca7a3425faa5b5a93791f3995170d2fcdb119b1db9d857bd30098b3b2c0d0,2025-02-26T18:25:29.120000 CVE-2024-12031,0,0,d30b745c703c186af9776c88e8d0d222bab220bbc78efc5ddb772b6e524ac88f,2024-12-24T10:15:05.580000 CVE-2024-12032,0,0,d28549d87ab7a1da8c8e60b219695b8c0bac78074e1f07aa186ddc87bdbbdb60,2024-12-25T04:15:05.497000 CVE-2024-12033,0,0,5cda97496640b0b6aed202f7b1c5b5c1b99afbb11db7e6b9c1179f2506c52c5c,2025-01-22T17:16:45.530000 CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4e3e,2024-12-24T06:15:32.553000 -CVE-2024-12035,0,0,832f632f655d1a25310b340fa234ea02b49e8d284b8fb91f64f6c10350a9a2ed,2025-03-07T09:15:14.387000 -CVE-2024-12036,0,0,527e89749c64c19795a9a772b6c673761d8ae2eb5e99533d01d58659c5e1f700,2025-03-07T09:15:14.547000 +CVE-2024-12035,0,1,0e4f2c7df03c713c27d221c04f0581428bbafa68a8b52aa56bad7e66be1dda8f,2025-03-07T09:15:14.387000 +CVE-2024-12036,0,1,83a7fe0c654cdff06a8fc8f2f7a15b4ad8039b8632fddd1e5640f95a9bdf2a79,2025-03-07T09:15:14.547000 CVE-2024-12037,0,0,a5255c9116afe4d4a53b9c568ed836bef1995aac7d6a54fa894f842257c6e06a,2025-01-31T11:15:08.517000 -CVE-2024-12038,0,0,38483f18090ee568127068c3ea45622fdf07bb2c4bf7a5014b457de42945c6e7,2025-02-22T05:15:12.020000 +CVE-2024-12038,0,1,537ac27141b3696d716af7aa5c3f67a1c8139093785dbedc3c7fd93b5c0face0,2025-03-06T12:42:22.567000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 CVE-2024-12041,0,0,c51c944b4ab8d6d44c0744754eaca5881989f4294856b597a5c3096c28461e59,2025-02-24T16:05:18.207000 @@ -246171,7 +246171,7 @@ CVE-2024-12056,0,0,10d9c36bf9a3ef7782963e14177fb1a983e8eb8ca0a779264b8a46bf859b2 CVE-2024-12057,0,0,ce7f3a57942c75009ffa01267ac1957bfbafb0b76aaba9d30fe117abc212dfe3,2024-12-09T19:15:12.750000 CVE-2024-12058,0,0,30c22f7be7c3f1b207f93ab8480a170bfa1d3a5ae9ab44b79f749c82b604db70,2025-02-11T16:15:38.663000 CVE-2024-12059,0,0,8b40a19eba57d179c7b6b201e122af3e3490fc5aa386acd7b4e86d1b63559be8,2025-03-06T19:54:57.093000 -CVE-2024-1206,0,0,65bf1c4d8e30d73d5e9c6bb1e7a109c9fc8e4ba9e642b51fc692775f81e5075d,2025-02-26T15:14:42.477000 +CVE-2024-1206,0,1,6c9cee8919bfa6a9e2d0088b475b70291814d91ec3c76d5714e58e006fcf85af,2025-02-26T15:14:42.477000 CVE-2024-12060,0,0,00194c71df08040c99f5a5536b3c32fccdf95c506294b164954268126957b170,2024-12-06T09:15:08.117000 CVE-2024-12061,0,0,e705f6d208be0412d9e4e1ed849702d7bdef1edc0803b726bf0fe97bd2731f5b,2024-12-18T04:15:07.500000 CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611c2f,2024-12-03T10:15:05.493000 @@ -246203,7 +246203,7 @@ CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba4235099726 CVE-2024-12094,0,0,6dd85a9b2557f08ee364682e83ba2b4a96df650121716b26f85951e9de06f6f5,2024-12-05T13:15:05.923000 CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000 CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000 -CVE-2024-12097,0,0,f0fbc9cab5ca704ee3f0fcbeb9df9f3077c0ffb3abbe086aa053df92f7b5e220,2025-03-05T14:15:35.280000 +CVE-2024-12097,0,1,85cd84cf9a01e4b9f7871341f32f595c0cd184850137238ae99d33f72ebc978f,2025-03-05T14:15:35.280000 CVE-2024-12098,0,0,cfa03906537e6957dc74f6fb1d7564d835cb1a36c16bba952c18f41c644686c9,2025-01-07T04:15:07.837000 CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000 CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000 @@ -246245,7 +246245,7 @@ CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408bcb,2025-01-17T11:15:08.683000 -CVE-2024-12144,0,0,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000 +CVE-2024-12144,0,1,57a26cdef423224d2b72e184a74ec6f6a96afbe34b46f40d907c40c0040cf4d2,2025-03-06T14:15:35.297000 CVE-2024-12146,0,0,512abd5fc04925787d0e14e872b64baa6991ccbf60d90df7c70ff4e2902133ac,2025-03-06T15:15:15.137000 CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 @@ -246378,7 +246378,7 @@ CVE-2024-12276,0,0,e5bd927071e71d6948c4a1baa287eb37d95c029623029cf811ef1986567a1 CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000 CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000 CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000 -CVE-2024-12281,0,0,69dd31685f0952daaba34ef0bc28dc9dff9bcbebbbb3027cc1f38a03e65ec354,2025-03-05T12:15:34.657000 +CVE-2024-12281,0,1,132d9f66cbf3f1830c2112b30d8c9de038a46088d6b3905ed97a065702db1ffb,2025-03-05T12:15:34.657000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 CVE-2024-12284,0,0,58f0822b9c3e54960af89f6bf167625557218b7bd5211a87b1cc3ca0764a5320,2025-02-20T00:15:19.360000 CVE-2024-12285,0,0,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000 @@ -246409,8 +246409,8 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12314,0,0,f5b2e81c5ac59534c8eb1678a7baa18417da80eb088e32734ae876d30b905223,2025-02-24T12:40:54.730000 -CVE-2024-12315,0,0,a97a535c03f5448561beefff84b08b5f4b4d8493e30a3126dc94314d3ca5db05,2025-02-25T19:37:04.210000 +CVE-2024-12314,0,1,32893a8e50468fd63db91a38156927727292dbb928ea3bfa330200af4c8c85a2,2025-02-24T12:40:54.730000 +CVE-2024-12315,0,1,5b1d7a035681aa6fee4594ba77521ed3e77b4b26639ee1bc2978073f4ece9590,2025-02-25T19:37:04.210000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000 @@ -246425,7 +246425,7 @@ CVE-2024-12328,0,0,34661052bfc4345d9d8ebac2e6c28c5ef38cb920ac58fb144c97623104a72 CVE-2024-12329,0,0,66dd2e3f2af8b0b1aca8274acaafc22644d93ff908c884984769d59605f22905,2024-12-12T07:15:10.607000 CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000 CVE-2024-12330,0,0,dd38f32a8fe1201123bcdc5b82b5d883712c2acc7974b9580df0e29bb65620cf,2025-01-09T11:15:13.090000 -CVE-2024-12331,0,0,6542f4505ef6c7be7e960f6456d88c2eed55e3608a59347acbf70a309c9609eb,2024-12-19T12:15:05.330000 +CVE-2024-12331,0,1,2f0b30f8c9bb2efd5069eaaf78bed38206c9f839c8397bd6ed16f7cb9903283f,2025-03-05T18:25:53.837000 CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4dbf02,2025-01-07T05:15:18.687000 CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000 CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000 @@ -246511,13 +246511,13 @@ CVE-2024-12423,0,0,df2227f1fff48af0129a6b0a667fb7c3072c1a1dd75c0e4da9043c67a4fe7 CVE-2024-12424,0,0,f012365fc62da2fd3696c6b797cf671e0678d4f7985e72e9bb552e76b87629fa,2025-02-25T15:15:21.273000 CVE-2024-12425,0,0,3ccdf8b70670bb6b90f5e431cd1875b778c15ae371b2f30059bd6c53cb57dd2d,2025-01-07T12:15:24.183000 CVE-2024-12426,0,0,e28649f93ee0f137724688a87f52bd9672834bc574f6f02af35105ba38dadfd8,2025-01-07T13:15:07.210000 -CVE-2024-12427,0,0,6cea0d30fbb2e9b387ef815a915279ba96de35274c11af6917be498e62c76e38,2025-01-16T10:15:07.243000 +CVE-2024-12427,0,1,4f74eff8ad1bdde3ba0540d546efadb072b967b36c1b91f3d072cf971c6e062c,2025-03-03T17:42:59.740000 CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000 CVE-2024-12429,0,0,df12f7abbef94c2382f1dae8fbc46ef25fa72524515700b274279ec69b985d4c,2025-01-07T17:15:20.527000 CVE-2024-12430,0,0,3623fd73564e8c219fafc425eac3c2c16708d4d7c0f61297e30059f08601a297,2025-01-07T17:15:20.703000 CVE-2024-12431,0,0,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000 CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000 -CVE-2024-12434,0,0,2273b918dae5b55cd16b3cc151951bd0e7df45a5e3fba06bf14f2534f4e07a15,2025-02-26T13:15:36.353000 +CVE-2024-12434,0,1,6640483b91d255da6a25da08b26b5b4b64e87cf2d8dfcfd6973bf408a6fb7b53,2025-02-26T13:15:36.353000 CVE-2024-12435,0,0,65c9febfd7a98604817f1773ea0e55d32e0aa4a74e94909e5aac719a650b91da,2025-01-07T05:15:18.887000 CVE-2024-12436,0,0,704b432cc1e2593602ae5eed271ad65ad5503f2c447d8158b7293302d68a646c,2025-01-27T20:15:31.910000 CVE-2024-12437,0,0,eee25a62335cf81a7c9a591afa711efa0cfca8bc43291f7331a8326f931a6036,2025-01-07T07:15:27.127000 @@ -246548,7 +246548,7 @@ CVE-2024-12463,0,0,a9c1dda3e8213598a6c7ff5fed690f173bebe26549f8b94df4160272e828b CVE-2024-12464,0,0,ffa0068749df08a838ed800b533933f2488b98e069e2e1b69fda93eb15a6a6a0,2025-01-07T06:15:16.823000 CVE-2024-12465,0,0,71cf8d099f9bc4306dd9d21cf13805ebee4cfad62908f99a6e3f6ef7ca285117,2024-12-13T09:15:09.060000 CVE-2024-12466,0,0,369177d07ca1cb0a3b591825919acf924d5b626f9b08c6179162f7635f26fea9,2025-01-17T07:15:26.203000 -CVE-2024-12467,0,0,aaf430a809f27ec59d7a9ec526884a8c28f4db43eab618696824ccd2ff021ad3,2025-02-22T05:15:12.223000 +CVE-2024-12467,0,1,ad3f57b0a5b38e8c3bc64ee5937a7843ccab3ac2ccf610b1144e3dd1d913d9b8,2025-03-06T12:42:22.567000 CVE-2024-12468,0,0,5b79c44cf0c68a832dab6fa7c437199e0d8595bd9eb57270f72054b7ab2a8f3f,2025-02-28T23:09:22.380000 CVE-2024-12469,0,0,871c3c1e000bdae5610f745ffefecdbdcd7d22ba906daf923687641c197ab750,2024-12-17T10:15:05.997000 CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000 @@ -246625,7 +246625,7 @@ CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000 CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 -CVE-2024-12544,0,0,ce87bf4ece42937bc16f571f658e1c8e9a7c1ff0a880f2094d5af2754f9efe7a,2025-03-01T08:15:33.367000 +CVE-2024-12544,0,1,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000 CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 @@ -246684,11 +246684,11 @@ CVE-2024-12602,0,0,6a6f401c6c4934c31c54c267328b5cfeb9b2f93f94e5b5a1cce33d5e69f20 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000 -CVE-2024-12607,0,0,e788e45247f11597de4968f2eba74b7ff2962ec5587b934e4d50406a934b4b91,2025-03-07T09:15:14.700000 -CVE-2024-12609,0,0,5b64b63339da3dca48b320415480314e778114ea60f11a9972a0c0c8bc852a15,2025-03-07T09:15:14.860000 +CVE-2024-12607,0,1,a778c1b19df180457278323673004b895cd04ef11611b1a21cf7e73706325fb5,2025-03-07T09:15:14.700000 +CVE-2024-12609,0,1,491936f3a64cd7fdef668b95219ea665ce9c1e188a4cd36fda24fd6be3ab4dc2,2025-03-07T09:15:14.860000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 -CVE-2024-12610,0,0,c55489d0c972c6513ed59f81db8f565b608d7825711a3af76ad47cd21211a641,2025-03-07T09:15:15.017000 -CVE-2024-12611,0,0,4c15ff06649cc824014083c4b8f4606a58b41bf224a708c03a990c62c40cec67,2025-03-07T09:15:15.177000 +CVE-2024-12610,0,1,7e3f4c71524b619ca8d4939559ab6c2452604d83e1e85820a3a8957f9ca570c5,2025-03-07T09:15:15.017000 +CVE-2024-12611,0,1,da4731f2f87c2deffafe6048bef2f27ce64b38f9efdb7c47efec3f82c77e49dd,2025-03-07T09:15:15.177000 CVE-2024-12613,0,0,7dd856ce73c7c9a995010e01aad16c5eee77060b0b2db6bbab6d0cdb4cee95e9,2025-01-17T22:17:16.967000 CVE-2024-12614,0,0,85c73f48edb54993612da38f79df29849481d1d0bbf1a99bc0613daba18ae317,2025-01-17T22:17:15.190000 CVE-2024-12615,0,0,6e994a8d3113ca6f9de4c4e061e53b865bfdcf07b29aa5840c39b6ffd2b32fac,2025-01-17T22:17:11.650000 @@ -246707,7 +246707,7 @@ CVE-2024-12629,0,0,f532a520a581ddf0c516adb9414295f4f858c916587b9f64329a7582075fe CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 -CVE-2024-12634,0,0,f10a540fd7d1d42a863c76a8bd14ac2ffa306f910c9d2a1b8195a58ef5e569eb,2025-03-07T11:15:13.850000 +CVE-2024-12634,0,1,bb29456e087fd679e6c8701d73d6a8a1e156a69629e500ad013b7937ad9d8431,2025-03-07T11:15:13.850000 CVE-2024-12635,0,0,2a325e98cbda67c00c030c21ba55b3112e33b0ca1b057b51b762d0242d635903,2025-02-24T19:15:05.587000 CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000 CVE-2024-12637,0,0,0a511df96db32a9b14e55f4c161efe09af214577bd9827e9baeb5f267eebf5c8,2025-01-17T07:15:26.773000 @@ -246723,7 +246723,7 @@ CVE-2024-12647,0,0,097229fbc22a476768b6d005bd091a1df5d7c888609e99d7b0178db2af7e0 CVE-2024-12648,0,0,f7105fbfd47374a1794df860725a9911e48791c9ed50a1aba7744dbecb1d01d1,2025-01-28T01:15:08.700000 CVE-2024-12649,0,0,e7a3943e3bdcf0ae90e97fc59e152e3a3496d0b67d2aae6d30f2c730ae8aee45,2025-01-28T01:15:08.823000 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 -CVE-2024-12650,0,0,d053b6261299479d23db53f81d49d03fe3c0125bb240ae71049339dcc113149b,2025-03-05T12:15:34.803000 +CVE-2024-12650,0,1,34a703a74a03f068bb268272755dc767591bfd36da1279142a482a92fe18d99c,2025-03-05T12:15:34.803000 CVE-2024-12651,0,0,837aacbe578de000aea5728f06a396783e15fde3692a8a521fed4e89c370dbc1,2025-02-14T14:15:31.487000 CVE-2024-12652,0,0,7f5cf7f8bad74d2992fb68b5b70492ca046a7d5637ddd855697e567c2221bb7f,2024-12-26T04:15:05.660000 CVE-2024-12653,0,0,5da61cf03f4157427ca9b9c8435df3b2d30c5b41ddc62a189ca0d7a75c1c8975,2024-12-18T13:53:28.700000 @@ -246787,12 +246787,12 @@ CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686 CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000 CVE-2024-12731,0,0,9ead76fed676036ea4435e20b944f4e5fd453782f229b14d9e0b35b47567c8dd,2025-01-09T16:15:36.527000 CVE-2024-12736,0,0,27dc2dca8ca80ab2c2f7728100c1c2ef462b0b1d9d1f7583591ae4131d8f4fb2,2025-01-09T16:15:36.680000 -CVE-2024-12737,0,0,a6adf5e540b09bdc733872b9d233f877b765ec18a0eb9531ff632a2ab2ccd57d,2025-02-26T15:15:22.363000 +CVE-2024-12737,0,1,c553412f8547626ac6415dc6171d111137c4bb469993894078556f9de4d9a57d,2025-02-26T15:15:22.363000 CVE-2024-12738,0,0,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658897,2025-01-07T13:15:07.357000 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000 CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000 -CVE-2024-12742,0,0,b1b5177f24d796a05ba85af261155fd9d40463bd10b9762f91a27ba214cab5e2,2025-03-06T17:15:17.740000 +CVE-2024-12742,0,1,585984e2f53d23e5a2e5d8f6c2e3627ccc17d0604bc97a0fb417773511041722,2025-03-06T17:15:17.740000 CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000 @@ -246834,7 +246834,7 @@ CVE-2024-12793,0,0,26c5bed7dc7fb3941e0dd492fd9b824242ccc2a6944616404398fdcebdfd5 CVE-2024-12794,0,0,6bb67958621fa403e9f361b5ad08b405e435c9a95ea0caa583a82467bdddcffa,2025-01-06T14:40:23.127000 CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 CVE-2024-12798,0,0,488a2c4e7527f89aadf88a0b958da900c0b1ca920e367bf77296a8bbc1acc4e9,2025-01-03T14:15:24.370000 -CVE-2024-12799,0,0,1dca9138b488b748cfaef0f9618cb6f28ee1e7f5e5e00f8a3b4908730a7013f9,2025-03-05T15:15:13.127000 +CVE-2024-12799,0,1,312fbefaa4d6ce5e1333c0d2e98716e4cbc61b709083323894391ac7f914e744,2025-03-05T15:15:13.127000 CVE-2024-12801,0,0,8847bb4162cad8847e95f5d549749935a98cd5eaeb3583ac43cc5f1acc6c369c,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000 @@ -246842,19 +246842,19 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000 CVE-2024-12809,0,0,314a9a253eaae4362d4a78cca74afbfdb258ff23c3edc47ccba96245196d2d9c,2025-03-07T07:15:21.380000 -CVE-2024-12811,0,0,7b65aed7c38336017d2295502f243dfa9e67fffcf73b1c7d1e13c0db617852f7,2025-02-28T00:15:35.790000 +CVE-2024-12811,0,1,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000 CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 -CVE-2024-12815,0,0,3b2ba5b8c2b3264395cc1bb7b90d5a5255aaeb67f7649b89ead6051135f61295,2025-03-05T10:15:13.563000 +CVE-2024-12815,0,1,ac1b5fd16fe89e0acfaf3e0fde8a207473adf78101c38f3c13b642eb60a68430,2025-03-05T10:15:13.563000 CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000 CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000 CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 CVE-2024-1282,0,0,8aae000f2e1b957a732f4d9da1a09c6a0b5f298af774808a4763905b81f69a99,2025-03-04T12:24:19.653000 -CVE-2024-12820,0,0,e360640a03322169bd3f6f06c3ba39e6c3f29a8f90c8d81b8f4979e1e5e53133,2025-02-28T06:15:24.903000 +CVE-2024-12820,0,1,42074797eb4ab47e96ea7a8227081c1adf15f254d92a47b996761f2e98c1e5c0,2025-02-28T06:15:24.903000 CVE-2024-12821,0,0,2a46264d0849bd4aa7be7fa7af85f41ff809fdd69397422a1eaf78727791d250,2025-02-28T22:16:37.477000 CVE-2024-12822,0,0,eb26dd9b7803b039e119baab2aef259fd718e2137e365ee06147d8eb4d92eb0a,2025-02-28T22:16:37.477000 -CVE-2024-12824,0,0,6bff044e8eaa42c4c7064113899df481df0b12e0f937bb09fa95d0292ff61516,2025-03-01T07:15:09.063000 +CVE-2024-12824,0,1,745411acf5e29a8cf52147ffcf8673eb469d57599bf2aa0a55cc35cd23dddbc9,2025-03-01T07:15:09.063000 CVE-2024-12825,0,0,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333462,2025-02-21T15:34:58.803000 CVE-2024-12826,0,0,5299c46313436d68c9289650a6ef6457bf429f032709c773f24c86ea6949c331,2025-01-25T08:15:08.463000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 @@ -246898,9 +246898,9 @@ CVE-2024-12867,0,0,348cd8bb4c4441197eabc0ca63cb80787b7b2d140e1a702b7610ed06165ec CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-12872,0,0,ef2adea83c4dcced92604feb28ab9bdd7144986700cdccc2c5054cc997ad5b7c,2025-01-31T17:15:12.103000 CVE-2024-12875,0,0,87b0956586183e5c613030d4ef29fd959e1646cc803bd99da499c5b331518d7b,2025-02-07T17:09:37.010000 -CVE-2024-12876,0,0,0c5c20e6adb83ac3fc96651e655e80c789d36428b2de69f86816f9ca29392d8b,2025-03-07T09:15:15.350000 +CVE-2024-12876,0,1,1ffa30e052c61ab887510a276fef8ab27590dc6fb9dfd38d21f07749b3182f92,2025-03-07T09:15:15.350000 CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000 -CVE-2024-12878,0,0,64ac2cab1086c9f7feefc31872b4bebd35f5e7e1e54b7b478e2a83ea4b883449,2025-02-26T16:15:14.863000 +CVE-2024-12878,0,1,b64e1d2b2d1550ae633bcf2c37a6e44f5ae55d86c6146ff799e23d8870487b64,2025-02-26T16:15:14.863000 CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 CVE-2024-1288,0,0,58e0de106533fbadfe91ccbe8498dc993b445ddb25044f1435a62ec63a4fb787,2024-11-21T08:50:14.440000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 @@ -246949,7 +246949,7 @@ CVE-2024-12936,0,0,55a88043553c5923597bcf986e4110069d325651f25f2116527bc44caa830 CVE-2024-12937,0,0,61c3fb58ecfeab24bfa04f769cc8946e62d155f0144c99dd7a2913b745cde29c,2024-12-26T17:15:06.873000 CVE-2024-12938,0,0,12f8e14be19d7a1a2538d7b5e67f9d805fc512fbcfe2c857084ca03bd07070eb,2025-02-28T23:09:22.380000 CVE-2024-12939,0,0,993578973114d9e6f9ce6908b01603984894f1b4935991a79a259647bce06068,2025-02-18T18:45:17.713000 -CVE-2024-1294,0,0,642912acc48313f437fe6798f58daeb43dc228f1ecf99d4052fc06f246dfa654,2025-02-27T22:03:40.670000 +CVE-2024-1294,0,1,15f1d081d0fe9977cc6752851a1498f52958dbc0f927fd901858f665ac9243a3,2025-02-27T22:03:40.670000 CVE-2024-12940,0,0,18f1d8be4554c2a4f05e4f6134399e06010279792daca19d74603bf47c29c59a,2025-02-28T23:09:22.380000 CVE-2024-12941,0,0,9afd815f1fb71d28d889ae9ad124b22190934df24177dfdcd147ca3fe5289b0e,2024-12-26T08:15:05.117000 CVE-2024-12942,0,0,b5053eac05863514a6d6949212f7b90aac25a9cca13e3cee254856cd2e13f5f0,2025-02-28T23:09:22.380000 @@ -246970,7 +246970,7 @@ CVE-2024-12955,0,0,4e679b34b9db538053d27801fa5a6b0d58ccf2d4f219bcb794c9a30936a3d CVE-2024-12956,0,0,2668c3ad906249d1517aa1703947fdc042247efca13d397d4afeac581fc5dfd1,2024-12-26T16:15:22.847000 CVE-2024-12957,0,0,64905565d3b550f9fb874d7a5d3b874bec23d8b7ec048a30e0f6c1a24dbf4cfe,2025-01-23T10:15:06.867000 CVE-2024-12958,0,0,a648e17888b1e45585aec9dcc552a6b61d7fb8bf3b2cdc0fb1abb90426e73104,2024-12-27T15:15:11.510000 -CVE-2024-12959,0,0,583cb27bd53b765acc757f02377c69ad9e40499f707de9c2ae672310d41a29ab,2024-12-26T16:15:27.643000 +CVE-2024-12959,0,1,52d1f5f883eef98e2f1ae097c9d3b4559b3c2861340525108f745167f4292b05,2025-02-28T23:09:22.380000 CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000 CVE-2024-12960,0,0,cc2c3ee12ae6238d3b083fd046c28cc92ff96e8c8a4e36ab923a0d182032b4ad,2025-02-28T23:09:22.380000 CVE-2024-12961,0,0,258d4ef8fb961ccafed75d69f1fc7307c7a8816df190c0ac8d84ac77fd69b53e,2024-12-26T19:15:07.563000 @@ -247015,9 +247015,9 @@ CVE-2024-13000,0,0,bc161add052684ff88735e2b18fbd0186cf4b5d7e82bd795e40644a35f7cf CVE-2024-13001,0,0,010f40b62ec28cea03ab6bff561e40d6190a637e7819f3ec9b21dc829c096774,2024-12-31T18:15:25.487000 CVE-2024-13002,0,0,73f802eb9f8b9e1d720b28d5d5fec7836df95b40b314e093b6ac0ef85aa4689b,2024-12-31T17:15:07.460000 CVE-2024-13003,0,0,8ea4a997164608756dd4ca16f93d14ecebb42d80183088df88f6df822d4c84d1,2024-12-31T17:15:07.870000 -CVE-2024-13004,0,0,9707627fb86085899aa842f9c227ffb6175dfb5ca910be29cf96038d4be94ef4,2024-12-29T07:15:05.643000 +CVE-2024-13004,0,1,03dd961cbf5264092716173e0161d7183aac4234d32fffa3cc10db99e24d8ca6,2025-02-22T01:27:49.037000 CVE-2024-13005,0,0,e8d159934018fcc7ce9b57641c4b8f208310db66a38966320061a8f56b9152b8,2025-03-05T18:25:53.837000 -CVE-2024-13006,0,0,5148b7261791fb288fbd5059061c79d480e819ebaa16915dded55fb50a651772,2024-12-29T08:15:06.840000 +CVE-2024-13006,0,1,14eb25b806014c8a3465913d751b045916272be4571a9754dff337bbf5c289f0,2025-02-26T18:25:29.120000 CVE-2024-13007,0,0,35e57b6fb4a2cd378f5ff098e8271ea45658be9d391f26affbd975728143f2d3,2025-02-25T22:46:39.787000 CVE-2024-13008,0,0,94f05080bbae6174cb7ea266074a328f76a4e18f0879ea4868287035bab63520,2025-02-25T21:24:58.743000 CVE-2024-1301,0,0,dca00dae68907d01e9f631823737af9f09934ad1d99a379f5032e6fd6ca64c2d,2025-02-26T15:15:08.143000 @@ -247041,7 +247041,7 @@ CVE-2024-13025,0,0,f4f665923d18f7676d2c2cef5038ff8f7aa21d7b11f07bd89f82278387651 CVE-2024-13026,0,0,1a95b50f91fef6936636c3fabd23f665077d97228b659909dfb6f9d80ef51bf8,2025-01-17T20:15:27.600000 CVE-2024-13028,0,0,7d2e5e6d00d43b589f5c8006f0451a893c61a1aca0262e24bce64c304749167b,2024-12-29T23:15:06.030000 CVE-2024-13029,0,0,9161bb09d098ebbb7ef19a1bbd7b1bb1779b655ea954be7d3400c85ce909578a,2024-12-30T00:15:04.837000 -CVE-2024-1303,0,0,74bbafde157bf279acbca3f88b53c2bd5e92b12615b7606b55573957131b6fc8,2025-02-26T15:15:08.143000 +CVE-2024-1303,0,1,9f057b76d1a54e386047bdf971ebc6190039c8d4f4a316f958ea75710c592804,2025-02-26T15:15:08.143000 CVE-2024-13030,0,0,c8f7335c8ddeff1011d8a269478bdf1f7364b678f25bf837ba317049b64693c8,2024-12-30T01:15:06.060000 CVE-2024-13031,0,0,9e67bb04e7452f5942ed67f4ca6fcb5321f128692c2fae937f4bae3a4f19832d,2025-01-06T18:56:33.010000 CVE-2024-13032,0,0,ec95b0911bb88cd1e15caca5d1d22295bb3ae9a6e0e461b8d37fc138fa6ba806,2025-01-06T18:47:07.217000 @@ -247119,7 +247119,7 @@ CVE-2024-1311,0,0,7288a22df752343e846f5ba6a82a81aad7d46e7208b97bb1330896fb02e609 CVE-2024-13110,0,0,fa44e94b5ff3e404a68f28b72a683cfc1061393cd75f912181dba49fb4aa76a2,2025-01-02T14:15:06.240000 CVE-2024-13111,0,0,c862f7e5195771de98d5867ec5c4906f41914260db0379025305fd5c04623eac,2025-01-02T17:15:08.223000 CVE-2024-13112,0,0,702aad5ade9e10a9087c506d7a487bd624c63ce680a53cef890a1f7ea28b745b,2025-02-18T19:15:12.723000 -CVE-2024-13113,0,0,759825114b2486f7b77c8d909042ceae3ab32dd09867a0d8d372287364cf6450,2025-02-26T16:15:15.020000 +CVE-2024-13113,0,1,cdbe4bfcf83b55bd65a2cc0fae5fe4fd6a51e66d0e0a367c692c201915160153,2025-02-26T16:15:15.020000 CVE-2024-13114,0,0,0294bf3cffe33550cb4e4f68d18089dfac8f013192677ef679fc2a8b508cbe75,2025-02-04T19:15:30.103000 CVE-2024-13115,0,0,13b8199069b20efe9868960868ade8b98a30fac2dac411b23e0856355daac94f,2025-02-04T19:15:30.240000 CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43dee6,2025-02-03T15:15:16.290000 @@ -247147,8 +247147,8 @@ CVE-2024-13142,0,0,83cd0ec82f1a2b8cb6c41841e46d0299ee030474dc8bce00e898bf7c3451e CVE-2024-13143,0,0,2d1d64f3642c4512a91652d1c43c226acaba3a89d87b58cf23cbe6f5d959b82f,2025-01-06T00:15:05.460000 CVE-2024-13144,0,0,cbdedf0ba314069fc9465dd283b23b5b130c41c32e40b222fa368abcc66db722,2025-01-06T00:15:05.633000 CVE-2024-13145,0,0,5c365a974659bd41337fcb8adb2d8fbc8e9cd8f5a39411bbe19577a7fc11a4ee,2025-01-06T01:15:06.253000 -CVE-2024-13147,0,0,343038e0e5fda9e074575f80d86a2f71b9de0f3dde5b2b0c00e3413bd06794a9,2025-03-05T14:15:35.910000 -CVE-2024-13148,0,0,5e62731777939a6cccea414e3b22f75ba2217f43648f57abb338beb059e81dd8,2025-02-27T15:15:38.583000 +CVE-2024-13147,0,1,5fba1d2cd866e8202ab89b2ec314db1d81316e8cc1dcddeffe087b37899a0e8e,2025-03-05T14:15:35.910000 +CVE-2024-13148,0,1,83056f9675481edb5161e9cf8f036e61c1b8657b91a7cf152621c7021de561ef,2025-02-27T15:15:38.583000 CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000 CVE-2024-13152,0,0,122264645183d9f888de428d629fb2ba29cf302edc1f968441a9e42307fca5f1,2025-02-14T13:15:42.170000 CVE-2024-13153,0,0,6a7ea48b6c8668ba1a47dbcf1a141a7b25a12c4a1f85a5c59e5d5a298d008763,2025-03-03T17:42:59.740000 @@ -247179,7 +247179,7 @@ CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000 -CVE-2024-13182,0,0,0f30d08febffa83a5cadbc4536da398ad16ba5ffdc4bdd4dc02b802b7dfde04d,2025-02-13T13:15:08.290000 +CVE-2024-13182,0,1,86bbb053757d1fdf8258ab7a69f7f814be6ad9d2a59f017bbdc4daa6d3ee1792,2025-02-13T13:15:08.290000 CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000 CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000 CVE-2024-13185,0,0,caccf600f572e609aa614a2e569f9c4a7bc6db4155ef96b0efdb8fe2b0f81b5f,2025-01-08T15:15:17.163000 @@ -247215,10 +247215,10 @@ CVE-2024-13212,0,0,f9886a097d66bdcd8c2d2926c02793bf40e15e2c1503dfbfe7ffed8e8a4ba CVE-2024-13213,0,0,7bb683b6c3f6a9fe11ffaa1b8cfd88dcf276b140239714fc2214812b4502e015,2025-01-09T04:15:12.453000 CVE-2024-13215,0,0,17507f2f85733790cb9f937f15c22b6e61ece58878b7af9bb53a95a8347aa1ca,2025-01-23T17:35:41.723000 CVE-2024-13216,0,0,8e20e17dfd694aa546f801508f99d3bd9309e38995daac8ba087dc79f8652c64,2025-01-31T06:15:28.267000 -CVE-2024-13217,0,0,69822430609965472cfcf76bb51b9c8a19fe6970b5b8af0eb00e27fe0ad30dc2,2025-02-27T12:15:34.857000 +CVE-2024-13217,0,1,97f8b9de4043114a35542310fa87c2675f82bea34c54e5952e19b98c8446e875,2025-02-27T12:15:34.857000 CVE-2024-13218,0,0,fb17e546372d6349ad8fbb91244b222e6f7b0e9a3d15756039cd734c4dbf9af4,2025-02-18T19:15:12.813000 CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e3fe,2025-01-31T16:15:31.617000 -CVE-2024-1322,0,0,55a4a6cbcb762e832faae62e4eac9d6165a1384f4c22eacd91995066098361d6,2025-02-27T22:03:40.670000 +CVE-2024-1322,0,1,ac2fd2e55f7e01d07f33d35aa1f9b3610fd22fa49d1808830c8c3b36c15298fb,2025-02-27T22:03:40.670000 CVE-2024-13220,0,0,2a29f93de8fe785956cee813d639f3b7bb31198e316ff621daafc5854ef7c753,2025-02-18T19:15:12.920000 CVE-2024-13221,0,0,10190793b847bb01aed61940125a097fda6aa2bb1f897c974f382eb750275351,2025-02-18T19:15:13.023000 CVE-2024-13222,0,0,3369cae0a43fcf974ee9682b40ff21b7fd6cb19d101c9348f9e995ea2e1296da,2025-02-18T19:15:13.130000 @@ -247230,8 +247230,8 @@ CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2 CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000 -CVE-2024-13231,0,0,e7167177f9b23ac9afad3eac07b555a05861f1dc2e64891ec43f7636c5cda4d2,2025-02-19T09:15:08.930000 -CVE-2024-13232,0,0,f036609e4d8f0beba878db5f7c74fe0dbd7cad8905042cfc3d1a6197e09f841c,2025-03-05T10:15:14.197000 +CVE-2024-13231,0,1,8133499dc421fb8eeec89ae339a9317456ac74d27ac45e8142adc553ef67d35a,2025-02-19T09:15:08.930000 +CVE-2024-13232,0,1,73e72977176c5ab00f2b408cfd84e5861f318f5d2093098cfc7b6de1aa0ab0fe,2025-03-05T10:15:14.197000 CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000 CVE-2024-13235,0,0,716a7c5d7c159a6b2d91aeded07fe8d912083980a02e58547aa8d39dbb30ccd0,2025-02-25T17:46:21.047000 CVE-2024-13236,0,0,64abe32b85dcd45ec9ab991a4d5209e0313b6971aeb9b551d0d126d46b2b126d,2025-01-31T16:03:09.630000 @@ -247340,7 +247340,7 @@ CVE-2024-13332,0,0,dac8734d921a69995688399552e86863e8f706d7756f9f6bda00d7ba7dffb CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000 CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000 CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000 -CVE-2024-13336,0,0,86f8421ce44a3efeee40015670abc636658cf53a5c7cb07124264f98bc16ee89,2025-02-19T09:15:09.083000 +CVE-2024-13336,0,1,79c16f1a815c4b4e08d2b7d252ca124a4e4e47ef76ceeb013ede9def5ba5f1b1,2025-03-06T12:42:22.567000 CVE-2024-13339,0,0,f2418e2a84ad5fac952266fd0a210758cd47eeba25ed9f4888882ba2578b0d10,2025-02-26T13:16:56.970000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 @@ -247352,30 +247352,30 @@ CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f04 CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000 CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000 CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 -CVE-2024-13350,0,0,e9c5b87923a91edcb842bb6a28d1d6fd2f2943c4b4751dbc1e510c5e7ccbce8a,2025-03-05T09:15:09.163000 +CVE-2024-13350,0,1,9a88d6694c250ef22b7adf13b586a44095e279ba5076ed71122a2bc676f634df,2025-03-05T09:15:09.163000 CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000 CVE-2024-13352,0,0,e3b517ead7778233dbb1fb4b3ec3651780c4dec33a82aff69cd76909bd75eb05,2025-02-07T16:15:35.960000 CVE-2024-13353,0,0,81d2cc0d68c32fbd9c01652b235787fa907c22cf877db2ecf0577a18d517802d,2025-02-25T03:32:38.597000 CVE-2024-13354,0,0,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341f09,2025-02-04T10:15:07.920000 -CVE-2024-13358,0,0,b1c8c907a5b672a39adc84aa5bad4ea5001bafb396499be4fc518e46c65a928d,2025-03-01T04:15:09.550000 +CVE-2024-13358,0,1,631be8dabcfc5ac817d4e5e9627cc523aa9595816fd91264579b80a0796b931f,2025-03-01T04:15:09.550000 CVE-2024-13359,0,0,df76a7fae90c0c3618e5cfaf0bc4ad676abf7e64e8eef5848c9e384e16259fd1,2025-03-08T10:15:09.977000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 CVE-2024-13363,0,0,77eb2df401f4285f647751f8f1c9fe0aaeb31152f77f97503a19924ca5aaf01a,2025-02-26T13:16:56.970000 CVE-2024-13364,0,0,63d64dd9502bf524ff6550da6f98b5dc67d8ba4d2bc310f55cfe156be0caf94d,2025-02-25T21:53:07.637000 -CVE-2024-13365,0,0,a3a6bbcb4ee71a3bc56f4487bd5a2fe1530409355db36ca9e760f09e0c2a8182,2025-02-25T18:27:25.897000 +CVE-2024-13365,0,1,33f22960898a37cbad13bed0a5a031c6fbfd1e93de31b3c2af348d23894d1ca7,2025-02-25T18:27:25.897000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 CVE-2024-13369,0,0,47ecd3c90365b0b8806608698978244aa8d9548459c2826cb276965402432233,2025-02-21T15:26:29.267000 -CVE-2024-1337,0,0,d0ffc211ae610b743fd76dc3709ae0a5c09c5575c7e99e9afe40c75e58c48e9a,2025-02-27T22:03:40.670000 +CVE-2024-1337,0,1,831fafd0189a648524ca470bddb91ce5384dfe46bf13df7888a34603a2213df8,2025-02-27T22:03:40.670000 CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000 CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 -CVE-2024-13373,0,0,976594363a3141f217a305a1e89aa5f227d49d1641884f1adbc2f3d31159b7d2,2025-03-01T07:15:10.770000 +CVE-2024-13373,0,1,9d44977237f116718720d9d00cfafd61d5daa8953cb39a9e131699dc8586025a,2025-03-01T07:15:10.770000 CVE-2024-13374,0,0,3fc707056196afc6ff18dfb5640666c2f82725f50c06780da5f362e975810d58,2025-02-24T15:55:44.733000 CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000 CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000 @@ -247399,10 +247399,10 @@ CVE-2024-13396,0,0,d40dddb5bbef2ceb0d99779812d043b82b74e26f4354d1873d73eeffa8629 CVE-2024-13397,0,0,02f1ca5e9655c42bfc977bed181f9baeb574d1f47ee120196f480f736b1319fc,2025-01-31T03:15:10.240000 CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000 CVE-2024-13399,0,0,ae1b981aa62bfabc1644fd540791945410e14b2403d65b8acc8ef844a056874b,2025-01-31T03:15:10.470000 -CVE-2024-1340,0,0,73d86847b1eb5eb26ab4701d2aa7eb8c193ad6d2891d7819b19ada5b06ec0cef,2025-02-27T22:03:40.670000 +CVE-2024-1340,0,1,43e6d4c4e0364d950f1512411b8f13f3cdd52e4d9120de00a4d9ef0e3ef95568,2025-02-27T22:03:40.670000 CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041bb43,2025-01-31T18:02:33.637000 CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000 -CVE-2024-13402,0,0,08d345dc0f65c1483d2bcc24bf41cf401a8390cc59c1fa5ab98b1d875f3a0c2d,2025-02-27T13:15:09.947000 +CVE-2024-13402,0,1,db457dd570c17bd968983c250540c2f0f860aa42fcba30a4c9ad5087ce248556,2025-02-27T13:15:09.947000 CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1ffc8,2025-02-04T09:15:09.303000 CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000 CVE-2024-13405,0,0,94146d9ff91e9f262c16e44af2895907f5ccb65ae44733b1b3451e628b70096f,2025-02-19T08:15:15.167000 @@ -247415,15 +247415,15 @@ CVE-2024-13416,0,0,d71120210a80712a2c247daf0d2ae5cb04d95a19fc86e36a7c69ffa25a62e CVE-2024-13417,0,0,8cab866664bb2b3a861f8a2fd2fcba4e1325fa44575c36d479d147ebcdc0906c,2025-02-21T13:15:11.100000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-13421,0,0,dff352970d11f97bef9f2004dfd5104aef40893ad488e84401453d94e51e2f24,2025-02-25T04:00:16.123000 -CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000 -CVE-2024-13423,0,0,ad013cf7063530c189cad33688cbc60e935d1ca37076a9be20295ddb2eaec2f4,2025-03-05T12:15:34.960000 +CVE-2024-13422,0,1,5a5e3a34a08540847ede2f0ca117cd0ea849d109116cf1b97eb3920458cf684c,2025-01-27T19:50:59.443000 +CVE-2024-13423,0,1,ab650f03308e48faf3941a95faac3c7ae6d96c4c6ebae6935f4ee39a7a6ffd0f,2025-03-05T12:15:34.960000 CVE-2024-13424,0,0,370975f1d5c5dbca69325f5ce6d38bab2ed23e0268961523b76c7b51bd5cfd1d,2025-01-31T06:15:29.443000 CVE-2024-13425,0,0,237ea5cb491f715b975686bb5ff57420b8d04b440f81d846e123cb2cd3c6bc41,2025-02-05T16:08:25.610000 CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000 CVE-2024-13428,0,0,c41a9f907932f79019115b7479ffe4980e2192237da057226c31e0fb257ee9e4,2025-02-05T16:05:55.617000 CVE-2024-13429,0,0,a2073ddcc0f5ffb5f28db25fcec46d547788a503d2d1e004a4ef24e1dfb126c3,2025-02-05T16:05:10.947000 CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000 -CVE-2024-13431,0,0,6121693ee8c65bf80c9becd6501d227794507644d133ed59ce33e694e6257fb3,2025-03-07T09:15:15.503000 +CVE-2024-13431,0,1,d54d98051b00401fcb5ceadd29907cf5ab1ae98974c5a4fa77205e9bd7afb064,2025-03-07T09:15:15.503000 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 @@ -247462,7 +247462,7 @@ CVE-2024-13468,0,0,b48d1fa3d35721ccb47a1fb4394610e679bd03891ed40ec26ea0d83834fe3 CVE-2024-13469,0,0,f5f4e039fc9029d34c0aa8afde7e8626db9dde4b5a828e2df2285c49cc2b04d1,2025-03-06T16:36:54.387000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 -CVE-2024-13471,0,0,c2b3475b8b9340ee7eafc3015ca60d311a7a71d13802743276d03f35c7f296e9,2025-03-05T12:15:35.110000 +CVE-2024-13471,0,1,ded89631a6c8b3470cfce8f0d40fdd89f44c44548de9869a213ebbba5e242015,2025-03-05T12:15:35.110000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 CVE-2024-13473,0,0,373b88cb5ad56591f1b1770e530e918a12459beb69655014b2f5d50cfdfcd511,2025-02-18T18:15:18.990000 CVE-2024-13474,0,0,119b2bcc9f6d7ee06993a83df97481ecb1d6f18c67fd910f35088fb4eaa5cb22,2025-02-22T05:15:12.410000 @@ -247508,7 +247508,7 @@ CVE-2024-13514,0,0,9ea9c943c8c862a90b064c6b687870de6d99753ab2446cc014bc97f56be09 CVE-2024-13515,0,0,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000 CVE-2024-13516,0,0,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6f3f,2025-01-18T06:15:27.627000 CVE-2024-13517,0,0,cfab1b395558d480252b3d9445658f67696997e56c4b9d51564795ba8972f0d2,2025-02-07T17:10:03.317000 -CVE-2024-13518,0,0,37e8d6ac3b97727a1874207c11fdbb4fd62fc246a7e82ad6d5c1853782387b10,2025-03-01T05:15:13.720000 +CVE-2024-13518,0,1,5877a2e2f8c7f3a90fedd3c90024e25aad3d099b5197a7c1a700e57142184c8f,2025-03-01T05:15:13.720000 CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000 CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000 CVE-2024-13520,0,0,fac5274c61956e3f157779cedf38475f816631366c2c2ff273a36d783899a90b,2025-02-25T20:55:11.400000 @@ -247539,30 +247539,30 @@ CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507f CVE-2024-13543,0,0,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 CVE-2024-13544,0,0,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000 CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 -CVE-2024-13546,0,0,63a860527663231f9bf1584d55966af9163c037835d8ace637da70afd0f2dc57,2025-03-01T10:15:10.207000 +CVE-2024-13546,0,1,72fb93e66287ae14af70ea18ba64ca11ffb9c06f1498114e59e5a1561b04d469,2025-03-01T10:15:10.207000 CVE-2024-13547,0,0,1e79ecfe46a254b42d924ae276e55ad400567d9e48a334180905a7986300687f,2025-02-24T16:16:56.543000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 CVE-2024-13549,0,0,bcedd6d4c0f25a57faa8365d40ac3a95b68e2d0adaafc3f3f6fa713e56e46afc,2025-01-31T18:10:28.800000 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 -CVE-2024-13552,0,0,78a2dcdd0b497bf81189f0fa3eac2dc1589a832821280c597b99c1b6b354a2cb,2025-03-07T10:15:14.493000 +CVE-2024-13552,0,1,032c024079e235566b4f4dbb2e6c078e91805d0327b273a5837bbd7345b59d31,2025-03-07T10:15:14.493000 CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000 CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 -CVE-2024-13559,0,0,b7f12fd65915cac1d7c4b0b110eab4a22509ee6d5495368ece38697fbf2e862c,2025-03-01T05:15:14.700000 +CVE-2024-13559,0,1,e4bc151d4fce3c77ee1ebfa44e64cd44d7e5d82c4b82e11f2aabe557304018a6,2025-03-01T05:15:14.700000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 -CVE-2024-13560,0,0,338dc9827330ef716d7310bbad14f8bf1433ceccc9fdeffcb4dd5519af644ed6,2025-02-26T13:15:36.800000 +CVE-2024-13560,0,1,bc3576a3348779a87640a25b38dfdb4ea2739f3634c8fab6266670a556723a3e,2025-02-26T13:15:36.800000 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13563,0,0,b0680512edbfd76c9992a94614945737e2967f9ea8b4e35914af96ef371d88ea,2025-02-28T19:47:07.220000 -CVE-2024-13564,0,0,6e3b00dbc50e3b36d3406e639d5e17c95eb2a164008d090f280292735c8c9533,2025-02-22T09:15:23.687000 +CVE-2024-13564,0,1,c574ff00279dd20adeff101563f955a05a9702f85ded81215e72bc461ee5269b,2025-03-05T21:28:15.293000 CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 -CVE-2024-13568,0,0,b01d33d7b12055526134c6c872d54db5765367706d2985d22926685225587006,2025-03-01T05:15:14.883000 +CVE-2024-13568,0,1,9e74afb56722f02929d754afa7c3b344f0fb3d262b0b29f693d93e682755b19b,2025-03-01T05:15:14.883000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 -CVE-2024-13571,0,0,8adb97f08452e91b96d2270b78566933bef9d098efc73311e873baa6674c5f58,2025-02-26T16:15:15.210000 +CVE-2024-13571,0,1,ab309a8c78e09a2ce738fdc24b971e3cca9be1cecd7a9446e1d144bb91a81bc0,2025-02-26T16:15:15.210000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-13573,0,0,47f56a6be89a4bb63ceadbae078e78a73033980ecb24e71f52f10b691c304d4b,2025-02-24T15:40:57.757000 CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000 @@ -247599,39 +247599,39 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552 CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000 CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13611,0,0,adaf5b73e8fe9d66812dd3def28511b2d973fce9d240d376175277fce2929fa3,2025-03-01T09:15:09.220000 +CVE-2024-13611,0,1,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000 CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 CVE-2024-13622,0,0,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 -CVE-2024-13624,0,0,44964160e47deb6ff4f3f057633f25354aee32c8a5940aa775a23529bd320ac6,2025-02-26T16:15:15.353000 +CVE-2024-13624,0,1,6cdb4100029ffd4eabdd8728fbf145a99df48ac4e466074edace2c27cb68eb0f,2025-02-26T16:15:15.353000 CVE-2024-13625,0,0,556dbc652a367567d8dc0a1aca4ef96fa3721288585ae7ce8b84a84c5a8c12d9,2025-02-19T22:15:22.630000 CVE-2024-13626,0,0,5f376c892890a386d15b17c9d9f7768803772784cb9f45a9f61e63e74ea1223e,2025-02-19T22:15:22.753000 CVE-2024-13627,0,0,faf1d9bd245281ef1f9edc55f8aca71639e95b5ef38efdbbf353c5fc7ae2924c,2025-02-19T19:15:14.720000 -CVE-2024-13628,0,0,73c99ef896b056324a43078c6856220458242e57291b51b41c0b6718b009c983,2025-02-26T15:15:22.510000 -CVE-2024-13629,0,0,acf9c216ab3a973239ebd7766ef9ac64618590081e622216ef083a96d00e803b,2025-02-26T15:15:22.643000 -CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 -CVE-2024-13630,0,0,845c864ca15bb559bcb8c2173234efcbcb7bb3c8854e04c0beff6f75c995afe9,2025-02-26T15:15:22.787000 -CVE-2024-13631,0,0,1173a2052c9322ff763e4a08477861b2fdc8642ef5d1c04f9a1dd2bedafa06f4,2025-02-26T16:15:15.487000 -CVE-2024-13632,0,0,7b015e6f72d13589b7d97462ac3bfe30f6a11cf8c1a6af3a853d02e1efd6d4e2,2025-02-26T16:15:15.640000 -CVE-2024-13633,0,0,2deb3debe35674bbdda8b971fff5055affb3f691f2d8ba5d3756a5bf2ffc5b2e,2025-02-26T15:15:22.940000 -CVE-2024-13634,0,0,5d8a1f3015a94814647bc0bb3707cb44d4707b2ce8e11e273153be3bca7bdefc,2025-02-26T15:15:23.103000 -CVE-2024-13635,0,0,6fc8ebd63da1df3feb8855162f15c2c7575ad308f45dba4fe82102f928510aee,2025-03-07T10:15:15.840000 +CVE-2024-13628,0,1,e8ccbdde0b8617fc2f997da7d935787a1d90f4b101406c0f4687aa29b0e4fa89,2025-02-26T15:15:22.510000 +CVE-2024-13629,0,1,915d47748255f70c2d376f96d43ced3275fab90760e451c7252d96c869144066,2025-02-26T15:15:22.643000 +CVE-2024-1363,0,1,ea4734f578d60e6f29385859fa0808dff8562096a1a2a186b687ae5934a93ca3,2024-11-21T08:50:25.093000 +CVE-2024-13630,0,1,b810a41a22e2819d84a542798b47a7f6028dadb6c53eff4a78104c5dddbe4a7a,2025-02-26T15:15:22.787000 +CVE-2024-13631,0,1,8e17039ca95125f90dfc21a31da67fe7f76e3a6c702adc6f4b02e8e5fcd5d698,2025-02-26T16:15:15.487000 +CVE-2024-13632,0,1,90e5f8ebdad1c598bd61843bf201974923f44e69f8fd88bfe7c6fa9885653b3c,2025-02-26T16:15:15.640000 +CVE-2024-13633,0,1,154ac025533dc4d22621ced91d1656294a3c76555b1d7464cf0f1a7ced0ba02f,2025-02-26T15:15:22.940000 +CVE-2024-13634,0,1,3a323150b4c672f679ff6d2026569072ef08434fb46bd62064336239f23843c3,2025-02-26T15:15:23.103000 +CVE-2024-13635,0,1,7aed809c1ad436818f3bc7fdd8950cca1812cb7e07eb4f1e64f6cdbe32c0427a,2025-03-07T10:15:15.840000 CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000 CVE-2024-13638,0,0,eb0f7891b8d7544d8603ae647ef33cb2a949acbc2f71d820d25576adb876013a,2025-03-06T16:36:54.387000 CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 -CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 +CVE-2024-1364,0,1,c8cea6887b1c749f6ebfb72a23693859e5e46620b31b348d4c328dd8f9eb86a8,2024-11-21T08:50:25.223000 CVE-2024-13640,0,0,d2970b957e898dabd48434bbb548e289bf53a4dc6d7188842294685c04e684ff,2025-03-08T05:15:31.673000 CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000 CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 CVE-2024-13643,0,0,976eb3748a453f62f41c154b29792936c30855f6728fa73bdd9cf169ffa6a36c,2025-02-11T08:15:30.450000 CVE-2024-13644,0,0,64cef7310d19b282392436c6941be53a7496c3c7abf46493750d161d9bcf28af,2025-02-25T19:39:23.487000 CVE-2024-13646,0,0,df579ebc80f166383afd2bf72cceedaa012995a592dad78c8758f9a4e2dd62bd,2025-01-31T18:19:45.780000 -CVE-2024-13647,0,0,c9197efb87fe127cac62694e00d56e11ef557d975a1d54b713426e595b9b17b8,2025-02-27T05:15:13.430000 +CVE-2024-13647,0,1,e16f6706a4d222b79bad4a715acf542c376a74fdc9a58266ef5099025feb3e68,2025-02-27T05:15:13.430000 CVE-2024-13648,0,0,8f62ea1c5007901a89b064138ec6b8d294bdb0d08cd28f0fa62f3f5d12de0925,2025-02-25T03:30:34.843000 CVE-2024-13649,0,0,69f827e36195313f8971dd7132db8083572da975614b246ff81ed5b71b1449af,2025-03-08T12:15:35.667000 -CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 +CVE-2024-1365,0,1,c71d1c4669310f39915981becbed9e2a8b8279ea8a88f734b4d392ea48addcbc,2024-11-21T08:50:25.350000 CVE-2024-13651,0,0,3106185ed2d2390fe0c7db6d51838d5c676d3b37bd6958033551790a08b59a48,2025-02-21T15:55:18.263000 CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f04d,2025-01-31T18:21:53.167000 CVE-2024-13653,0,0,8f5f628bc365b3356e538e139c2f299c369821f268ce9948fdb4c04c9fc0a011,2025-02-25T04:00:58.793000 @@ -247649,8 +247649,8 @@ CVE-2024-13663,0,0,880b175977ec5581b5d821dbb9009cc924e13e2d7908761bee2204a2ca2d3 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 CVE-2024-13665,0,0,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000 CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000 -CVE-2024-13668,0,0,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000 -CVE-2024-13669,0,0,8903b9e05cf18c6fbdaa9659ddbe3a812ca2295bd3ea5e29169ff59ba112842b,2025-02-26T15:15:23.263000 +CVE-2024-13668,0,1,005b9edf58cbd576ba222b6245660e142e209bfc52be055f2c9ed9787d1c5eda,2025-03-07T14:15:36.520000 +CVE-2024-13669,0,1,b3c7083f070a0710b4b0ac270ba8bbd5fc43c0200ac36160ad8c8a961f1508c6,2025-02-26T15:15:23.263000 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000 @@ -247659,16 +247659,16 @@ CVE-2024-13674,0,0,54ae91efb964a97c020a56c0dc911089c6453b2f94aff9911e1183d8467fc CVE-2024-13675,0,0,6f70dc84bab2e05ec212aff9c800c39bd3adc6852a83a38ccfc63dc9e432001b,2025-03-08T12:15:35.847000 CVE-2024-13676,0,0,0ccce7847f88b81e769d1f66635bc0e63798d789429624b628d16cdf7698272c,2025-02-19T08:15:19.190000 CVE-2024-13677,0,0,13401c1b73282722904b75cd499f0a3bc9825602c732ed33fda81e11a6c0d93a,2025-02-21T16:03:44.037000 -CVE-2024-13678,0,0,4c2eb6970d44a6b1de676249027719a3b828f4d665df355d620115c9fb619d76,2025-02-26T15:15:23.433000 -CVE-2024-13679,0,0,86229dc69131243d51d94ef8cb1d9ef15ccbc5bcaa679afb8c5258e078722ff1,2025-02-19T08:15:19.623000 -CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000 +CVE-2024-13678,0,1,c5e61840858106c21ea1c4d3870885df8be7a86a5c4964a33281a94fcaf2b3fc,2025-02-26T15:15:23.433000 +CVE-2024-13679,0,1,98b0435b56ef80104f8718a5835c6164f1950bbb34891801b1fa34bccb6ff920,2025-03-06T12:42:22.567000 +CVE-2024-1368,0,1,408d2fbf48080049795e46e3c383f5ffc0bdc2e9b9068c7f35a6d12e57d5b313,2025-02-11T19:44:46.867000 CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000 CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000 -CVE-2024-13682,0,0,8aaf6dfc2318ffbd59ab18bd7982cb8a58fedb73e001992aa6ad754b2c953bb8,2025-03-04T20:34:08.907000 +CVE-2024-13682,0,1,9d347151dcc53ccdb87ad8eb5c60c81daa8395c02bea05d1ea3662640974d6dd,2025-03-04T20:34:08.907000 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000 -CVE-2024-13685,0,0,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000 -CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000 +CVE-2024-13685,0,1,f86c53313fb45f4b3845bb08407b896c2c33cfa54764816bb0667d4d1ed753f2,2025-03-04T15:15:18.760000 +CVE-2024-13686,0,1,714a323dc82e9bd3faaabb1dd38cd890ca5a4aeaa0bfb1b048c208d53e0213a9,2025-03-05T16:39:15.917000 CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000 CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 @@ -247678,10 +247678,10 @@ CVE-2024-13693,0,0,f0cf4256d62cf2043dd430ed11196d9b70e2b2d1990b02789144ac56c8565 CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000 CVE-2024-13695,0,0,8ff53e1c24294038725eeb5009487732d909b54f14df48126e66c23934ff0d91,2025-02-28T01:30:32.830000 CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000 -CVE-2024-13697,0,0,068c9e165f4106c3b943dce2e334fc13af23c8d9d6418a3e81429f2272641ed4,2025-03-01T09:15:09.370000 +CVE-2024-13697,0,1,1f47dabaf60e61cf8d0920918bce2cd8f1ceda4159181241b7569c7212df4d54,2025-03-01T09:15:09.370000 CVE-2024-13698,0,0,ea43a0ffeb82eb62bdf790bb3904a4694fa6ec80884e9d936dc30a8e05897d00,2025-02-07T20:15:27.277000 CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8ab3,2025-02-05T18:33:09.660000 -CVE-2024-1370,0,0,efa43c7062130c84eed99a489c06a374f78dd89fe804f50b25065ea1c5a4a8e5,2024-11-21T08:50:26.027000 +CVE-2024-1370,0,1,af9eef85cdef5d82b30a23aa6c7b14b02d92113b01b47f8c84ac9e8b3816acfe,2025-02-24T14:54:19.277000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 CVE-2024-13701,0,0,521368ae5abaf2abfb46429e33c728f78e759a939d38cf1b0d41e4d95d49ddef,2025-02-25T03:53:21.997000 CVE-2024-13704,0,0,edacb1bf034aad21d3de74c25d716996b7c2a06ccbd4adcf15412220d4bc97f7,2025-02-21T15:34:38.797000 @@ -247690,45 +247690,45 @@ CVE-2024-13706,0,0,ab3c260451f5aeaf628499ae0037d8fc16844264bd9ec15ebc42f8eab05dd CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000 CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f03af,2025-01-25T04:15:07.670000 CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000 -CVE-2024-13711,0,0,6c22eb7062f371b9c7d866302bbdc9012b4a85ed4fd82bfe7113852b30993b1e,2025-02-19T08:15:20.007000 -CVE-2024-13712,0,0,5175bdafe3447afb47dbb7442f9744ca12f1d9f2556123222083243df1a3fa59,2025-02-19T08:15:20.380000 +CVE-2024-13711,0,1,fc71390729ff6107d738aaeefe91e838bbf5581a26f05f662cbd86294343bb6d,2025-03-06T12:42:22.567000 +CVE-2024-13712,0,1,c72b66c78d39869ca0885cfd3bb523350f762ed788f428bb0d172f871aa953f9,2025-03-06T12:42:22.567000 CVE-2024-13713,0,0,90954b7583c56b27a881e3e89dac99a8fe4d669edd575847540b2c9eda75eaf1,2025-02-25T03:28:44.207000 CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000 CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000 CVE-2024-13716,0,0,081a135d344e341b95895d1b6ec4c3b57f2f922fe4703ef063ddd985ea5ad68d,2025-03-06T16:36:54.387000 CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000 CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000 -CVE-2024-13719,0,0,0bd57a765654eeb9e811d1d099eab00bee38dce668b56e8d067bea2502bfa18f,2025-02-19T08:15:20.737000 +CVE-2024-13719,0,1,42da5f4df800b57608817e0cceadc90f16c19e98a99193f206ac4cd9c8306a62,2025-03-06T12:42:22.567000 CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000 CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000 CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000 CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000 -CVE-2024-13724,0,0,2b3eede8759ae6c30590769eb9aab05e1a7b386a27c7e1b434fa46e7c9b63efe,2025-03-04T20:34:08.907000 +CVE-2024-13724,0,1,53485c57b64d14a7cd74b8b179e419b29d479f6c1c6c7a1b94bb18dfa9c9888c,2025-03-04T20:34:08.907000 CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000 CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836999,2025-02-19T22:15:23.043000 CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000 -CVE-2024-13734,0,0,f774185fdb1446768b8912946c04f112e5fef2763b9e95e2cabaf843b96ac193,2025-02-27T10:15:09.980000 +CVE-2024-13734,0,1,c0c2c683f5b658fc14994e3be65481765f20d38b94a5d38a7b8c7ec0b131b1aa,2025-02-27T10:15:09.980000 CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000 -CVE-2024-13736,0,0,6ba5715329486218dff124f0d9bd7258c995e68bcb62c707a0238b6a9749bb16,2025-02-19T08:15:21.077000 +CVE-2024-13736,0,1,e1c661a83958ba599f5e79cad01930aa57fce7dc9eb18a31a6e422469d19d5dd,2025-03-06T12:42:22.567000 CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000 CVE-2024-13740,0,0,7ff99f97d425424bdc9a3d1a435df988f74877e53c6e3d16169a71dec8c37f3b,2025-02-24T12:41:27.353000 CVE-2024-13741,0,0,78f05de9655a03d53c2e8400793bb4a26c0069c47279ba1e219e404df9296757,2025-02-24T12:40:05.483000 CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000 CVE-2024-13743,0,0,55c8dc190eb39157b66a10e1b93cb1305bc4d10ce4cb3fd182854193f3e3c946,2025-02-18T23:15:09.267000 -CVE-2024-13746,0,0,45f35ee3764d47b28653409950f2c901c1dd16389bb6dfa869d16b5b737ece40,2025-03-01T05:15:15.103000 -CVE-2024-13747,0,0,0722e9214a8d8932f08f4c85730f4f5420b18fd6467ccbbf76398fb9b25cdfac,2025-03-05T10:15:14.617000 +CVE-2024-13746,0,1,4744ce63c95c52e5db95476dbd9a3113792c8e496a71ed5da9e5324799e177fd,2025-03-01T05:15:15.103000 +CVE-2024-13747,0,1,8e07e53aa6c7054c82ea2f6fb617744eb93f1489e0018a92feee49fb328ee2a2,2025-03-05T10:15:14.617000 CVE-2024-13748,0,0,434305d89c46996e593a1c20227391db3e976db9a09c9806ae0372c5517d7c24,2025-02-25T20:54:55.803000 CVE-2024-13749,0,0,1bb4ba9b57bf7068dfada9bae681ca9d14d8a8db535388f781f86c86d7cb8a7e,2025-02-25T03:54:36.293000 CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000 -CVE-2024-13750,0,0,60d2ac37a119c74457a43f16e0c72392975ebfbcb619894e9f656befe0d71039,2025-03-01T05:15:15.277000 +CVE-2024-13750,0,1,0a8ed81a0fb4c805fa9ae8e4133152ec80dd7ae5acc85d3458944509be48d08a,2025-03-01T05:15:15.277000 CVE-2024-13751,0,0,0e5e1a96a42a91f86024c5c9d88e569f1562fea2d46c5a10de41a49f75bc1fa9,2025-02-25T17:11:28.037000 CVE-2024-13752,0,0,58abec1a9c719742a0301542b70a1d6e3b887ea15505a7f86a0c807e31da0095,2025-02-24T12:30:24.827000 CVE-2024-13753,0,0,35689cdd5b64ee3991abd63fa8ef5f0b529fd8b40e65045b74e26e44ce0a06bd,2025-02-25T20:55:58.420000 -CVE-2024-13757,0,0,5995cc65fdbedf43c54445a608a23fd0f5333d3ce6f4a7aa69eb1a8c69fe5ff0,2025-03-05T10:15:14.923000 +CVE-2024-13757,0,1,54452a175a593d5955a515cbd9aedf9469b07f708f1079064f7ab57eec13c902,2025-03-05T10:15:14.923000 CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 @@ -247737,56 +247737,56 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 CVE-2024-13774,0,0,8a83d9614ece3d83db774ac6d737568407a457cb3937e6845b4bc54d8a51e044,2025-03-08T03:15:36.577000 CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000 -CVE-2024-13777,0,0,c2d4f81a8dc3230470a4ddcfe8af4c9f8f5e51801d3ccbf118c1aa1e9f87533b,2025-03-05T10:15:15.367000 -CVE-2024-13778,0,0,673d14896e529308de549f2928918225a2196f03731d1b9fcc9954d189005174,2025-03-05T10:15:15.720000 -CVE-2024-13779,0,0,b99bad6f9e8dab81292dacf47b36bc0dcc6133647baf854afd6307e5257a8b27,2025-03-05T10:15:16.213000 +CVE-2024-13777,0,1,b33d8c64d6edba912fc043a3b3033deac93a29824073f84ccb4027b47d8f33ea,2025-03-05T10:15:15.367000 +CVE-2024-13778,0,1,1cd44a20570c92ffa74c4f5ba70481f61aa192a2a2398b46a4335c69bf201b52,2025-03-05T10:15:15.720000 +CVE-2024-13779,0,1,1ffd32a1fffa0fd718a2cb240456879b12b680baa85818294612fcea7440bc06,2025-03-05T10:15:16.213000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 -CVE-2024-13780,0,0,f38211ca5b11c6d5cd76c7738bc5c283f5fd75664e09e943a4af464361a3c1f8,2025-03-05T10:15:16.513000 -CVE-2024-13781,0,0,5264af1330cd149e3d1c6d8aa15b68720ea3acbd407c3364a1a57622da13f1a1,2025-03-07T09:15:15.660000 +CVE-2024-13780,0,1,4a7f1e763317ca407995129eedbf1077d95250e5c5bbed2000ed8182a6f8de18,2025-03-05T10:15:16.513000 +CVE-2024-13781,0,1,ca007bfc538fd52bae21c27ae444e4d7f62cf0a469e982d2fd2d0bb2f7761582,2025-03-07T09:15:15.660000 CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000 -CVE-2024-13787,0,0,03e570e664ce22f94ad75fa40c6deb8d23c12b83a62b56497cc82237079e1cd5,2025-03-05T10:15:16.810000 +CVE-2024-13787,0,1,d79a6d0b79bd2977f0fa4dfef00573ec289c08c089fda28a1b70ff85c80f768f,2025-03-05T10:15:16.810000 CVE-2024-13789,0,0,2b0af9ac1cf71402f1bdf617ac72ff1dc3e5b91a3734626a9c4e88889f4b7dad,2025-02-25T20:56:25.757000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26e98,2025-02-25T04:01:52.803000 CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000 -CVE-2024-13794,0,0,7d022241f9cbf94ac9ed1b3f72ace036ea4f25f4241c06ac4a29fc609bc50719,2025-02-25T19:38:05.950000 +CVE-2024-13794,0,1,deb22703f68657fb6f9904f289dd9bf5c49f5d408fc334842a7f50a56248c381,2025-02-25T19:38:05.950000 CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000 CVE-2024-13796,0,0,b7063018a85fc6dff6370df0e081b44bc61db6f1ac3a0f81916fc1f9c074cab2,2025-03-06T20:21:36.547000 CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000 -CVE-2024-13798,0,0,2fd23a3ceae4673afe62b8e23cda28ec1fe45b9d60f7b2a4cfebb6247a6b184a,2025-02-22T05:15:12.590000 +CVE-2024-13798,0,1,5938e11265fb5523dbbecf4deeab5ed27f22d4d52a2d6b7165f69b26641621b1,2025-03-06T12:42:22.567000 CVE-2024-13799,0,0,568137e6611c802d800a1c88238ba60b18e92925318c7d21fcf20c95230c7dfb,2025-02-19T06:15:21.283000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,db269d664e8ffceb549584ac138b0b3d8532020dce3ad8c5501401929c306f63,2025-02-24T15:55:09.120000 CVE-2024-13802,0,0,799c1258f4b5634a2f6e5dae2a8b0b5fa69324e493bf460e3d6851ce5d4c3675,2025-02-25T20:57:34.193000 -CVE-2024-13803,0,0,a4ca05408d0abeceec03de1e4e8a92703bc1137cacd6d3f3c6907b063c9f6ae7,2025-02-26T13:15:38.027000 -CVE-2024-13805,0,0,9367dfc97edd4ebfce8d0f3ee5dc40d0bfd7d972e5a7ad8fc0052e1c2d8c7492,2025-03-07T10:15:16.123000 -CVE-2024-13806,0,0,063c52d53f81bbfeb772e150fd3eb5657c9535abcd0ad4b4f1bb05b9b53e7d78,2025-03-01T08:15:33.653000 -CVE-2024-13809,0,0,6be28e896bf75936478f58fa45f377cf413bed10859f0939689dc8ea299b4f20,2025-03-05T10:15:17.313000 +CVE-2024-13803,0,1,93a9df80fad16c66cdad18cf7b08a600f14f988ff84d4f170dbb9b255e8d0a90,2025-02-26T13:15:38.027000 +CVE-2024-13805,0,1,1e6086e18afae1abb9343564d7bb381a81a68450f10c4ee4e5fd0454d56e75e0,2025-03-07T10:15:16.123000 +CVE-2024-13806,0,1,2b103acb686ba11654b3e2c5ab41948ab81fbeb9ed340b778f561b48dfe3cc2f,2025-03-01T08:15:33.653000 +CVE-2024-13809,0,1,c050ef8696242d35b33aa38b30630d9d6df9b2a0e0a9e387afadfd3873d033f8,2025-03-05T10:15:17.313000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 -CVE-2024-13810,0,0,861c61a523529d8053cf536a51b7d802aa6990937f6cb4926ae7f49fc0b3dc67,2025-03-05T10:15:17.503000 -CVE-2024-13811,0,0,5b94a426632e0b7858178241c275865820be67c397c2529c7a30884806a0bfbc,2025-03-05T10:15:17.877000 +CVE-2024-13810,0,1,c00a0d88fd7b77a452719c368c09365482d04ff4e5f736fffe35ac0f4f9fb5ea,2025-03-05T10:15:17.503000 +CVE-2024-13811,0,1,2a8508f860a1a69d53c0024db98c45142ef90b7a1fc60e050ae59e195717001a,2025-03-05T10:15:17.877000 CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000 -CVE-2024-13815,0,0,c26d747b30e16449187df89ae1a63f232878b2518b742ef230f0e1b934e49302,2025-03-05T10:15:18.210000 +CVE-2024-13815,0,1,4412b59adb2337294d3198cc0cb6ca58e10eac6c61633676dfbc5ba8897df919,2025-03-05T10:15:18.210000 CVE-2024-13816,0,0,cc0ed660c4e98ec0c8e0139557ba1a1f397c873674f832242bf2408bfc3089b8,2025-03-08T09:15:31.077000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb6722a8,2025-02-25T17:03:16.093000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13821,0,0,74f5b87067df469dcc6e71e5e4a2f7f3dcf26b1308f6ab7ad834a12bda68d3f3,2025-02-25T19:37:29.223000 +CVE-2024-13821,0,1,c4eb4e44a47cc783a97d83164c517f80c21576edac7bfce0a1b9d4ee6f34830b,2025-02-25T19:37:29.223000 CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000 CVE-2024-13825,0,0,0db8c4d707800246648cd28b5b93aa431f14bac50a3c3bc09e3ca284ae0e1b86,2025-03-08T06:15:36.560000 CVE-2024-13826,0,0,2568fca2f8ce4259efdd2e11dc3130dbc57de2e90729695fcfd32e6262c097f5,2025-03-08T06:15:36.657000 -CVE-2024-13827,0,0,40b9b2f1bee49602bcbc26b5d44dfb98f0e80093153eca031d92ad08d38031db,2025-03-05T09:15:09.390000 +CVE-2024-13827,0,1,2f0ca45e1aed4689f4e667f770fa7c2c2b82b3b6b79c11996f3151fecdcc8143,2025-03-05T09:15:09.390000 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 -CVE-2024-1383,0,0,93ff0b2eb9f4abe59909f3b49d94bb9635c166ee2ef0054262af8a40f59e1121,2025-02-13T20:02:55.647000 +CVE-2024-1383,0,1,9a7ca27e3e9e1c136c5682d7084731ee4c3dff24e0ba89a42c0d6d10ece5df05,2025-02-13T20:02:55.647000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 CVE-2024-13831,0,0,4c2b1db0ccfc994ec4b508e4cd77974628a0e7ffbd6d59f8a9682096022eb59a,2025-03-06T16:36:54.387000 CVE-2024-13832,0,0,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73917,2025-03-06T16:36:54.387000 -CVE-2024-13833,0,0,25224aa5db16e2fcf2ffae150064444414666930ac899e8863e3333ed3af74b5,2025-03-01T12:15:33.230000 +CVE-2024-13833,0,1,0880b5318dcbe63992d3f2badd6c78eb8ebd6b2e485dc13d406b59785dd947c4,2025-03-01T12:15:33.230000 CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000 CVE-2024-13835,0,0,bb466c42b5ac88f927aad0c176f7f2be8448370020dc544158a1fa7d8a0b9abf,2025-03-08T03:15:36.760000 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 -CVE-2024-13839,0,0,62f4a375bbf895765f28a4885fa21c7e3b5b50d77a9c8d8b3041b6036594e93c,2025-03-05T10:15:18.443000 +CVE-2024-13839,0,1,271371a4da5d24a94b607140c89c40b4d635e3f04318c9eb7bb8dbeb5839bd6e,2025-03-05T10:15:18.443000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000 @@ -247799,16 +247799,16 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050 CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 -CVE-2024-13854,0,0,b568f01b297c5912b2612b134f4f5250b2d30544244315a9c47edd8900e54042,2025-02-19T08:15:21.440000 +CVE-2024-13854,0,1,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 -CVE-2024-13857,0,0,757939d2dd49b49f809716bd6a8149ff4a10aec4bcc47cc170371d68bb7d5a63,2025-03-07T10:15:16.293000 +CVE-2024-13857,0,1,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 -CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000 +CVE-2024-13866,0,1,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 -CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000 +CVE-2024-13873,0,1,6c96e990e2774245ef5b434d5e9fd883c701128558fbe3a5272bb275ffb354b4,2025-02-22T04:15:09.567000 CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000 @@ -247816,24 +247816,24 @@ CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 CVE-2024-13890,0,0,d452a5111623aa86043cbddfa436e2d521f4dcc26c698968cb86e8735048f390,2025-03-08T03:15:36.920000 -CVE-2024-13892,0,0,ba0368883c2ac157aa0b89e8621108c536bde0ab709b9f9a40478f1765f6e3de,2025-03-06T14:15:35.453000 -CVE-2024-13893,0,0,6f74c79e0ddcf27b881db98cdd572d3b259cd7cc0ec9c224906e3f24eca39b98,2025-03-06T14:15:35.630000 -CVE-2024-13894,0,0,c08825403e20d9b7d3a5a72ea2c2234dcb1ca09965a1b602a57d161ad708794d,2025-03-06T14:15:35.777000 +CVE-2024-13892,0,1,4a8333f7cf2dc9fe908890828e0138c3d518368c70f4ee66b6c3ed51d0d756b3,2025-03-06T14:15:35.453000 +CVE-2024-13893,0,1,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b6958846b,2025-03-06T14:15:35.630000 +CVE-2024-13894,0,1,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000 CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000 -CVE-2024-13897,0,0,07f598b96e670ba19e3823cc39b2ae054e4338a7f34c42c2715bbbd41cb120b3,2025-03-06T09:15:25.787000 -CVE-2024-13899,0,0,372540a329e3dd48ea203e26ad119a2f49b08582c995a840b88c85b67384dc50,2025-02-22T04:15:09.720000 +CVE-2024-13897,0,1,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000 +CVE-2024-13899,0,1,870bc582b4e5e54ec271b834ba532de1ec152c1fd74f806dea51cde0522fe6e3,2025-02-22T04:15:09.720000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000 -CVE-2024-13901,0,0,b4d4185fc2cf368e3c24da5377f1f5ad78958c5d2f761e097232a413aff597e6,2025-03-01T06:15:33.827000 -CVE-2024-13902,0,0,d88d3cc9e45e0c55d2afb6679644be58fc5bebe0dd23fa62d23f86a13679c70f,2025-03-06T10:15:09.900000 -CVE-2024-13904,0,0,6ed46fabfefc9c5da61282f47ce5a7f4388439dd6fcf28ed8981cf00c9bb35a8,2025-03-07T09:15:15.817000 -CVE-2024-13905,0,0,94a06017058e47ea224d64f1fcc59573ef0629f841649e95825b26eac6b9c491,2025-02-27T05:15:13.610000 +CVE-2024-13901,0,1,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000 +CVE-2024-13902,0,1,2d798b0c40a1d59ba77da363cceb392cdd45de698d6466927a1240987fa60f3a,2025-03-06T10:15:09.900000 +CVE-2024-13904,0,1,4066bd52c81a7420cad2f813b88c8a82bd66a4addf44ebe17ec9b3f40af765e5,2025-03-07T09:15:15.817000 +CVE-2024-13905,0,1,c66be7cfbd34a458bb74dba95d4e6476fcc9754cf0f34a578dc3aa455a41a709,2025-02-27T05:15:13.610000 CVE-2024-13906,0,0,49d3c886d6eb569e3be95840598d3644d2e3a759a922a1777a4a1a594b4b6b41,2025-03-07T08:15:37.467000 -CVE-2024-13907,0,0,f2da3425f3470ad3127836884558cd2ad3921d2f9bdfdbcb35d8a21b911174f4,2025-02-27T07:15:33.543000 +CVE-2024-13907,0,1,6fda522756c0eddffc3b4aa0f215f879fcfe6340ad02f1a9da7e38e20feb022c,2025-02-27T07:15:33.543000 CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537b5a,2025-03-08T07:15:10.690000 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 -CVE-2024-13910,0,0,1da974c8b4278339ddaf4e1b70396d7d0139387963424ab28e0cb7907c842a5e,2025-03-01T09:15:09.517000 -CVE-2024-13911,0,0,5c6ec30a98a23b22a75401ffb9290b39df569bd0f5609894fc8fdc52c5d0d4f8,2025-03-01T08:15:33.803000 +CVE-2024-13910,0,1,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000 +CVE-2024-13911,0,1,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 @@ -247843,7 +247843,7 @@ CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c4 CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000 CVE-2024-1398,0,0,9645ba9f8586ede4d8e9304631788266d0cde74989f61af36e6ddca7859998d4,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 -CVE-2024-1400,0,0,bcf94319046a2baac7f1dfc452191e96f3b460855e6ccd31321cea921f511c0d,2025-02-05T20:56:20.887000 +CVE-2024-1400,0,1,bac94fa923e5d8ff034c18d15cece1c7c0b0b8e72e665f80cf1c9da5ac122607,2025-02-05T20:56:20.887000 CVE-2024-1401,0,0,aacd439a69914554cbcd89a76778f88178b8f02575b95bb844c89b14ab015b63,2024-11-21T08:50:30.317000 CVE-2024-1402,0,0,c16a2bb5e28338a9b7a8e909fd1180bd46f3314048e1fd4a395f2a2357ace438,2024-11-21T08:50:30.447000 CVE-2024-1403,0,0,586131040c12c42e3d4d259065af315a9ce447a030f9164bd11968bf5202492a,2025-02-11T17:40:59.267000 @@ -247879,7 +247879,7 @@ CVE-2024-1432,0,0,7035f463555ee4e0684bc896c4ea5cdcaa9577bdd0b576d53cf315b6b4fcec CVE-2024-1433,0,0,87f22d20b32269d8237d95a25fad63601c11890ef469b28ff99ec357c5b21268,2024-11-21T08:50:34.517000 CVE-2024-1434,0,0,4cd902021791f41d9c78ef6d8ba8469ddad150aff01c04c36066bad68439c9dd,2025-02-26T15:14:55.753000 CVE-2024-1435,0,0,6578ea99a4c709392d9427dc82fedee26c09fa747c37a77ca6ae7e929bb94a3d,2025-02-26T15:14:42.477000 -CVE-2024-1436,0,0,14b3a24961eb40085fef36f9c497d02c55cd4a2fe9da01bc57f1a2204e2f19e2,2025-02-27T03:05:58.637000 +CVE-2024-1436,0,1,cad3ed0f053d9231bfb6a2eaa3dab45b0e95ff9b206de16acf0c00183524dc4e,2025-02-27T03:05:58.637000 CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e257b,2024-11-21T08:50:35.123000 CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000 CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000 @@ -247894,7 +247894,7 @@ CVE-2024-1448,0,0,5526aa130c96da8910caa6efdc03c8520a1309b057f2df26b50043d1ed6a5f CVE-2024-1449,0,0,95a37d5ef698eee492da651c7884d70c40bd960e6512acbe5a06fb32eb9cd083,2025-01-07T17:38:57.307000 CVE-2024-1450,0,0,2c4685806ad094ef0e67bd2000051393b62a0d6ee127f95dcc18abbea7135c6a,2024-11-21T08:50:36.610000 CVE-2024-1451,0,0,b0465625c202e8f09e409320e5302d0e1b7fca565c7881c89608e7a88e11ffcb,2024-11-21T08:50:36.730000 -CVE-2024-1452,0,0,0d5ef33ed18cfe6afb9e5ddd11bf0c4f1f56bedc89751ce9b22df72c9a658963,2024-11-21T08:50:36.890000 +CVE-2024-1452,0,1,9a918b72f8e97c0b2263861ef7d3ced3071803452b6d37ceaf7e6e3727c089d3,2024-11-21T08:50:36.890000 CVE-2024-1453,0,0,0227e7a01863c94405e531357cdb0c10b796444052d7a86292908c61c86741a3,2025-01-16T16:03:19.477000 CVE-2024-1454,0,0,efee886e7293fa134cee300a2fdd8efed7a47176b613af6fe8be478634f8010f,2024-11-21T08:50:37.150000 CVE-2024-1455,0,0,e455ef50023fd394d707ee63f10df4453b9d4808077ff1d6df4f5071b048364b,2024-11-21T08:50:37.310000 @@ -247904,21 +247904,21 @@ CVE-2024-1458,0,0,64c7a0990a0e5ef06a6e068d0f77c7374d95774ca4d8bc6bad25be47e5b94f CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d0440,2024-11-22T12:15:18.250000 CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000 CVE-2024-1461,0,0,8dba5338edac7720c236df8c7d75c36d10f5b1986f4c4e03d386744d26d52663,2025-01-17T18:24:39.060000 -CVE-2024-1462,0,0,a9d595a4b8d7dcbc6f6cebe4ddb3b5bea8219d90836323a2268f691d3742a375,2024-11-21T08:50:38.210000 +CVE-2024-1462,0,1,149383118fa2a82541f156f2b786f4ab585fd9f52459e517e84c1723783fedc5,2025-02-24T14:59:15.267000 CVE-2024-1463,0,0,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000 CVE-2024-1464,0,0,5381513a296e0115ec061d8021538ebcb7a85f8770f33c8709fe5ce514f2b318,2025-01-17T18:23:39.073000 CVE-2024-1465,0,0,6e2482f9a41a51ae12b482537f83a337bec29ff5e6cdb76e1e42ee95e1d60318,2025-01-17T18:20:39.593000 CVE-2024-1466,0,0,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe9e,2025-01-17T18:18:00.443000 CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000 -CVE-2024-1468,0,0,1a6087b1a8165e54c53a2dc7362f46b2d8ce53c1621b4eb211a7e9dc375a85dc,2025-02-05T18:12:24.317000 +CVE-2024-1468,0,1,493e633ce8cf100bfef1d08d0903f698bbdb3a968c742556b570e8bd4e3af1c6,2025-02-05T18:12:24.317000 CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000 CVE-2024-1470,0,0,8f3d9e30e6356f6f03333fcffbe645c7bf7c4fc576142a7e721ae6cb68df2804,2025-02-14T17:24:17.347000 CVE-2024-1471,0,0,777aec2b62d8d0522847f5c8ad1ffb32c1bdfef2816c32249a594f8d812bf3ca,2024-11-21T08:50:39.250000 -CVE-2024-1472,0,0,01a5617e84ead54fb95e130944394cf6f262cc53c7db3087520b14224406ff69,2025-02-27T22:03:40.670000 +CVE-2024-1472,0,1,3c70f48d9a2c5ef8b36367792c32b13c8a12222bb4962e49ded8bf343f941d8b,2025-02-27T22:03:40.670000 CVE-2024-1473,0,0,aafc4208b64207c289fb7fa79e92b69d4c317656d7d161979bf4ff87a330e78e,2024-11-21T08:50:39.520000 CVE-2024-1474,0,0,daadec47e39f2f44b7199c43a754dd51ef7d732e2acb33666807f90722fd7837,2025-01-02T13:58:35.287000 -CVE-2024-1475,0,0,2943f7a10ccc21b695d339dbb5cd2fa720adddf26c7b6ffd0baab0bd23bdb948,2025-02-27T22:03:40.670000 -CVE-2024-1476,0,0,e178d9cfb726d4cf00b181cfb25ba5280836c613196cee5eacdfc79e432c1bee,2024-11-21T08:50:39.913000 +CVE-2024-1475,0,1,a65547e44f4d4f8835b53dba04ef964c43cd3d0f72babfc9861207d2ef3dbdd0,2025-02-27T22:03:40.670000 +CVE-2024-1476,0,1,a6e823a347b5b5ba1091d3b0fd7386e2542517f1c552ed290a42b51722b742d1,2025-03-04T12:24:19.653000 CVE-2024-1477,0,0,74348eadb6214ad07d05d1e235932a474c51a995984a56d966fc8b6d5d3bb97c,2024-11-21T08:50:40.047000 CVE-2024-1478,0,0,9b2c9ccb149f278f720fe97b0937c0a2f45e9dd8ea2423171dbb0d6662d41386,2025-01-08T17:07:21.747000 CVE-2024-1479,0,0,c7283f34b845ac740b46bb86e6e9152daa93daf0e50e0fc93e6ca6218c144124,2025-03-06T14:24:40.890000 @@ -247926,14 +247926,14 @@ CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0 CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000 CVE-2024-1482,0,0,60272768c52b423065e24b6229c88409ec8bdcb6bc81af7dfbe638244c7c7d48,2025-01-23T19:53:54.957000 CVE-2024-1483,0,0,c77f6a3597cd9332579158d5c1effd3f6d100c1f11fa79391f7881cafc454ea0,2025-02-03T15:02:46.710000 -CVE-2024-1484,0,0,9a32df126759987e5250b83dcafa91beffdf56c507b193272d399891f107651f,2024-11-21T08:50:40.970000 +CVE-2024-1484,0,1,089b10816f084c7da9836c1fdfc542fc6d1ef443037cf7eb6fd6514bc1d4f969,2024-11-21T08:50:40.970000 CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000 CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000 CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000 CVE-2024-1488,0,0,bdde88c2dae24117dcff9e354ec8b5114157ed5561cc258eab2815d179ac3088,2025-01-30T22:15:09.037000 CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000 CVE-2024-1491,0,0,d70967d622773fff19c9093c078311d0c0317938407098534f36b503281d0d6b,2024-11-21T08:50:41.773000 -CVE-2024-1492,0,0,59343017212ddb64bbe621b975505cb84ad4611a92838c8772b58396c8764654,2024-11-21T08:50:41.923000 +CVE-2024-1492,0,1,c4f9f9c4236fe80c6abc75ceb9dcf26448151cb52cc1b5842cb33d20a309dcd2,2024-11-21T08:50:41.923000 CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000 CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000 CVE-2024-1496,0,0,859e7e5d8a917a39094959f5e651d557a15d14e7f8da8d3e05e54ad75be23b72,2025-03-04T12:25:17.263000 @@ -247941,7 +247941,7 @@ CVE-2024-1497,0,0,bbe3250bf4479120430c0f29b882afc9852aab2e448bf41f0296f987b62a68 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,0633316f47685281ee22de44984ee86e019a3a966e3a05caf35512f407ac2251,2025-01-22T20:58:15.017000 CVE-2024-1500,0,0,7bfbfd7f7c0ef8fa4afdc863c1d8fd768e05a37a631a8321003f16dcf9167941,2025-01-08T18:34:33.033000 -CVE-2024-1501,0,0,18d0f3a9d598a27591c06a911866599217bcff8e6fc10346c1ab810f84ff06e1,2025-02-26T15:14:42.477000 +CVE-2024-1501,0,1,cea04954300b377feda18f5872df64fef616b08298b4ac01237fce0abf6518c3,2025-02-26T15:14:42.477000 CVE-2024-1502,0,0,fcde604d4a7c0628f2a9a4d7ccfeae5e30232d291f179882e82357fd13177d22,2025-01-15T18:34:26.217000 CVE-2024-1503,0,0,701aab9502169da6744faf6af51f6a159c418115b00c7ffe0d0aa53bdb78b3b4,2025-01-15T18:35:32.333000 CVE-2024-1504,0,0,d581c9656f5131563cedb677e916eb2d390674aea901c47070200915ed1b024e,2024-11-21T08:50:43.387000 @@ -247949,16 +247949,16 @@ CVE-2024-1505,0,0,cda9de908aad652b6489594e2f3a94bc4cb695ddd310af6ee87c7b7a47e086 CVE-2024-1506,0,0,2edf209660dc0410f3a37c23d0d840ccc2ae4b919882d74e3c33c53eba2d77d4,2025-01-21T18:32:56.010000 CVE-2024-1507,0,0,c3484eb348fc4bda677318dbf5f9db8435f9fd469134f1f05c3aa9f77013f087,2025-01-21T19:02:12.617000 CVE-2024-1508,0,0,fcb12e81603518991b3714d0146406aa3ba4165f2bbbda4d728b388f1cec3c33,2025-01-21T19:01:59.473000 -CVE-2024-1509,0,0,c30f6ec13d90d0ff3dfb139939f1d3411acd950d5061314c55ab96acc14a414f,2025-02-28T22:15:38.573000 +CVE-2024-1509,0,1,fd6d3c73a61b901e32bfa7f747ec571a0c759eae41a33db8e8c96702965851fe,2025-02-28T22:15:38.573000 CVE-2024-1510,0,0,fc6bf8aaae38d5c45449b6d3b647fcd785ec0c1d72e1dd5e0b1f19b5969e8476,2025-02-04T21:00:07.557000 CVE-2024-1511,0,0,b11b362f2acbc196f43a92e45bae6b3316a9a34999d9162dab309d4eea0f751a,2024-11-21T08:50:44.160000 CVE-2024-1512,0,0,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c14001,2024-12-18T17:23:15.360000 CVE-2024-1514,0,0,d48ad0f68b905db26eea1aa20744620a566afbd3308a47eaec63aadfb7f0edf5,2025-01-28T17:50:30.417000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 -CVE-2024-1516,0,0,baa5921f85f4c73ada68aa4c1ff99d81b5c62b9c2984bde2656107e781c1edb6,2025-02-11T20:02:48.067000 +CVE-2024-1516,0,1,d7426e626f7cabc7f490134d20676919d65607359d8123909d0c7ffeaedf7492,2025-02-11T20:02:48.067000 CVE-2024-1519,0,0,ef8db52d6697b00e9b63b12b86b1ca9a8ef9f7b004809c241d596d1b84437d97,2025-01-22T16:38:11.330000 CVE-2024-1520,0,0,42b948a706335187322a4277626050fd427db0ba076fbc016021b2dffcc98301,2024-11-21T08:50:44.787000 -CVE-2024-1521,0,0,85d803e7fe3d979f91dca5b591f48c2f70fe4bd0fc6f503898efba23c478b51a,2024-11-21T08:50:44.933000 +CVE-2024-1521,0,1,6d1bd63cac9eb8b4aa384cd5be2fd2d486d509c453b75b2fa988774f4465a151,2024-11-21T08:50:44.933000 CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000 CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000 CVE-2024-1525,0,0,c5719c2d073faeda894e23a5762be2b220de3339124866e59d0ff45c5692c966,2024-11-21T08:50:45.333000 @@ -248001,7 +248001,7 @@ CVE-2024-1562,0,0,0a93e23e607783a468fe6a5e261bd165adf5f21858b319d8364ed043431cc4 CVE-2024-1563,0,0,6793d0a12b61b4bac1ff66a2c864b448499a7b8ce03c21bccda3674836e700d0,2025-01-28T17:39:20.570000 CVE-2024-1564,0,0,84ceb93463fa25d921ef01feb499d06d312a061c27da82d4c95abef3e4e86329,2024-11-21T08:50:50.673000 CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f67,2024-11-21T08:50:50.860000 -CVE-2024-1566,0,0,8d5eb5aef71b735e084bc49afdd1e3bd8ec63f8e572f1d6f59d902620fbc358b,2024-11-21T08:50:51.007000 +CVE-2024-1566,0,1,141da1a59190872ac79cba5fdbe58ac37b08812423c950a7d160a5fa7ecadee8,2024-11-21T08:50:51.007000 CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000 CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed14189,2025-01-16T15:34:31.447000 CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000 @@ -248018,7 +248018,7 @@ CVE-2024-1579,0,0,9240f1b1902f0768b99712f7029a7e0cff6f424284f1f413cc0f572b009c10 CVE-2024-1580,0,0,b4c85f804f3ce2bebc9a67ff4f8729e521ce8a5ac9e2676ae788d23145f50c1b,2025-02-13T18:16:25.577000 CVE-2024-1582,0,0,b464a7d153c2341a87cab438d3cbd89bdc0b71381693f648c2e94a9e1b3f1c2d,2025-02-11T15:57:12.813000 CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e06,2024-11-21T08:50:53.187000 -CVE-2024-1585,0,0,1d475b7c85f620c08988c251c2895ab948e7f3ba822cf6ec7f5aba08404a5ef1,2024-11-21T08:50:53.310000 +CVE-2024-1585,0,1,14380834e1dd31de65d1c5040f305717ebe1d086971e626282c6f2af189ec5d6,2025-03-05T18:24:35.503000 CVE-2024-1586,0,0,541da7657b20f087f9ba81ec37e77af1ce0070c0f329c6e392de3f525200b8a0,2025-03-04T12:25:17.263000 CVE-2024-1587,0,0,9d367856c23035719b91ca8cb6ecef3700bc507de87dd872f0f3db6ad94fac7e,2025-02-26T19:15:20.073000 CVE-2024-1588,0,0,064c6c0dd6f975ea15e06fcb223479e78a68292a40c160ed7cd24d23d617f190,2024-11-21T08:50:53.673000 @@ -248028,7 +248028,7 @@ CVE-2024-1591,0,0,47a6e7f965ad05e89026d1d1c7b51b4fbd3e2a179c0283326c20740ee57474 CVE-2024-1592,0,0,73702fff33e90fa05b3f4cb8dbb440f9053ee74ad130189d9e3e8eb163d134db,2025-01-16T18:44:36.740000 CVE-2024-1593,0,0,61e6665a098fe2285948dd3d9e1cbc00e0561a97950f4994c50df0364c77511b,2025-02-03T15:41:20.283000 CVE-2024-1594,0,0,b6160934be5a2e077d2651768d4532642c3808745af9112bd3dd97dd9920bb5b,2025-02-03T15:41:00.377000 -CVE-2024-1595,0,0,79f110f1ea0f42e53528b9fcb94dd8d98a8238c3bbf4eb28f52fb84b8972efca,2024-11-21T08:50:54.570000 +CVE-2024-1595,0,1,d4aafdcaa3e3173c64718299c2e1619c61fe1908544ed3071cce53f49dfcf028,2025-03-06T14:24:40.890000 CVE-2024-1596,0,0,d3ac46e8542021623a10cb9a7fcd7c0ff096d3382d6c4002ee880e3d788b395f,2024-09-26T16:23:08.650000 CVE-2024-1597,0,0,314f465a4b86dcf509c0638dd3f53180dd9fe672bb83b647acbc02f1aa37f96e,2024-11-21T08:50:54.813000 CVE-2024-1598,0,0,658346e9ddb00077c89c098f1dc70fe615aaf1be46069a7e9dd54964c2ceba3a,2024-11-21T08:50:54.990000 @@ -248037,9 +248037,9 @@ CVE-2024-1600,0,0,10ef0d97da1af05e4452c1d5b85c6b86d92a91f8e5aeffb132a19cd0ecdd10 CVE-2024-1601,0,0,144a783d83759d1f22b634484b2bbef03f531a52b9217df0a5759fb08e47b78c,2024-11-21T08:50:55.263000 CVE-2024-1602,0,0,56ecc218dd37ad215a177db8079488241e64c43dc3bae7eec42fdf1bdb84777a,2024-11-21T08:50:55.387000 CVE-2024-1603,0,0,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 -CVE-2024-1604,0,0,bfde0bb1e101b19ddfa8682b34219ce827759940ee0479651e0253309aeea5ba,2024-11-21T08:50:55.637000 -CVE-2024-1605,0,0,615f67f4e2399bda85e00d3939862662e5681e6f2895c4109988b01537768989,2024-11-21T08:50:55.790000 -CVE-2024-1606,0,0,120e60a8bdb057e9fdc44a2ea98e9722a08204bd876d4659863b7a70a986db91,2024-11-21T08:50:55.920000 +CVE-2024-1604,0,1,c14afd1ee34d308db8a3e37978da05228522371e624c4b075b937c5c95141f3a,2025-03-06T14:25:09.843000 +CVE-2024-1605,0,1,4368a43263e46a2e5dd9f4b29b6df8a4297a52386c05465e8a5052ded2a0ac52,2025-03-06T14:25:09.843000 +CVE-2024-1606,0,1,b80c558e621cf09b35cf08e2521d3ab2a3d579224a84c6bce514a37629c01277,2025-03-06T14:25:09.843000 CVE-2024-1608,0,0,0a57ef7d0ee1c774c7263d04a6788a7f66bae8cf3338ec576b87a084004d2400,2024-11-21T08:50:56.057000 CVE-2024-1609,0,0,fccce712d5b51d64f058f686add884943b63cc50b1aa573fc5b42dba9ff87c96,2024-12-25T04:15:06.750000 CVE-2024-1610,0,0,d5812a4c168fe77b942e08446c0de47072455d9314c53f81af852c4034bb9f3a,2024-12-18T16:15:12.060000 @@ -248070,8 +248070,8 @@ CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a39901 CVE-2024-1644,0,0,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,03699ee0a8ad7836aa080c25f42b206191e3cf9bd749532c452b30589acf9403,2025-01-21T21:12:54.303000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 -CVE-2024-1647,0,0,ce3be4d8f821f4e1fd6329d319e1ff7d0d27b99ae4ab9eb68d5e807b4d2ce373,2025-02-12T17:03:00.353000 -CVE-2024-1648,0,0,da66215f0c1df2164f9c9e7cbd2a1f4fa1555fadd6639c29f46419bca874d0aa,2025-02-12T17:02:43.703000 +CVE-2024-1647,0,1,a95f23533c20d97da5f0bc52790c35ea9bed29bd1018e432598820f8324552d7,2025-02-12T17:03:00.353000 +CVE-2024-1648,0,1,c219343883ebe10b46465ab8b70bbfa0b17b466b682ea8ad6bf506eb38a4713b,2025-02-12T17:02:43.703000 CVE-2024-1649,0,0,3995ef5fb459ded8b32a8890e4aedac63a2bb4749fed72dad67aa0191b67d631,2025-01-07T14:36:30.327000 CVE-2024-1650,0,0,a441a3234d4bc9bc6df0346100d67472c50763d928aa51d268163520dd5dbd9b,2025-01-07T14:36:06.543000 CVE-2024-1651,0,0,1c5d4820fb340a2e16582ccac4fd46e85bee196ca0ea8c92b226a31374278919,2025-02-12T17:26:55.357000 @@ -248111,7 +248111,7 @@ CVE-2024-1686,0,0,866a1c96d4aa74389c113d68789c3e80de4a865bdcf2d542b10935f5e4dd3e CVE-2024-1687,0,0,ab5398edf4b8efdfec1e6c1c2e9afc128e0e27a6cb3e018ca14e2f9edae1115b,2025-01-15T19:53:11.960000 CVE-2024-1688,0,0,d444d817db036efaac5f0bcc589b1371cb8edcdc3232d167d45921b644e59486,2024-11-21T08:51:05.417000 CVE-2024-1689,0,0,7b4924415f013ed776a662a888a67f638609a0d7f17fe4fa93b6bee7be9adbcb,2024-11-21T08:51:05.540000 -CVE-2024-1690,0,0,8472172ce4aa66dd2d86f977df5b5dca354d75d9fe0f03b70f7fb94c3a4b5a8d,2025-02-05T15:08:02.967000 +CVE-2024-1690,0,1,896d2f290278f9056c45a734ed1d630439c6b89e79a4a305ae8180360e7f4174,2025-02-05T15:08:02.967000 CVE-2024-1691,0,0,a421f0541420a4013ac01b18d37b1245277226d0c652bbd20351d6701b67f5be,2025-01-23T19:51:46.943000 CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7acd9,2024-11-21T08:51:05.923000 CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000 @@ -248130,7 +248130,7 @@ CVE-2024-1706,0,0,71fc36de238f0366dd55cbea7bcd8880ece128b41623b8bba05a9729ba48f8 CVE-2024-1707,0,0,386296f7b2d2f93198c912dd937a6be54a5c06c07c6e4c13ded38903cb47478e,2025-02-12T01:21:17.617000 CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000 CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 -CVE-2024-1710,0,0,af93532eea5d03ba5223db6b4321637518c90cfd9fc5ed3431d8daa1be9c556f,2025-02-27T22:03:40.670000 +CVE-2024-1710,0,1,9ae09dca75c8444439bf0839ddfdadfcab06f2b70b2f3e8a028b2977eb89cbbf,2025-02-27T22:03:40.670000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 CVE-2024-1712,0,0,bdb3e0c816aad12a5ffb83e96d47614474081689b77384ea123451ea94b467f7,2024-11-25T21:15:12.783000 CVE-2024-1713,0,0,2c4b0a7ec23a0438b0f7f0a179c6acb91b550ffcb40b7c7185413e8a48111cad,2025-01-23T19:18:07.843000 @@ -248139,7 +248139,7 @@ CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e6 CVE-2024-1716,0,0,9071d172382b58d2d56e01c889ae6e33397cfcf61eae965493f6ee5942820f8b,2024-11-21T08:51:09.123000 CVE-2024-1717,0,0,c3adb19f25e9ee450a585b7bb91ab43887106c17932e8cf3f974c96db2950633,2024-11-21T08:51:09.260000 CVE-2024-1718,0,0,70746d52697ce738d10ef4d93f461374c829b5e4c0cdb84c66e02ad290238127,2024-11-21T08:51:09.383000 -CVE-2024-1719,0,0,3b9469f69e0635bd2d08bbe23cd2cf6b410ff97c7bd8a0790568f375dc19df97,2024-11-21T08:51:09.497000 +CVE-2024-1719,0,1,aaf759db66f590b8eec01b386ce5a6c70d5eeb5d95b446e7afcda6ae2feca3ca,2025-03-04T12:24:19.653000 CVE-2024-1720,0,0,ffaa3e4706968a22cde548a2c01de699ce397eccc11d936af06b490c297ae578,2025-01-21T16:55:34.067000 CVE-2024-1721,0,0,d0c914e77af4545b0584eaf250ba5ee3ac40626828eb6c5198526b9da864dd02,2024-11-21T08:51:09.737000 CVE-2024-1722,0,0,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000 @@ -248192,7 +248192,7 @@ CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa5 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af4493302727,2024-11-21T08:51:16.577000 CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000 -CVE-2024-1773,0,0,09a7c9c74fe7c70cef7fb053b53998979578c2ee7f0671bfe7a5341c93f32a8c,2025-02-07T19:25:53.603000 +CVE-2024-1773,0,1,8c65223f5516c06a2296cf03b178bcc4f946b8107a149044c776ecc9d166fc1e,2025-02-07T19:25:53.603000 CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000 CVE-2024-1775,0,0,b8c203919e47126bb6c2af66dc4bbb6f7b785958b0e56ffc05a0a4a6fa9fb683,2025-01-16T18:39:46.423000 CVE-2024-1776,0,0,8f687e2a9e9f6a8a4412858b8c915f4a1820886d213022ced72ddabc13336d9f,2025-01-16T14:34:59.577000 @@ -248210,7 +248210,7 @@ CVE-2024-1787,0,0,a020a5c2a4ab7ad70ca3624e6b182fcbe5b860cbd5df83fa706e200dfd1c4f CVE-2024-1788,0,0,944b68ae7c4fef863b1d252fdfc9f6e4803358c1ba216ca2f540fdf15cd93ec6,2024-03-04T13:15:44.523000 CVE-2024-1789,0,0,2d072fd3e0a14c223d8c9fc1d03732a6e2b678d1507f636486db4f8121dced31,2024-11-21T08:51:18.780000 CVE-2024-1790,0,0,3a79f763660fa01aa4e9e14b4bfe838dd8ad674d5888cd672cbe685b1f521bfb,2024-11-21T08:51:18.903000 -CVE-2024-1791,0,0,f6aed72c2e61132a034aa7d3aa8a0945bc3f0b3c20ebc42a3e832ed14fae3e30,2024-11-21T08:51:19.037000 +CVE-2024-1791,0,1,e69fc11f444408ba21af6c7da4a626c0b2157f285ea34d24b122e91218578ea2,2025-03-04T12:24:19.653000 CVE-2024-1792,0,0,5c91c39087a11a285932b6df2f786b9ee27b789c298d617daf628ee7a5671929,2024-11-21T08:51:19.200000 CVE-2024-1793,0,0,1247321dd371ac163a2d163c7822069c7d100252b9c561f2f44a64adcc334d96,2024-11-21T08:51:20.010000 CVE-2024-1794,0,0,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 @@ -248218,7 +248218,7 @@ CVE-2024-1795,0,0,5d11bf1b8dc2b5c0d5b4fc8d4df7bd6ebd06ec9fc982e70886676d8ffd994d CVE-2024-1796,0,0,68e9ddfacf3afc0af79bfa53830daae380aee08e50d59d0729da4a8eb41d2478,2024-11-21T08:51:20.390000 CVE-2024-1797,0,0,8a86b9a23c2f404495c192d39ca153ea7af461d55a03a2b3b5625ffff2374a4b,2025-03-05T15:11:27.097000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 -CVE-2024-1799,0,0,ce13c6b26581557f75d58a2c3e31cff1ba5c8746dd0f7905466ddfc2bd34017e,2025-02-04T20:59:34.903000 +CVE-2024-1799,0,1,f9b05aef34f051d66c559785b2000250f129f8480eabba8681740cc2ff082c4e,2025-02-04T20:59:34.903000 CVE-2024-1800,0,0,4198f2af30da2326c4f00a8a81874f56fa7d692eb5115afc306e3d02e598b03f,2025-01-16T17:07:24.633000 CVE-2024-1801,0,0,09176e4274a4aad405863647b4bf412248999db3a16422c417a364400eabf7f2,2025-01-16T18:04:52.037000 CVE-2024-1802,0,0,e397e6b7dee998d4237cdf34cb2f4f4f12723d9ff7f8f5340fd21a36dcdd1526,2025-01-07T17:38:34.240000 @@ -248262,7 +248262,7 @@ CVE-2024-1843,0,0,8cebb54e6e6bada4ba6058ac33a3be4d41f8e198928caf73bb4216e8c8ce36 CVE-2024-1844,0,0,63d73d8c0dc981d90a8a5642e9bafd84801f8e29cef61b3806812a30d28ff6cd,2024-11-21T08:51:26.370000 CVE-2024-1845,0,0,5ad32a93a39ee3c1ad04088537a909b22750fc076779f4791b0dda34383f6d29,2024-11-21T08:51:26.497000 CVE-2024-1846,0,0,875b799c9f46367653d6b325cda5eaaa6a0ef5a0d98c9ff3931d510eab73a775,2024-11-21T08:51:26.683000 -CVE-2024-1847,0,0,5a3890e40dc921d26d0da68b10ae1faa8566be3f4694095de9097d358b4f6c0f,2024-11-21T08:51:26.793000 +CVE-2024-1847,0,1,e8e02d572d2df3b6969a51ccc0cc68c33781d341e39a528b812643babff65383,2024-11-21T08:51:26.793000 CVE-2024-1848,0,0,8735f85a25ad95e4a65a2b665132446d6359269bce36b36833981dd6b68408e9,2024-11-21T08:51:26.970000 CVE-2024-1849,0,0,8665027dfc76b0d19cf6101cc43e8e713146c9df3130708dbd56a031ca923282,2024-11-21T08:51:27.100000 CVE-2024-1850,0,0,488104d209793394a1bb79f55aba5cb71db3fa74266892e446dd3f6d627498f2,2024-11-21T08:51:27.283000 @@ -248300,15 +248300,15 @@ CVE-2024-1881,0,0,2558a52b142d519b854f3883944e8ea95b305aa8f68977dfa1c288c02b89c8 CVE-2024-1882,0,0,a8b97a99fa856b3f930994d912c238658842dc8e8826986c5dc2afc7385cdf50,2025-01-23T20:30:14.080000 CVE-2024-1883,0,0,8c261cc228d1b82620cf2cdef8c32777357acb917a78f3f5e7773813436c2dd4,2025-01-23T21:06:04.687000 CVE-2024-1884,0,0,dd9991f23f96d1475f8f87eedbe9dab6f95e7451746a5525c0e25a086339b8ab,2025-01-23T21:06:27.910000 -CVE-2024-1885,0,0,a9708224fd216e7589a2fb46e67efc741fb00b4849d0a19d92bf6a75e4295db7,2024-11-21T08:51:31.503000 -CVE-2024-1886,0,0,0b422422cbbb89ea3046dd5d41ff91296c2404e98ed6051303756e690e4752bf,2024-11-21T08:51:31.620000 +CVE-2024-1885,0,1,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d70,2024-11-21T08:51:31.503000 +CVE-2024-1886,0,1,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000 CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000 -CVE-2024-1889,0,0,526aac108458913e06cf38bf9def3f82e93593105aaf5c2c8e24b649c57ab353,2025-02-27T22:03:40.670000 +CVE-2024-1889,0,1,6f1c394355d61fd3dfd86d4099249eb53a2f4907f747ba36a260148264b84ed8,2025-02-27T22:03:40.670000 CVE-2024-1890,0,0,04472b515f8f4dd3f0362d8c1884d3ae0c78171c034b7a407836288f05db8e0e,2025-02-27T22:03:40.670000 CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000 CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000 -CVE-2024-1893,0,0,c500190c2d4b6ea6ac643286348bf8935c7a3979ee34c7c6a34fff7b109891e0,2025-02-05T15:47:12.477000 +CVE-2024-1893,0,1,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000 CVE-2024-1894,0,0,5f7debca258de63a030f43b257eea3885330ce9bec9f619efd4d0e0a45be4e24,2024-11-21T08:51:32.663000 CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000 CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000 @@ -248354,7 +248354,7 @@ CVE-2024-1937,0,0,21edc564d8d107c7b32aee93f18d39dfb701e318c887fb17fa65aeb000f67b CVE-2024-1938,0,0,bb761392093d0500dffc8826166cebd57f27e4ca835bd724044095a9cc9f46f6,2024-12-19T20:20:38.233000 CVE-2024-1939,0,0,ba14000cd43977e6f1eb1cd14ab27eeb70bb77dfe0844ae9ad68ecebd9e8d15b,2024-12-19T20:20:25.553000 CVE-2024-1940,0,0,ecab56fcb3e037dc0ea712fa586ea5c3a8b71e9e2c283b3d79a6b035052ea105,2025-01-16T15:08:00.773000 -CVE-2024-1941,0,0,257de1444273bbb841e203e4db8c731dd235a91d8c5afdb7b7355e984765e189,2024-11-21T08:51:39.030000 +CVE-2024-1941,0,1,7f121e7e490b0aaf596dfa12c095c35f6fb1f73552643377b8e4c306511a3486,2025-03-06T14:24:40.890000 CVE-2024-1942,0,0,9959f1b48d8df074a766267681ef60ee70470ef041e97518033e1c9e3f4c9350,2024-12-13T17:06:52.710000 CVE-2024-1943,0,0,427bdf5401d6f091cadbed61a8541fc961c944e687902b5c9c41fbd9c10f1f0d,2025-01-08T18:47:34.333000 CVE-2024-1944,0,0,60de6b51da8479d53b30a86848c62762fb5131a7439260bf20abde92b969aba6,2025-02-11T02:15:34.090000 @@ -248367,18 +248367,18 @@ CVE-2024-1950,0,0,eedb291d59300ae3b473096ea193b8378e3b39cae0a3fc3ce4f2f0d83762a0 CVE-2024-1951,0,0,cd8e2d69ae8f2ce6c4acde1e3e448fb2ab3b4f80e65abbbd45c03603f9009299,2024-11-21T08:51:40.180000 CVE-2024-1952,0,0,a90e779e6f4e3b9a443ff3a00d590fae19e8c70b61a3edab98bc3697c97dfe60,2024-12-13T17:08:36.583000 CVE-2024-1953,0,0,1522ba7d2a573c63802ba4de86c3af04c0fa83971df2e44212ec5d8f176838c4,2024-12-13T17:09:21.973000 -CVE-2024-1954,0,0,bc4adf8cd85f492787ec97931b2dd028e195e7e0ee6e174bab42cd6da3b44c3b,2024-11-21T08:51:40.560000 +CVE-2024-1954,0,1,140ee8e1b671f89e46fac9dd02aabe1b85ff9629525458d594921246d09dab7c,2025-03-04T12:24:19.653000 CVE-2024-1955,0,0,701110096e7bd8a2d60d12bc137d5a9b5ec27a9047a559becb9951337de8bef2,2024-11-21T08:51:40.713000 CVE-2024-1956,0,0,089208ad7b17e6352512e7a74e329954e2dc5c6df51f4c3205ba086b07fa0983,2024-11-21T15:15:25.567000 CVE-2024-1957,0,0,c9113aa612a7786fa31d850cd0ff470c57e26c1e219c3d49bdbdb09c33ea54eb,2025-02-27T14:54:18.293000 CVE-2024-1958,0,0,bc8cb36508cf1566ad1934613ffb4538c8545f022cfc1878d699d1f98476b246,2024-11-21T08:51:41.100000 CVE-2024-1959,0,0,fc545607b0100429fa9257a9ca524602a46d35c86c5c6d977d0b033a12c069d8,2024-11-21T08:51:41.217000 -CVE-2024-1960,0,0,d3472e0244747853c537a6d6009880ba0f644131aa12a39c621f37e8ce1fef44,2024-11-21T08:51:41.337000 +CVE-2024-1960,0,1,f7ba632627ef3c47b460fcc0c7c25d607ff06f846b30cc70a50cf181f6ebaea9,2024-11-21T08:51:41.337000 CVE-2024-1961,0,0,065f4f0ebb7be6a9ef4efe38df8cd948b4b4c2aea7cb5db4c6518fab40afc0f5,2024-11-21T08:51:41.460000 CVE-2024-1962,0,0,ecbcd5ae86164c1247bbd7c33fcae2e1a487539fc4c92c2ca0f1c69ddc473d83,2024-11-21T08:51:41.577000 CVE-2024-1963,0,0,74e8066dc22099b18322451017e30aabb844984a83e4dc8be065df7b23ed28c2,2024-11-21T08:51:41.757000 CVE-2024-1964,0,0,1d1394447d7a0f2ade75395fe8a4a0b73345ccfe7e65c7124b2def4fe53c6e99,2025-02-11T02:15:34.167000 -CVE-2024-1965,0,0,1f4030bf5bdc3a781ba757dae82ceb4ac3a3ef8fbbc299d908ff2e0cd981ca98,2024-11-21T08:51:41.903000 +CVE-2024-1965,0,1,df53b40332c53dbfbb34b70e2961fca302503619c833b4a424062063ac78421d,2025-03-04T12:24:19.653000 CVE-2024-1968,0,0,2a9b0ace8391fc3e0c25b1e41dff1a4b4b80300cc75b29c526b48915b4b73b3a,2024-11-21T08:51:42.033000 CVE-2024-1969,0,0,becd052632ced38bcf77712277a59b4bba3e152c66d5bb8e636e5fa64bab4508,2024-11-21T08:51:42.163000 CVE-2024-1970,0,0,1e68c292fef725944fbb9e7172936f1df0740cc26f68e5a4d50f99195a966247,2024-12-18T17:04:53.240000 @@ -248397,7 +248397,7 @@ CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c65 CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000 CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000 CVE-2024-1985,0,0,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000 -CVE-2024-1986,0,0,9a8f0eee78ceace023fbaae1731849068919c7cb8b85b99d980679ab3b4a946f,2024-11-21T08:51:44.357000 +CVE-2024-1986,0,1,a7c84f282c3013ac88d7d83adb82846d5089dadc1a1375bf53f285962b881c3f,2024-11-21T08:51:44.357000 CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000 CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000 @@ -248462,7 +248462,7 @@ CVE-2024-20046,0,0,3b0cb38468dc6ce3f4f783d34648c8b0b74b5ca380d79f4af4e2082d8089e CVE-2024-20047,0,0,c47752035c532511849b03dd4c5e0abb4ea1e7cb27faa513eb222a38fcc318c5,2024-11-21T08:51:53.960000 CVE-2024-20048,0,0,535fd04d026c6f8c45119acbdff0eefcaae366754effe78a06af4607e0692f06,2024-11-21T08:51:54.143000 CVE-2024-20049,0,0,c97675114100c196b6181417712a5646e8ec807285ad896ec9d777d977f8927c,2024-11-21T08:51:54.347000 -CVE-2024-2005,0,0,23af0da2868de4331ca02afb29bd5d0312330e22444f12aa9fd76823ee0ae85c,2024-11-21T09:08:47.640000 +CVE-2024-2005,0,1,97c4eab3f9a9d975f2b3fbc5c11b70f5d067550e7dc6c433ac4cc6a880e70016,2025-03-04T12:25:10.853000 CVE-2024-20050,0,0,27737cea1576189891d35253eeb8bd58c495c56193d77fabca31a2822df9db7f,2024-11-21T08:51:54.443000 CVE-2024-20051,0,0,effbe7e44198a140c787f3268c0b0d4546b1ca8ce2d16e1ab5ffb6720ac6cf3f,2024-11-21T08:51:54.630000 CVE-2024-20052,0,0,429cd8ebc968e948252a6903d57a6ffeac603fe9d66ab5e6725a16f8e5a8895d,2024-11-21T08:51:54.807000 @@ -248473,7 +248473,7 @@ CVE-2024-20056,0,0,72234c7ec704259253cb4821d32c88fd8dbc56cdcb4d5be6a2a6b9c69ef96 CVE-2024-20057,0,0,d41872e09ed050e0d60edcf8c8cb9f2f16a39b7414f40d966be0c0dadc633d3d,2024-11-21T08:51:55.623000 CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000 CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000 -CVE-2024-2006,0,0,2f60560639ffe114ddd455af53cebea4773b7cd759fbea5625bf0cb7baf45d3a,2024-11-21T09:08:47.770000 +CVE-2024-2006,0,1,762c7930524228240d17ab9c26adbe1e4d8d4396efb3296b884d25e732329277,2024-11-21T09:08:47.770000 CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000 CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000 CVE-2024-20065,0,0,bf074bad299ffa79a3be73371461cbe43be69d6ec7b9d447aba21b460c271103,2024-11-21T08:51:56.390000 @@ -248793,7 +248793,7 @@ CVE-2024-20445,0,0,c6eb0b829468988fa6f856419882c9c5bd48cbffe5a93d47ef0012dc8e916 CVE-2024-20446,0,0,b87def15940c0034b11c28859944a034009b9f468d66a6376d1f25c15eb252bd,2024-08-29T13:25:27.537000 CVE-2024-20448,0,0,72086d98af2f207056466de4854f3fb7aca901a71a3a39bb9df031bde250144c,2024-10-08T15:25:47.053000 CVE-2024-20449,0,0,ccccd9342485246b0f8c60e864ee57d0f0ded3dee976dcf1c08d302fec2e2ac4,2024-10-08T15:33:29.210000 -CVE-2024-2045,0,0,2441162da8403f66e798b68d264fb0d33251fa9eca9b718c62aca63650d3f2cb,2024-11-21T09:08:55.243000 +CVE-2024-2045,0,1,89b3ee5dc8c3835756678e630b47a0bfd8c67a25bf909b02724be252106f1b58,2025-03-04T12:25:10.853000 CVE-2024-20450,0,0,62324ea0fc407a8fe2abdc234d236c58d4598c41d414185fa4e24580df1e8c9a,2024-08-23T18:14:43.787000 CVE-2024-20451,0,0,f6afa08aa231a4dad23de6fc95398bc459b6f241c263c5be82e2e79b56a5423c,2024-08-23T18:14:11.137000 CVE-2024-20454,0,0,e522f2128e49eb8432a0c11aebd0bf12d286a82e0cc0e92e36891307d8681061,2024-08-23T18:13:47.510000 @@ -248891,7 +248891,7 @@ CVE-2024-2054,0,0,22b249de25f24c9d5e4dba60e1bbfb2ed15b9c99ba0b7f3c989eacb4a07e71 CVE-2024-20540,0,0,b101248a8efda36e915c412442fe685653fc473fd659fbc78c35cc262111a7d1,2024-11-06T18:17:17.287000 CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000 CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000 -CVE-2024-2057,0,0,0d89b282fac2a881c8d50cbf035b9aa226602e29957f24dd6f706681134b9741,2024-11-21T09:08:56.920000 +CVE-2024-2057,0,1,786029ac549c0eff3a3ae30e3def830471097bea8df9e976e4eb36323393d4a5,2025-03-04T12:25:10.853000 CVE-2024-2058,0,0,0806d1c8c723804705bc3d4f26478905c84047106a0c065b0bcdb395e34037c9,2024-12-10T23:23:40.153000 CVE-2024-2059,0,0,503904f12c00069c9bcf82cf61c5fff2ba5af8b7af638c425712dac1ee25df49,2024-12-10T23:24:34.477000 CVE-2024-2060,0,0,0b708dd969670f8b3596718373dc1ad8bc49daae34884e438e062c632f6bac9d,2024-12-12T14:59:34.407000 @@ -248998,7 +248998,7 @@ CVE-2024-20746,0,0,a15a83707ad2322c44c8e8b936060808af6259ccd2ef836da49d2aaf1d430 CVE-2024-20747,0,0,7cff61aa2fd8b7dea946d7556f78ce3fd40088966b978e7e707e252141e0158b,2024-11-21T08:53:04.587000 CVE-2024-20748,0,0,f770cf6438fba126ff955f676fef64d7a7e4127d3f763c388aa102c93f764f43,2024-11-21T08:53:04.727000 CVE-2024-20749,0,0,b4371bf1b9687c30523cac3aaee0df4794c2a5d0e3ee2d198301526ac1413280,2024-11-21T08:53:04.870000 -CVE-2024-2075,0,0,084cbb927584a2c79b7ad1b2bf6fb8ec565bb152daad2ab276238586beb5b954,2024-11-21T09:08:59.450000 +CVE-2024-2075,0,1,1fd28058e022431e4f69ad01c3328b29a5f706056a9b8b9d4a271a7d9f7746dd,2024-11-21T09:08:59.450000 CVE-2024-20750,0,0,3313e0a01bd48c6ebf41345d579945502b95260a49b033a4e1473b2ca078771f,2024-12-06T14:51:42.167000 CVE-2024-20752,0,0,81cca113a5b8ecc5e1f74945d436ce2b35327753e3347c1af9edf24696f5c4a7,2024-12-04T22:05:25.983000 CVE-2024-20753,0,0,a767e66c288c97aa6908199e8febf4cca8728b5e227e62ee67778330d1c57c90,2024-11-21T08:53:05.230000 @@ -249007,14 +249007,14 @@ CVE-2024-20755,0,0,920a6b3f37d4759f6db46481065ba65287689237043749cc0750e377e9694 CVE-2024-20756,0,0,6efbeea44b8e72ff9551faa96056df66f22cf7201afdfa98aa799fe2fc5adbc0,2024-12-04T22:03:16.873000 CVE-2024-20757,0,0,31499a0cefe4d683f975a8e85d63bba7fdf7b13121463a7a9519d654a7445df9,2024-12-04T21:56:40.727000 CVE-2024-20758,0,0,bbf559067f3f800b1072a25f9bf8503ba4cfa406dde324cd13c0aa0f49cd432b,2025-02-11T15:58:52.330000 -CVE-2024-20759,0,0,69a49f32848be02ed58f1b99e9199e238a2d16f5df1b97741d8236719134f8a6,2025-02-11T15:59:16.957000 -CVE-2024-2076,0,0,27bbba2fd6f8339cd6b249ab6b8527cd40d934cd6a8900bdee937f9d1803adf9,2024-11-21T09:08:59.600000 +CVE-2024-20759,0,1,1ad01d53fa5bec574f5cd4a8bff7e5e99f858c6c0a288ab5c162a2da89a42866,2025-02-11T15:59:16.957000 +CVE-2024-2076,0,1,e6d81ac67299670c8bfe7404c08d66bf4c072ddba73e1ad29b1299e5fe00aacb,2025-03-04T12:25:10.853000 CVE-2024-20760,0,0,ebfb538cacd80dacbec778521dfe778af7968b1b2639082991c371b9536e53e0,2024-12-03T16:24:49.360000 CVE-2024-20761,0,0,0968b5cde6c7df12492afc4d370440f3ace95ba9a6b515cc51adcb28c4e294b8,2024-12-04T15:16:10.297000 CVE-2024-20762,0,0,cfa3ed8678ff1af2b13e93516da0c84241143e158bfa410eb5db63c7d0e3b6fb,2024-12-04T15:15:52.700000 CVE-2024-20763,0,0,85e3d365bd8f70bb83e697510efbc0c1af98cc029e70ebe9045e9cb8471b8ce1,2024-12-04T15:15:36.200000 CVE-2024-20764,0,0,a080d634ce17b8cdbb85357fca6cda5d794fe7d9539aa4c5f46ce35e5c1cac27,2024-12-04T15:15:25.463000 -CVE-2024-20765,0,0,f8c07e827c4f22b209a557f745552a36a665fef29a89317e72a2625016e9e4a7,2025-02-07T17:25:32 +CVE-2024-20765,0,1,e8dca53e77a72b7fe76926e1cedeafa7eeeb182c51dacba5a7ceb9bf3920638e,2025-02-07T17:25:32 CVE-2024-20766,0,0,95ac04a20504881d574a50944d27c002096349013c0a37ca7842a8653794b342,2024-12-05T15:18:04.873000 CVE-2024-20767,0,0,ae66121e62e6acd691604b5a21c1e50b45baacd384bdb97fe32d5d6340bf6c84,2024-12-17T02:00:02.077000 CVE-2024-20768,0,0,5cfbec6f58ac0ddaff40efa6f7a3cd9811b930452273e0862a7b84351ebbd04e,2024-12-03T21:46:08.623000 @@ -249025,7 +249025,7 @@ CVE-2024-20771,0,0,fbe47c449b7f2a72cf2170200c5345097dc6c82536f109a11005e66f213e1 CVE-2024-20772,0,0,7df01d1bc656b220dffeb91fc6d2afdaf98c7637f47e40c9ba496610c06d3f4d,2024-12-05T15:00:34.627000 CVE-2024-20778,0,0,b1838253014dea608e82f8ac504d6af15fca7c17eac00840488780702f28424d,2024-12-03T22:21:38.357000 CVE-2024-20779,0,0,840cc149185bfd9d8815179db57c6204b9354c386b967a136fe8dbf2743d1396,2024-12-03T22:21:48.793000 -CVE-2024-2078,0,0,9553f9232e4aceaa91432d7fede7c51902215a4235cd35e531da6342d14c75c8,2024-11-21T09:08:59.880000 +CVE-2024-2078,0,1,ca6aa281e30e5360272292430fa4ac26399dc0d702e4c9417cfe819b4455f6ab,2025-03-04T12:25:10.853000 CVE-2024-20780,0,0,2e5634387a951d9bf41a032b65a927300cec892a7c080aec0be5f5c2c4d6e954,2024-12-03T22:22:05.807000 CVE-2024-20781,0,0,fdc2f0bdb5293e0d3dd065c1aecfdde324c6be0aa6308484fa9c24c3a4831241,2024-11-21T08:53:07.993000 CVE-2024-20782,0,0,94486b8c1faf510797fb31b21e5a718283885e1396f8c4cb726bbe82c3abee9a,2024-11-21T08:53:08.130000 @@ -249170,7 +249170,7 @@ CVE-2024-20911,0,0,44ed94f6571ba1ed6ab71ecc01af753b87e7e45ad9412fbc292b994094669 CVE-2024-20912,0,0,4e4c54d5b304f113a69d58829f20fa3206b36f29bc855bce84ffcddf8905f158,2024-11-21T08:53:25.047000 CVE-2024-20913,0,0,3d81d94000965a173524bd90242cbb075620290bf16dbbba449688cb20c21aba,2024-11-27T16:31:55.040000 CVE-2024-20914,0,0,75f2879cda87b68146283e049ddf0666d0482bcab856d7dc983df810ff90fefa,2024-11-21T08:53:25.290000 -CVE-2024-20915,0,0,f852f9d621dbe476272a13be7b03d53dc0be6023f688a8a9cb1a698648020073,2024-11-21T08:53:25.420000 +CVE-2024-20915,0,1,8038962934314a630ed49e13ee75abfdafe99007f665ab1a4bda4ea6b2603546,2024-11-21T08:53:25.420000 CVE-2024-20916,0,0,03fdcf606ca122e97f7398db4da76adc9fb1859a897695457491997ea033b531,2024-11-21T08:53:25.550000 CVE-2024-20917,0,0,9f3075939438e22e9625e4c8e7b03106615f9fa54a48487edff7cb7dc317eb7e,2024-11-27T16:31:52.210000 CVE-2024-20918,0,0,caee60732d5ec26c3cb53b1e9ddba3bd8ee64d2ed22bf47286592898e408bfd4,2024-11-21T08:53:25.790000 @@ -249210,7 +249210,7 @@ CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000 CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000 CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000 -CVE-2024-20953,0,0,3de9278f181fcefe6aa20f00ec39de2a101cc9f3772eee3803a2cca4849f13d6,2025-02-25T02:00:02.097000 +CVE-2024-20953,0,1,82765a20964a4a5bab701090b57b1fe4355731cd663540cb37d4d7f85d050f51,2025-02-25T02:00:02.097000 CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000 CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000 CVE-2024-20956,0,0,9661739112364392106915eba09ba3edb13da21796d158c1a55722d67e3804e6,2024-11-27T16:37:04.993000 @@ -249295,7 +249295,7 @@ CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044 CVE-2024-21031,0,0,6c3cb7ea7b8afb34e51c401bd8160eb0eba04fe632c5f4b9ab968943d68c3282,2024-11-21T08:53:39.210000 CVE-2024-21032,0,0,d866ba7453e451375479bb9ece1d42e7dc9d212a5d44ebbadf8c40772a9012db,2024-12-03T19:15:08.570000 CVE-2024-21033,0,0,a190cf24eefe3df88328553d504518f14ded069c8f92a734e4d65b6b23c47b20,2024-11-27T16:30:57.530000 -CVE-2024-21034,0,0,21afebd76ee3dd2f1cc16413fb84da29c6665f7ad0406f47fd12ca1db9e8aaed,2025-02-10T23:15:11.760000 +CVE-2024-21034,0,1,ae9d308a305bca7ec9458e6d1f48c196a478086ae62d814b7be92c36ade87461,2025-02-10T23:15:11.760000 CVE-2024-21035,0,0,d2fbfaedf089554ebd136e895cb65baddcf16dcbad1772b825817ddc3620a8d2,2024-11-27T16:30:11.690000 CVE-2024-21036,0,0,9716f0e635448b3b06bae092630560368788e8a689f20c314603ce7bafdfd005,2024-11-21T08:53:39.773000 CVE-2024-21037,0,0,a8caed0e50af2140b886ac5f1eadaf5f49badf0ba61ff6a2935a3c296d30e46b,2024-11-27T16:29:55.693000 @@ -249367,7 +249367,7 @@ CVE-2024-21098,0,0,3b9f26852cd073a585052d12c11fb47a6b32adcaba23463f21effa5bf231e CVE-2024-21099,0,0,ad561fc3574d446cb78a80ee81ea27a050a78626756f88ce35b05d0eb497ff1a,2024-11-21T08:53:46.970000 CVE-2024-2110,0,0,5aefbe202b4ec5f5b262c41a30cac84c189d93a3848cf88bd03351b663c4f40e,2025-01-08T18:20:25.510000 CVE-2024-21100,0,0,12a3c29c6c1c13390d400569bc84c4e06d7169a584bc805ee9b42835b2f70642,2024-12-06T21:24:25.520000 -CVE-2024-21101,0,0,d7e23a954a7d7d6e57a56ab7b87fe962d330fb0da76e1cc0040db6188cf25292,2025-02-10T23:15:11.973000 +CVE-2024-21101,0,1,90a68dc9f03b20cfdfcd54da97b9771064de138b1a86869141bc8ee3c5fc8f71,2025-02-10T23:15:11.973000 CVE-2024-21102,0,0,6ab4ef9ca48b579e83e31dfa18b7d9bcc1bf1ed28c6bb3755d44c0bfa342ccfe,2024-12-06T20:40:44.093000 CVE-2024-21103,0,0,0443ede19cb6760b4b7a424180cb731bb674d263c018a70db883161f42167083,2024-12-06T20:34:30.853000 CVE-2024-21104,0,0,b47d92de3278c1ac8f62d6569204911df9410a922fca513018d119bc5175b2f5,2024-12-06T20:33:01.633000 @@ -249385,7 +249385,7 @@ CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f684 CVE-2024-21115,0,0,c8b5f110fee1084e3e4bbd02d3f1664b03293a1da68e5246ef4334e81776ca1c,2024-12-05T15:16:18.327000 CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327923,2024-12-05T15:16:20.707000 CVE-2024-21117,0,0,5d43a21324183b9d6abac7bf386e13c102239eb07d87d78b640f0340e813f8d2,2024-11-21T19:15:07.527000 -CVE-2024-21118,0,0,ee956c65c0f596bf879ae157a9080e555d70b2a93ec18374492190d05f6c6d59,2025-02-10T23:15:12.130000 +CVE-2024-21118,0,1,dfb174443743455639d3d519ae3e7800f4183eda1b765acea21c3bd12058d487,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 CVE-2024-2112,0,0,19961ee37e07c6ff50d26af0d7e2149d93883e667bfbf269e3aa40af42147ae0,2025-03-06T15:00:11.560000 CVE-2024-21120,0,0,9a17f31ae00741afbe78fe1de8126b80393b2d436777540d9a68aa70b8ecf420,2024-11-21T08:53:49.407000 @@ -249420,7 +249420,7 @@ CVE-2024-21147,0,0,f9b3ce61bcfd0739b224ab3df778de64cc9f81c542249c3ff7985bfca81e0 CVE-2024-21148,0,0,a961a19a001681356591f7a5aac5ec6c6ba03a137425a9a549d889b9b58016e0,2024-11-21T08:53:52.773000 CVE-2024-21149,0,0,b71ec17e5d800b1927013623f8da3815813773851489400311b7ea1d76054285,2024-12-05T21:41:33.037000 CVE-2024-2115,0,0,53a845e62635232ea75349df150ed0d3593a31cc7e5af85948115654c5505cbe,2025-01-08T18:02:33.007000 -CVE-2024-21150,0,0,c54f2f3479d6133165dc43443677bfec7610239655dff60f17c44374eb2ac52b,2025-02-10T23:15:12.320000 +CVE-2024-21150,0,1,1cf73c2495754f77de0cd0f61d14a5891397540e6c125ba8ecfb69916cbc2a92,2025-02-10T23:15:12.320000 CVE-2024-21151,0,0,e352a08d81541678dfa74d4c431f468d5dca65fdba253ab705b7cbca25259ef8,2024-12-05T21:41:23.637000 CVE-2024-21152,0,0,b29fe6c7acc98373e1b0ea6f88096a0ee9cc1e51ab942374126a18689f32c537,2024-11-21T08:53:53.213000 CVE-2024-21153,0,0,4956e810fc20a3a12aa4d749f06ecf00bfb2d38e04fcaabf920483f3ae516ffd,2024-11-21T08:53:53.333000 @@ -249481,7 +249481,7 @@ CVE-2024-21206,0,0,7d6fd60e59ab0e1ece28b89bacd97a84c9e812aa28c26045ff093c2038d4d CVE-2024-21207,0,0,eaba69bb0e20fc5428863e851c58bcfe113ca1f0f722d0669d89b2be4f4a3f1f,2024-11-21T08:53:58.527000 CVE-2024-21208,0,0,550c6d71e0978acd0486900a93d9f1f4af21ba41069121ffd30c426c16d5dfff,2024-10-31T13:35:05.287000 CVE-2024-21209,0,0,febd775763b6ba1ea3518ddec787fdbea9765b2a8b7e23a7c65d83a29c74bea4,2024-11-21T08:53:58.743000 -CVE-2024-2121,0,0,6123bd56d551398777244f5cd5302625152c55a68ce79ccb63543cf83a5958f9,2024-11-21T09:09:04.460000 +CVE-2024-2121,0,1,0ab3194d753e90f419cb00907cac953cd4462da2704fed867161a7594228e6f9,2024-11-21T09:09:04.460000 CVE-2024-21210,0,0,418a8b6df41ea70fbd17d42fddcbe1920fbbac232d621d99c04d26b6102cd970,2024-10-31T13:35:06.037000 CVE-2024-21211,0,0,7450553d876aab66d2c08552c24c3becd617abf0c62029e958ea979a55383cf9,2024-11-21T08:53:58.940000 CVE-2024-21212,0,0,d29d92389c9d77a58ca0325aad746e74f12422d262f6905127c7a317e4c0e657,2024-11-21T08:53:59.073000 @@ -249493,7 +249493,7 @@ CVE-2024-21217,0,0,bf3ea8b361b18d5e6b5516c11c0e27e8130a5301c34e1d6fb804f34f4b854 CVE-2024-21218,0,0,83c67dd5a8a31927036551b53dd912ffccd5817d8a2753965de755b09f3dadee,2024-10-16T20:43:35.043000 CVE-2024-21219,0,0,bfaa968b105f3d480ecb88f494f96c7508ec1fdb8f44c14e82afdd9cc5f88321,2024-10-16T20:43:02.867000 CVE-2024-2122,0,0,8c1668aa95e7c0c88eeec8f5d1e1bf1787bbaa3a8c6f79cd8ee714f5a989b412,2024-11-21T09:09:04.583000 -CVE-2024-2123,0,0,ed9bdb4910cdef7fad5d01732e5ea639ebd13ee657febd4497a7073994e3f12f,2024-11-21T09:09:04.737000 +CVE-2024-2123,0,1,b6a02280f2c5e7f8cd3855dd6610cb6eff172a57086bdd9db5d27c7bbb231024,2025-02-21T19:31:33.610000 CVE-2024-21230,0,0,b59a2070d0ba79104ce6c368b183c79419eef7fe15480a63bfd0fd07efb59102,2024-10-16T20:42:35.450000 CVE-2024-21231,0,0,072e5f2308aff574e71754f2ddf10e4c764b6bb7aecc44398aa871ff0c2946a2,2024-10-16T20:42:13.877000 CVE-2024-21232,0,0,f7bd7911f2800f2e118497bde84d251271ebb4bc7ecad42950a8f5db8b8dbce8,2024-10-16T20:41:35.300000 @@ -249548,7 +249548,7 @@ CVE-2024-21278,0,0,35659e753de7236e6d6eda1138a25fd15a28a7b65c4c952f426045d230f80 CVE-2024-21279,0,0,bd1d4a2a2f889a30ccd6f6427f64ed78f2f81854458ff2aee9d78349f29926b3,2024-10-21T16:08:39.683000 CVE-2024-2128,0,0,8a6a8fb746acb8df8ef680e1be0951d9282ad90e5664d89ded73498bbed63d5e,2025-01-07T17:33:10.987000 CVE-2024-21280,0,0,a8160e2ee62bf3603cc86357a4cb7a85373ff97cfcb4b233ad325224caf738db,2024-10-21T16:08:59.440000 -CVE-2024-21281,0,0,483d7e2de68fd78201934ca31ad34a622293d83981e7716329878a3464254fd7,2025-02-10T23:15:12.620000 +CVE-2024-21281,0,1,92d0655eb2a8d50b83789774b3513ef0d381142e4d32a6aa90cab4860ba3bcf3,2025-02-10T23:15:12.620000 CVE-2024-21282,0,0,234b7d728c9353bacd8db074237fbfde690353a059d5384b9e54019db15a9702,2024-10-21T16:12:01.550000 CVE-2024-21283,0,0,07c516ef99a47794c824f39545420cd89d95e15ca017b48717651aa208a53d06,2024-10-21T16:13:04.547000 CVE-2024-21284,0,0,cdc8aa6981e0c3a2ead96a293234b6837857cc9666b241897eb9ec6af99f8115,2024-10-18T16:45:58.217000 @@ -249848,27 +249848,27 @@ CVE-2024-21594,0,0,96f7ffccc5e1b95b526e0770e66b0a10aca6419927605427f2f6947a28f56 CVE-2024-21595,0,0,bd277db179ef1b9c3f18b64f4122244b30bcbe5b85c2ccd02aace5ef31bc05f5,2024-11-21T08:54:40.903000 CVE-2024-21596,0,0,26e5eacdd821c3d5221ac4678649bb61f56e30a0ea6a6829cfa1c84d00297761,2024-11-21T08:54:41.060000 CVE-2024-21597,0,0,78073c4cfe8182b452c2113d5137e3c607e5abfe1fbdbaef7747bcb7c6f99a54,2024-11-21T08:54:41.213000 -CVE-2024-21598,0,0,5fc62a362bf196741e06bf6afb6355fb8da4ecbcde6b41402fc8bcc9dec55fe2,2025-02-06T16:46:39.747000 +CVE-2024-21598,0,1,f8e60999466e5ab9753e88bde569c6f7de007bd8624491d37bd1ba07d03a75bb,2025-02-06T16:46:39.747000 CVE-2024-21599,0,0,aff27c93f3978f20ff7849bfb6d97050637f779ce1bd025910a586904cad94f7,2024-11-21T08:54:41.497000 CVE-2024-21600,0,0,a429b9514ce20abfc6b0576122c2764dd918cc4d2d4447eb9d5271641b91f5e2,2024-11-21T08:54:41.627000 CVE-2024-21601,0,0,f846803ebcc189d1f46095c93caaee130c509bbea4e7d53890a50d15d12f4824,2024-11-21T08:54:41.770000 CVE-2024-21602,0,0,41ac8d521f9eba4be2ad4678126a53d8e5a50bf2dc5c27c2438c646783392c1c,2024-11-21T08:54:41.910000 CVE-2024-21603,0,0,d91a6d70cdcb3594b940715477e1b8895959935a69fc19db866c0f6724a64079,2024-11-21T08:54:42.040000 CVE-2024-21604,0,0,1a7a37fc7cc36b20d7b8978537909fb8fbba39617f234155b3946889937228c0,2024-11-21T08:54:42.177000 -CVE-2024-21605,0,0,e1a6e977d917ea361bbfaf78dbe1cfda50ba2059d1f0bd29787c73f593d1d2d9,2025-02-06T16:58:10.283000 +CVE-2024-21605,0,1,3d610eb4fb9db9b0081e023d53c5b3127ea6a58b8a34cf4971ec3ba54a59ef13,2025-02-06T16:58:10.283000 CVE-2024-21606,0,0,96b9b5aaaa10d12d746cfced3bbe184276bbfbc212f99fb99927862a8cbcb0ca,2024-11-21T08:54:42.453000 CVE-2024-21607,0,0,f59415b22faf656477f9e7bf7a982f3f8655c7ad86e44b7900b038f38b711102,2024-11-21T08:54:42.600000 -CVE-2024-21609,0,0,7af228f223d442006e98c4e40827bc25d7df782eedd290fc8a37cf270d5bece7,2024-11-21T08:54:42.753000 +CVE-2024-21609,0,1,b94146a2c6b611c6c13b5f846390eb15fcfd0e2840f1938e3ba11d1a9ca85ab1,2025-03-05T14:53:25.190000 CVE-2024-2161,0,0,09285d34c68becd4910fce6a857fd42baeca498f3921f8c0788274bc89faf18c,2024-11-21T09:09:09.573000 -CVE-2024-21610,0,0,bcf45424744ca67be7f763c0edaa29efa8a86834896ac9a9f57278039f47acaa,2024-11-21T08:54:42.883000 +CVE-2024-21610,0,1,da754e4a776c049cfd01f405f9bcf6a221e24eb768d1bc36ea61ccd3c9c7852c,2025-03-05T14:53:25.190000 CVE-2024-21611,0,0,334e98596de5cccc370c36d1b9f4ee75740cb3840f270668136be62f04aafb00,2024-11-21T08:54:43.017000 CVE-2024-21612,0,0,a1c64368428607152868a7719ac581eb5c0c82d11e43ace9c200d48539f7d1d6,2024-11-21T08:54:43.200000 CVE-2024-21613,0,0,1b5cc7582af8e29a485625fa0664bab35c6731001707514eb375ebe0f6bde842,2024-11-21T08:54:43.363000 CVE-2024-21614,0,0,b8cfc954d71e656b148f776a9cdce08320ee92fc1fee351de38773bc96f08832,2024-11-21T08:54:43.510000 -CVE-2024-21615,0,0,4564e13fa23eee3026a47323475839c6d45081e218bc97e66f2fdfe8848e9cc3,2025-02-06T18:39:32.977000 +CVE-2024-21615,0,1,e6833382674bc4170e9b7c286fceaf12eee8e236a38c23ed33939d5b141841d0,2025-02-06T18:39:32.977000 CVE-2024-21616,0,0,dae6d3cf5f996c4574feebd645f2cb4466d7284cf13155699974e1982a1269c0,2024-11-21T08:54:43.780000 CVE-2024-21617,0,0,e02746f478369a08710b2842d6ebafbdcdc6c88c5e46abb063d87e66959b628c,2024-11-21T08:54:43.923000 -CVE-2024-21618,0,0,5c5acc71466c01d0a605b839fd84f08f2895850485f6792499b2a6c26acfcd79,2025-02-06T18:39:21.123000 +CVE-2024-21618,0,1,10e0d8c08de7ec36900e36d416e9fdc1aba7123b024bd8f336fc744dcf4e917d,2025-02-06T18:39:21.123000 CVE-2024-21619,0,0,962a2acb8ea0c416286b40b04f6078c6f01bd0b1338c587066e8de7d8d28c2dd,2024-11-21T08:54:44.270000 CVE-2024-2162,0,0,f341aeae09ce952cfa8e1acd1945a0549f50e443c3354f0bdf994fb4d6053e54,2024-11-21T09:09:09.727000 CVE-2024-21620,0,0,20a6571558a9873a7736ceb942ff276ea766ceffdb71a376e43b64af8dc5f4c7,2024-11-21T08:54:44.457000 @@ -249926,7 +249926,7 @@ CVE-2024-21673,0,0,5386f3f2c2fa5608e4337b427600a7f7550c9a783b6835c57637521e3c38e CVE-2024-21674,0,0,f39a3f923353961478c76c0c23bc6ddef3aca571421fbf8b0854074283374e7d,2024-11-21T08:54:50.740000 CVE-2024-21675,0,0,6538c81fd77ee7ef3434b476843ec466c1e70ac0dd0540cdae914ba927668538,2025-01-01T00:15:07.193000 CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc610b,2024-04-18T17:15:48.620000 -CVE-2024-21677,0,0,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000 +CVE-2024-21677,0,1,49710280311240d8e1e1b6bd11228601252c68f9f6dd12c3069cb16a2d252358,2025-02-12T01:28:42.197000 CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 CVE-2024-2168,0,0,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000 @@ -249975,7 +249975,7 @@ CVE-2024-21724,0,0,6bdb2572da490900c4e7fbfeb0ed627aeb6ea812d8bb609f7e848cc10f6a5 CVE-2024-21725,0,0,102bc48d163faec6cc11fa8ada828cb863fe99c32c41e6fe5250a9d25bfe5aa9,2024-11-21T08:54:52.683000 CVE-2024-21726,0,0,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000 CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd484,2024-11-21T08:54:53.040000 -CVE-2024-21728,0,0,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000 +CVE-2024-21728,0,1,737f3c4b18f676ead5578d81c694c6ccfbf7c5fc175bf610a8cfa12392285c7b,2024-12-03T16:15:21.030000 CVE-2024-21729,0,0,ce8a30bafeb6b97535469464c82ba7fd23d6f7caed1d9ff1342347bbafd041de,2024-11-21T08:54:53.400000 CVE-2024-2173,0,0,bbdf3bf6336b1d782e61be6c9f3cb2e1386e6959d4a82a30c771ebd8a67897a4,2024-12-19T20:20:02.573000 CVE-2024-21730,0,0,1b13b0d0912d2b39029cb7c50862a79dbebc9fa1d0615cf9af45aa6f7da95bc2,2024-11-21T08:54:53.543000 @@ -250033,7 +250033,7 @@ CVE-2024-21781,0,0,856fac6393857737a6307198b264a46445b2366b62e69e08f2d3fc1376fab CVE-2024-21782,0,0,4f8de06e6743ebde6cbaf72bb6d23ba7f75e27332e901fc90d33b8bb8c66b736,2025-01-23T19:47:50.617000 CVE-2024-21783,0,0,15efb20cac9e5cc6aa5fafc02b14db4c668584601b7fe1c783b8908256b27ce3,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,6ec13f5dc1cf087ca33f790f45be7bcb0f64d1c90ec6b8bf0188eda73ac21a63,2024-08-14T17:49:14.177000 -CVE-2024-21785,0,0,e29865f9e1a8a126c33e02e8da3190e6069c20b6049cc191e536763b8b42bc66,2025-02-12T17:30:02.237000 +CVE-2024-21785,0,1,94a2e41b542bceb8f211b00ac2fd27723ecf38479226200da1b8e244dd825493,2025-02-12T17:30:02.237000 CVE-2024-21786,0,0,039443c05be587e2aee9be6d7e79e0ba6731ca972b370ba09a7ba630a00d5c5b,2024-12-18T15:06:28.230000 CVE-2024-21787,0,0,51ae2d891765bcd3cedf45dc5c38e139ef42341e2577c194d7091c50a9b44c0f,2024-08-14T17:49:14.177000 CVE-2024-21788,0,0,f21ccb1172a6a8490c8a7b23f6c8d3d4723479a27173c2b0f3aa3cc6253ab6f9,2025-01-23T18:35:52.080000 @@ -250120,11 +250120,11 @@ CVE-2024-21876,0,0,a9e27deba06805ad98dd3ff273d47d2cb736c457177f152ce47510543d3d5 CVE-2024-21877,0,0,5bb3e7fe381d9267a7b1d2994735930da5d5f6b89ba38ef8be49eb5dab1e6d65,2024-08-23T18:06:45.520000 CVE-2024-21878,0,0,da2a78f22782b0d42766b9a813ad14cbbbfd0f18a7a4acdd58b2cafed72087ac,2024-08-23T17:52:11.777000 CVE-2024-21879,0,0,cd6dae8944384a1a6899e7408bb97b8b26a1430b0f985789693cd6ffc0703fb6,2024-08-23T17:49:25.830000 -CVE-2024-2188,0,0,0a91946b41e5d6c6666678f853d1f9e425e55f569a639457040f31c91cedc873,2024-11-21T09:09:13.210000 +CVE-2024-2188,0,1,b7f8deac3b36280ff28c45cffdfeed567371b82ab80ef792c7329c1282e5fe99,2025-03-04T12:25:10.853000 CVE-2024-21880,0,0,69bfa3a37ca92023b43e61ca8e744f74011260d11b3a43af932fd637b14f5863,2024-08-23T17:38:35.193000 CVE-2024-21881,0,0,dfe5bad2c6eaa23299d90fb5c5dd1fc5e69fb2875212e84b9004e031f996bf50,2024-08-12T13:41:36.517000 -CVE-2024-21885,0,0,57d5f6944e7de62738f638a809cacb9ad930440326afec01049dfddbb3f7eb62,2024-11-21T08:55:11.417000 -CVE-2024-21886,0,0,8b2ad40ee1977f972e8c6100292d4ff20f93baddbc0578ec988ea899f889551b,2024-11-21T08:55:11.603000 +CVE-2024-21885,0,1,0abc0ca6c5c644c00982ac6a6772e7953280a0a20111fbe8443f818a00dbba54,2024-11-21T08:55:11.417000 +CVE-2024-21886,0,1,1201cd3f4bc20f7f316f43dcca7f10d17cc8b7b0922b4eaacd28c4e8fb8348b6,2024-11-21T08:55:11.603000 CVE-2024-21887,0,0,b9669760be45a106dfc4e1df4ad83e221bed750bc2d6975f6f3dc0c2da90aeba,2025-02-12T19:55:33.273000 CVE-2024-21888,0,0,b45f885651aff86683860af6eb8a8226cada34955674ec263b53ac2cbb747474,2024-11-21T08:55:11.993000 CVE-2024-2189,0,0,7ea3e523e8b9e6befbc8a00f5933ce691dcd1de1f6fc8d37f688f1333e38d41b,2024-11-21T09:09:13.347000 @@ -250289,7 +250289,7 @@ CVE-2024-22097,0,0,eb0c4dfa4aff12cf239d05e6a9f985d1e7123da75eb6c08ff832375bc516b CVE-2024-22098,0,0,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434f4a,2025-01-02T19:12:54.717000 CVE-2024-22099,0,0,75ad05582a518a6415fee06854acce0c6394538f81aa2b280a37411acaf025a1,2025-02-13T18:16:46.170000 CVE-2024-2210,0,0,da1521e1cef2111f87a1a3b2fe9e61bbb71577442f9c284d3c4d916ad34e1b56,2025-01-28T20:21:57.503000 -CVE-2024-22100,0,0,0c143649c4cedd7e71a662041bc99741bb9f02e6ec3cae332f125532f1d926ec,2024-11-21T08:55:35.003000 +CVE-2024-22100,0,1,484f335a2ad904aafcaf674c1cf7078e812d3c6ac8f3cf4e9a5a3d2f3bab07e8,2025-03-06T14:24:40.890000 CVE-2024-22102,0,0,84892b7b6e5d83a9d6c16f8dffd5e79d322057a8d97be177a66169a0e45abea6,2024-11-21T08:55:35.143000 CVE-2024-22103,0,0,21b0d01eb857ccfc96a63302f1d9c85525df74135dcbdd1b5b1e8e0e0ba5b800,2024-11-21T08:55:35.383000 CVE-2024-22104,0,0,f7ff32e7e1e96b051122bb26df5e27628d7f5d0c5085d81ea1aacc226d401b3c,2024-11-21T08:55:35.653000 @@ -250364,12 +250364,12 @@ CVE-2024-22178,0,0,71254f623e00d5bb1e48d1af2784efb3046cf43ad2784e78ba9346e70b884 CVE-2024-22179,0,0,d87169b0e0b3167673adefb92b2211c61607acb4a55f06e13df24cae718daef0,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 CVE-2024-22180,0,0,eec6899847f68fcb904a1e50563ead2d05a754b9499da5083b6d7294326fa5fb,2025-01-27T17:58:03.073000 -CVE-2024-22181,0,0,42d6ef95e1add67f3139e90fb60d112a5bee36e3e7aafdfed106763fd11687e2,2025-02-12T16:15:53.237000 +CVE-2024-22181,0,1,60b3d1b8893c863d015d58699c5a23e4223da4bff060c73a9b8e6d0b39ce3479,2025-02-12T16:15:53.237000 CVE-2024-22182,0,0,7ac8d878e2d4ca5a283cc9615664edc83ce6d44c467cc8255966406901629afc,2024-11-21T08:55:44.573000 CVE-2024-22184,0,0,c9b2ec2f52f303182ac6abd84a802ad972784c31241e8c6492c1fe878cf4df4a,2025-02-04T18:34:23.990000 CVE-2024-22185,0,0,338870b5919098f079afbf2e8377790a033411553e2b8d37406d5b9f6ff58955,2024-11-15T14:00:09.720000 CVE-2024-22186,0,0,f072b30dc8306a5c2961890374d655a227032ac9f3112dcef21242d0868941b3,2024-11-21T08:55:44.987000 -CVE-2024-22187,0,0,2260b4341272c513edb563dbdf4970ccfb2ccc417e47317a708b11e2494ca509,2025-02-12T17:30:21.533000 +CVE-2024-22187,0,1,02c8caea9f69ccd7fe96de9db83f999652b0b12cb5cb5d62b69de7da63075fc1,2025-02-12T17:30:21.533000 CVE-2024-22188,0,0,fc57b181d868c9861fa392b9be51d5a5b1ac48a7fd624418e4d9961a1ace3c2d,2024-11-21T08:55:45.287000 CVE-2024-22189,0,0,a311a8c038638b1f370c52f7ca314d690b879609b96d9aeb4e77cc6abfbbd504,2024-11-21T08:55:45.517000 CVE-2024-22190,0,0,f5cf99c61e6d1afaacf99881a950a9480e0abe8182c1d5df5d78342cf1630b72,2024-11-21T08:55:45.660000 @@ -250449,8 +250449,8 @@ CVE-2024-22262,0,0,c6cba0eaa82aa4b35f3e73f09e60a77ab1893f065fbc1843c84c2a7ba444c CVE-2024-22263,0,0,6b57c165ae6f4f24efbe95adbce97de5c609eb29ccf1915937950705d9f78a34,2024-11-21T08:55:55.223000 CVE-2024-22264,0,0,578dd8660fc7c0fa6384213c2b7962834c168b36b5ef92fa90215ef8713df428,2024-11-21T08:55:55.360000 CVE-2024-22266,0,0,5a01c6e98b30179eaa3c94d91a1ca14baf1020518f14d649701450e7ae82dd1c,2024-11-21T08:55:55.490000 -CVE-2024-22267,0,0,da7e1e93c82491ced5da2e2d650159463f3b73f109ed93621d87051b2ed7b68b,2024-11-21T08:55:55.637000 -CVE-2024-22268,0,0,701fdc053aad00a2554512d47e7b1236bc9316ee25283bb6a0bd4f90ac7d1fa3,2024-11-21T08:55:55.770000 +CVE-2024-22267,0,1,734a87a5b03678de296d11d72dc9c59573c5ad3003176b5252a1acea6f87bd89,2025-03-05T18:25:53.837000 +CVE-2024-22268,0,1,71229c1f4c925485f1259d001369a907940fa9b3ace2b5a0b5687d7e69fe63b7,2025-03-05T18:25:53.837000 CVE-2024-22269,0,0,6f6bcbd688495176e530478d6f55b7081f705e0b9921cc259dfe873140857dfe,2024-11-21T08:55:55.890000 CVE-2024-2227,0,0,f4193cad275230e4a77caad12789eba12ab0bb05070cfcfc47b838d20d262771,2024-11-21T09:09:18 CVE-2024-22270,0,0,686ed972793d7f5a552dfbb080535e83ba0afe88182341280195825995aa4303,2024-11-21T08:55:56.013000 @@ -250502,7 +250502,7 @@ CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000 CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000 CVE-2024-22315,0,0,3cdbb839309a48e99c943eb3740601cd39215f61228023eb024193119cc4ec26,2025-01-28T02:15:28.603000 -CVE-2024-22316,0,0,dd32784ea0a1f81ba33f989a941845c12a9fbb4562f388bbdec62fbc7018a7d0,2025-01-27T16:15:30.637000 +CVE-2024-22316,0,1,f91eb4ec38f9501569d264182b40ad99626d6aa43d1d6a98409fab8852f93476,2025-03-05T14:08:19.020000 CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000 CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000 CVE-2024-22319,0,0,94c8971dc172b8316a6a132bdd3732cbb8e1ee1ea0d1539ebe9e0956f604ec80,2024-11-21T08:56:03.247000 @@ -250510,7 +250510,7 @@ CVE-2024-2232,0,0,63c24fbab96e32165c65033709dddffe9b435e393dbcefe5aeb26f173a8690 CVE-2024-22320,0,0,f6332b360655c57217506d74a2203485f46ea22169fda26720f5db8d57ef0592,2024-11-21T08:56:03.473000 CVE-2024-22326,0,0,03ab7e593952b876b9cb339b704b2b46f23342f74868815306698c7dec3a41c8,2024-11-21T08:56:03.617000 CVE-2024-22328,0,0,a1c8284cadf4952283d269c34de3ac46299343b66f76bd3d4445b52d6091f5ee,2025-01-14T20:56:44.643000 -CVE-2024-22329,0,0,094cb6e7a4feb4056fc69c5a4e0902b59e95f2c01169f8c603aae9e5fc61aac7,2024-11-21T08:56:03.937000 +CVE-2024-22329,0,1,6d358201b4ee2a0dffd876de521cd7876c2f3dcddf306608c3c18304d70b72f9,2025-03-06T14:24:40.890000 CVE-2024-2233,0,0,2fea642ce3d14914965eae0cece785e4cceb2050ac4db1eacec76f3cdc7ea0d1,2024-11-21T09:09:18.773000 CVE-2024-22331,0,0,3835b96eb02af640aaa046eca31cb00be6e17050c69d5a96646d09b17e9a00b4,2024-11-21T08:56:04.093000 CVE-2024-22332,0,0,f9dfd1d3a871989aa0391494a54720c73e254d144bd83668196cb6405e1f7887,2024-11-21T08:56:04.243000 @@ -250533,7 +250533,7 @@ CVE-2024-22349,0,0,83d2f1bc5c4fa6fb8ad422ce8a57cf789473001c88cc2a943bb1acc8aa902 CVE-2024-2235,0,0,a0829bcbdbed86a72a56dd6769abd8e7854afa08a7fcab0364845431cf5bccbb,2024-11-21T09:09:19.200000 CVE-2024-22352,0,0,903d5c6f0448bdc0bf08006216f6899a3c5646dd96e9c8f6bb1e8c750ccd821c,2024-11-21T08:56:06.007000 CVE-2024-22353,0,0,0ea4428102047b2faffc31e2ac25c47aff142899beade323ab31892621a6fc1f,2024-11-21T08:56:06.147000 -CVE-2024-22354,0,0,fb96309deb046c6e4896dc146b70c3e7277954b8a0c2bcd1fbf089e551b2190e,2024-11-21T08:56:06.303000 +CVE-2024-22354,0,1,079961e7e3cf53ffa83e64e0250e951a54b84ba4cd5e732d1673570bbe42b4dd,2025-03-06T14:24:40.890000 CVE-2024-22355,0,0,26ed86c646b6a6b7eb9c356ba84e79063a2db5147bda7948a2078523655c8623,2024-12-23T18:01:08.250000 CVE-2024-22356,0,0,ed30716104bbf693467cdd18759a21c6311e77f0a3478862b5dac33d1b33aa9c,2025-01-28T18:43:25.843000 CVE-2024-22357,0,0,00dc5dcf6199c66f13fde9a4475db6759f0e1d4b5249634b877411c76ad78666,2025-03-07T12:36:39.820000 @@ -250628,7 +250628,7 @@ CVE-2024-22444,0,0,8102475870a9480bbc325414920af6119c6c2f5b7fe9bc9bad0ac94556157 CVE-2024-22445,0,0,27e840bcc8c54287e9c0328e9e19042ff321d19a72385bf48a58b7606387e784,2024-11-21T08:56:18.427000 CVE-2024-22448,0,0,d71d019b6752ecc1981375f23f06286fbe31f472aea3e61a3aefd13b089c23e0,2025-02-04T17:34:28.327000 CVE-2024-22449,0,0,99298a370a0b9764cc0de0074302e6ee11bcf39de555adda400cb1f7593da38f,2024-11-21T08:56:18.737000 -CVE-2024-2245,0,0,4fdc14c0864c478029f85ea4e1dd93966a892bbf810ac0b5465232d52dd842cd,2024-11-21T09:09:20.533000 +CVE-2024-2245,0,1,fb221ce37e692340ed85d972c27810d6d5c895844c6620277581899c0d72f8cd,2025-03-04T12:24:40.610000 CVE-2024-22450,0,0,72f47eb08779b904e3e34b4b44324826639f4ff48d2fe57a193d7e40051cf351,2025-01-31T17:10:53.323000 CVE-2024-22452,0,0,e89b3916da0363a39b33d2d509a5976857441cb89eb0552edd2e3a2afedd022e,2025-01-31T15:58:58.087000 CVE-2024-22453,0,0,b0d3036384bf4be615a3689022a3c138adfb457c203bc6c9e64564909ad4cbc3,2025-02-04T17:31:14.817000 @@ -250851,7 +250851,7 @@ CVE-2024-22955,0,0,368533f40a34e5fae1d8925340aae6f4475eac5e111ca232f404b1633e3b2 CVE-2024-22956,0,0,8ed39a8e2276e993cad0ea022beb398339ae52c5152920a4fd13b8cd15a5203e,2024-11-21T08:56:50.600000 CVE-2024-22957,0,0,0b4733c79e5e1be4ed27841aeb5f878228f183de770bb18355158b67c6f754fc,2024-11-21T08:56:50.740000 CVE-2024-2296,0,0,357fc0bce2f54fba9d19eca9fcc8280b06af864193e5facf8300343284b70c1f,2025-03-06T15:00:11.560000 -CVE-2024-2297,0,0,2c0ce9dc60f722995ab777c3ae885e64f9470bafeeb11ccc3bdfc66dab79a2f5,2025-02-27T06:15:21.477000 +CVE-2024-2297,0,1,0b0dfea326cb9c72e61949fb43af41c3ab8ead7e7174053159663df8028109b6,2025-02-27T06:15:21.477000 CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000 CVE-2024-22983,0,0,9c2fcbd2cfc36625422e4d63e9b3ecc1d9162ca561feb4a7596e502793ecaf86,2024-11-21T08:56:50.910000 CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000 @@ -250859,7 +250859,7 @@ CVE-2024-22988,0,0,794767bfe659079c8fad239879c26f911639a8938186caab10358dd118578 CVE-2024-2299,0,0,76e1268d9e586f7e108759dfb4a3b616648fa75f57f1f685f576ecccc85b8d02,2024-11-21T09:09:27.393000 CVE-2024-2300,0,0,c92a8f4bde6838d4ec64cad2649eead9a06ac17086996316734c20573aeb6bdf,2024-11-21T09:09:27.507000 CVE-2024-2301,0,0,a1ee42c1d3655911bd806b93d1801c274f1f3777e5a9383e39b02e17319ffee3,2024-11-21T09:09:27.677000 -CVE-2024-2302,0,0,b1dc8a0f9e2ca920e65d42688ac9ed89cee90bc27bb949daf70a604f60fd54f0,2025-02-07T17:05:52.550000 +CVE-2024-2302,0,1,3757c6a84fc520895bf80274b44761fcda695347d86c62f50fa90e823b383df1,2025-02-07T17:05:52.550000 CVE-2024-2303,0,0,338108ef93a8d51ca68709f7f6bce667cc234088d5fcb7a22e0c87ae315e55af,2024-11-21T09:09:27.877000 CVE-2024-23031,0,0,eeef3116fde0ba273569059741fcc23fb6cbc1cde109bca3e44bf535e8aca5f9,2024-11-21T08:56:51.323000 CVE-2024-23032,0,0,b8092d8ffd9b611e7f5a1792b86be76af7a05fad1c681ee27464670060494d7d,2024-11-21T08:56:51.487000 @@ -250882,7 +250882,7 @@ CVE-2024-23076,0,0,fd41d819a44d59d3092a16f5288e79b1a761ae3ee873b23b44d19b013fd6a CVE-2024-23077,0,0,8c7bc4cc5d23380f579aa34e9e2fd5ac0d51488b2600abd36d858f263dc4c8ca,2024-11-21T08:56:53.923000 CVE-2024-23078,0,0,bb7455dc97cc4099bc6efc4f312e2cf3074cd4427821f3b5202bcc8c61d65aaf,2024-11-21T08:56:54.150000 CVE-2024-23079,0,0,f3d44238e38317645a3c01e89bcc6a7aa90557be7f2ec40d731a4e51d7416a4c,2024-11-21T08:56:54.373000 -CVE-2024-2308,0,0,959def2a19721d4386cce911e775ed265f667c8b67396bf7dd522aecaf9f376b,2024-11-21T09:09:28.530000 +CVE-2024-2308,0,1,fccc1deabdc896a072a2c52b4d0d2028880f9596612eef464fe38a3234193eea,2024-11-21T09:09:28.530000 CVE-2024-23080,0,0,540ca37d96b6e87160adffdc252f4ed23b6baf060296443d27e143f1618529f5,2024-11-21T08:56:54.597000 CVE-2024-23081,0,0,60dd7d0171d4f6b245d6e66367ad149073b97042840c382bdf429ce61cac7791,2025-03-05T14:53:25.190000 CVE-2024-23082,0,0,d39e2b9140325ff9294ea026d156b9f5476453085f001710478d4907c9bf8431,2024-11-21T08:56:54.977000 @@ -250973,15 +250973,15 @@ CVE-2024-23182,0,0,625f946da30ab43b0f704e68a3a3cccbfb8ec2b93d863be88f2761ba36326 CVE-2024-23183,0,0,f65fb8ea7148b7b7636f79f5b1b8774259fb0565e9f6edb802e8a8c921e074a0,2024-11-21T08:57:08.607000 CVE-2024-23184,0,0,f201125bf731167ef05efef95fc564432832ef4ed483170af2933226920af480,2024-11-21T08:57:08.740000 CVE-2024-23185,0,0,4a2e667de22a7450435d805172dca8123ca48e8776ee60e14f59dd9676f69f5d,2024-11-21T08:57:08.877000 -CVE-2024-23186,0,0,b53fe3d1971110eb0d56682143401dc022c0a59ba6e56425b2bb2b9b4e8d176d,2024-11-21T08:57:09.007000 -CVE-2024-23187,0,0,bd9ea0207b3c15b13419dbdada0d0e593ffb6779139d3e176beba531c2f83929,2024-11-21T08:57:09.153000 +CVE-2024-23186,0,1,8721b57877dc095b078e125a0d91df6b24155f0539605d0ef99299917e6de951,2025-03-05T18:25:53.837000 +CVE-2024-23187,0,1,da13d732f209931e109e4376d769281c05460e6cbec4c53e0e64ddb6be048918,2025-03-05T18:25:53.837000 CVE-2024-23188,0,0,e57bf076d79b46080653535d5facf7ea6f48556005cbfbe757a17549c5fca451,2024-11-21T08:57:09.290000 CVE-2024-23189,0,0,2dcb83600c7b6268dd065a31184f08643b7e5ba7bb873f7f795177cfe9ba2858,2024-11-21T08:57:09.423000 CVE-2024-2319,0,0,1418ba7cc621002cc4527c61c39900039c19a1ea381385be7989a5060e493d66,2025-02-26T15:14:55.753000 CVE-2024-23190,0,0,747efaa24f1bce653dd7e840d6a55e38e641b287358bf91f911c14cef04f7be4,2024-11-21T08:57:09.567000 CVE-2024-23191,0,0,d2ea5aae002a429666bac8b5a63d801b2d5809d89c8d7e4c6fd61a0cc08a2d59,2024-11-21T08:57:09.693000 CVE-2024-23192,0,0,c6430031b85d693f74587e2a6124ad07ee3239260f7eec531627308e9322a471,2024-11-21T08:57:09.830000 -CVE-2024-23193,0,0,fe76ff0617317c38830451a566991feebeb41612ad147a0eace3130f4a16182d,2024-11-21T08:57:09.963000 +CVE-2024-23193,0,1,d37a4a3bac7a676e90658eee38ebfc15ada10713df2275bf5e9c252b3ee89bfb,2025-03-05T18:25:53.837000 CVE-2024-23194,0,0,4f40f5167bdcf1a866193efba982a2c3887ef8a11b46c3ce806ea82446be0618,2024-11-21T08:57:10.087000 CVE-2024-23196,0,0,0d32c51ce72350dd7c64548130f68fa93ab80dcc404414e8b48b908eeb62f212,2024-11-21T08:57:10.203000 CVE-2024-23198,0,0,a5338ff6dff96c82819e2859f221df5f7180e563642447ebfaeef4986d1e0ab6,2024-11-15T14:00:09.720000 @@ -250993,7 +250993,7 @@ CVE-2024-23206,0,0,9e777a10031b5716403ff73d3adec8146d0aa011bc0391d9c521d7c6c5233 CVE-2024-23207,0,0,3e47326e3574e1f9aeaa98da0d01306f4bcb8b72a10e3a2e0673c319b3079be6,2024-11-21T08:57:11.247000 CVE-2024-23208,0,0,810d3b4a7e1de14cb6e077b452aa0c2cf46c8a2cd89fa0fbfe18bc6dd4752459,2024-11-21T08:57:11.403000 CVE-2024-23209,0,0,508947cef128c468d7031969831df7ee4e263f34ef19a6ecb6658dd46402cc13,2024-11-21T08:57:11.573000 -CVE-2024-2321,0,0,98dc9a6ce1951cc6ea577640a0fb177312e3c99e836b79f416e5544e3c098d7c,2025-02-27T05:15:13.797000 +CVE-2024-2321,0,1,678878df342ca8dc9fb0551f1b91f0f5f9e158bce34c16bb515bb37abbb09b5f,2025-02-27T05:15:13.797000 CVE-2024-23210,0,0,cb5c88d977c2769d4f697e5daf2a577fa638ba6c856f205aaa8b71beeb5b18ce,2024-11-21T08:57:11.727000 CVE-2024-23211,0,0,6443f2a6dc297bcf18aa5f9b7fa9d8ffb577893da091e8174da74d3739b39122,2024-11-21T08:57:11.873000 CVE-2024-23212,0,0,8fbdf0c973cb3685f76270ed845d421e8bf63a7d857724c1c200081c24a6e498,2024-11-21T08:57:12.013000 @@ -251046,7 +251046,7 @@ CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f CVE-2024-23257,0,0,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000 CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000 CVE-2024-23259,0,0,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000 -CVE-2024-2326,0,0,3181cfbeea673dbd7e90fe1d89c2bcd56c4e1db4e1b04c126f46f489dab6717a,2025-02-13T16:32:17.897000 +CVE-2024-2326,0,1,929a0db19dfdd6e3c3498b7ab574022873482ae16c923fea11bf69c40088fe80,2025-02-13T16:32:17.897000 CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000 CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000 CVE-2024-23262,0,0,1535451d12572554b56049bc49912d9cdb50bf6dc852f77d89b358e10c4ee767,2024-12-09T14:38:23.027000 @@ -251105,7 +251105,7 @@ CVE-2024-23310,0,0,0b899446194e92b3aba68888de9ede36a30a6a2b6574ab815eecfdd15bf8d CVE-2024-23312,0,0,a7a04a52bc910d84866b2179567278563115cc32c80171ea031504dffb3df412,2024-11-15T14:00:09.720000 CVE-2024-23313,0,0,314036267a9a855bc9ef168dd544f783cf33a389caaab6bf2129f4e7b0ecb649,2025-01-22T15:30:48.677000 CVE-2024-23314,0,0,13e8827790917d56bb8428dcbde7fc44825a3529fd30c6c0b90305086bd0d66e,2025-01-23T19:52:38.097000 -CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa163,2025-02-12T17:30:29.620000 +CVE-2024-23315,0,1,e832491a5d3cb9039d76773de6802ac0934835d59c8924235cab5880eb4dda7b,2025-02-12T17:30:29.620000 CVE-2024-23316,0,0,77a5a935cbef327acd67ebc87bd460467d5092bf8f49de3609b9191364fdfea8,2024-11-21T08:57:29.393000 CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 @@ -251235,7 +251235,7 @@ CVE-2024-23436,0,0,9d9890cc0e8eeed8d7dd79c449db082fdc01a1f3d4ea5ad8de13ee326f8db CVE-2024-23437,0,0,ee59c2e2cfc2b4d6eacc2bf7304883418405daaab31f4e25a07db9ec41632f27,2025-01-01T00:15:41.123000 CVE-2024-23438,0,0,50f99bb945243dd3c3cd80675c0b4365c294d8ebe7ea659e8646fea5bb3cf596,2025-01-01T00:15:41.193000 CVE-2024-23439,0,0,12968241395f8c73c9a4599762d2ea068ebcf9c238e4c0c3dc52111a494628b8,2024-11-21T08:57:42.570000 -CVE-2024-2344,0,0,4f4244d272b64051dfc03423710b3236e83d2253b04bc5de318d9cd1c5703ddb,2025-02-05T15:49:42.697000 +CVE-2024-2344,0,1,359f1dbb193e571fc97fc41e851542c284bfb453332896228eec72591d697aca,2025-02-05T15:49:42.697000 CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01afead,2024-11-21T08:57:42.717000 CVE-2024-23441,0,0,5fbfae92029097d4fc891359f80283dcab2b38733988c2bba5734ba6888ded2a,2024-11-21T08:57:42.840000 CVE-2024-23442,0,0,85a9a2957fc08ee9b474618a1da6b8d0a607c36f5bd40b243be47bb63ce225c4,2024-11-21T08:57:42.983000 @@ -251372,9 +251372,9 @@ CVE-2024-23597,0,0,1138102b02798c4cf2e065c36b9c461a341ae35663c847804fe1587c612bc CVE-2024-23599,0,0,2e21d93c4a0a72aa75a6ef5b96c4a25e8c190e6f300bdcf8fdf40c67b15a9c66,2024-09-16T18:03:16.707000 CVE-2024-2360,0,0,72eb16f212792366c82a04edec63da5f77102fcb5d9964442491e4a7f172eaf6,2024-11-21T09:09:35.537000 CVE-2024-23600,0,0,f34082bd9192489fa5275f7efc30e7a35fabb02eb0f67563ac353c4e36b0fe1f,2024-11-21T08:57:58.917000 -CVE-2024-23601,0,0,b0d86a50e05a932ab38d83c0ccb534c3f4ebcc6506782150958246244f2f5fec,2025-02-12T17:30:39.290000 +CVE-2024-23601,0,1,7b80271053e23668052a3e2776cd9a3894e023e5be8020f228bd9a0a8c41a5cd,2025-02-12T17:30:39.290000 CVE-2024-23603,0,0,385cd1da19f9f814b37d46a252792eece53dc5fba36c8bad0a0244cf15993622,2025-01-23T19:52:26.203000 -CVE-2024-23604,0,0,adb78be251ceb4c3d8be4e8811f095140f4fcf9cb6fb57b8dac1cae74268d8a5,2024-11-21T08:57:59.313000 +CVE-2024-23604,0,1,28ff7ab5f96a79c083f4f04be01cbb6fb5e631c16fd581777a3c026a8afd84bf,2024-11-21T08:57:59.313000 CVE-2024-23605,0,0,cd8e3ab40368127668f9babb60974a68fb7e547c58851815f7b8d252542d79e6,2025-02-12T18:53:36.843000 CVE-2024-23606,0,0,29997b26a92eb62ace56664ebd405775eb345e3afd91cb43cd5981d3cb444142,2025-01-22T14:58:56.600000 CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 @@ -251704,12 +251704,12 @@ CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22 CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000 CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000 CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000 -CVE-2024-23947,0,0,b601f9c0d1648014a144a57832c6f16ce538cb1ecc8876be0c31f95239777453,2025-02-12T18:43:20.107000 -CVE-2024-23948,0,0,f818a48e0ffa942e9b2ed8551122dd0e1be972d19034b433c708be70a7d5f01f,2025-02-12T18:43:24.687000 -CVE-2024-23949,0,0,d0362ae3925c21ea55d7175be64cd1f332c6f064e6790697c029261c8b73955e,2025-02-12T15:27:09.327000 +CVE-2024-23947,0,1,71278d4a159cc549aab5b7dbabd025fce93076b316a17d3e2ac8c5a91e551401,2025-02-12T18:43:20.107000 +CVE-2024-23948,0,1,c4340c793641d823b9f3789f568fd96f3e2cea4b888e1ca28a5883e79c28a251,2025-02-12T18:43:24.687000 +CVE-2024-23949,0,1,58e40a186511309572ffb6d385fcf698443604e10d6e1eb9b3d030c3d878efe3,2025-02-12T15:27:09.327000 CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa5f,2025-01-22T17:38:35.133000 -CVE-2024-23950,0,0,a25694506be65627971d118ef0996de49f121864a4c393a4f64e7ed306dbe9f4,2025-02-12T15:27:11.963000 -CVE-2024-23951,0,0,2c1111104c3a80f1816366b6e03301e81b07c7121a3d81a108a46a5d9d035856,2025-02-12T15:27:18.610000 +CVE-2024-23950,0,1,cc408938e34eb55d8fbdbfdb211d9715ae0c71df48f34052f598f5a8731e0a58,2025-02-12T15:27:11.963000 +CVE-2024-23951,0,1,eabf407987083ed09dc16c34206a0e636b603e20d27eee94462d69e13e2f670e,2025-02-12T15:27:18.610000 CVE-2024-23952,0,0,1bcc485ce710723af09579e80e1813bef95c3a0bfe3529a9270b22180d30e86c,2025-02-13T18:17:06.317000 CVE-2024-23953,0,0,df3328da020e64542317a74c05127220f564fce7246a2110dcfa14eb1923fc50,2025-02-18T19:15:15.100000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 @@ -251782,7 +251782,7 @@ CVE-2024-24060,0,0,76420c08875743804b95d33c1b8e327e25e9a56c748b2569fe6e9e74860b3 CVE-2024-24061,0,0,b44f4520c297437d45fb26f88d26245a5b6e5157f6d3a6fede608839ca3e86f0,2024-11-21T08:58:53.283000 CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d0681eb,2024-11-21T08:58:53.443000 CVE-2024-2408,0,0,a9a44685e12fb751abb365dcea513da0e8982589d7eaa294b433e4d0136753aa,2024-11-21T09:09:41.450000 -CVE-2024-2409,0,0,78c753b9aae1bd2c3550b373a8f234222a1b9a57bf6bf591134c957602f46d5d,2025-02-13T17:00:33.790000 +CVE-2024-2409,0,1,77d5c2883cdd5dbd6edc65df7d11494763b07409c810ab6debf5b40e86f36c09,2025-02-13T17:00:33.790000 CVE-2024-24091,0,0,ab544d8586eff97d50440c6aee00588f4dadfd440f573585f5d79c9b1b92e18e,2024-11-21T08:58:53.610000 CVE-2024-24092,0,0,42612e9d4b67369b95e4f784bad7b4f3ce9b376ecaf3980484ef440bfbfb510d,2024-11-21T08:58:53.847000 CVE-2024-24093,0,0,d01cfd200da021b3379ec9bea10950f044fa309e1e43c1c0570f4c10f2933dc4,2024-11-21T08:58:54.060000 @@ -251794,8 +251794,8 @@ CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 CVE-2024-24100,0,0,db7d10f5d64a8259083619861ebb4b9faf84331b0fb973cf3e1a2b34b1e4e44c,2025-02-14T16:22:01.353000 CVE-2024-24101,0,0,563312b74900c09422642fc4bafe8c2840bea986472e646f74632b6726180976,2025-01-22T17:36:07.860000 -CVE-2024-24105,0,0,255c139eabd3d6721f6c2c8b3ad56b8ba1f8f667587ce82d0155af0ac2d90fa5,2024-11-21T08:58:55.537000 -CVE-2024-2411,0,0,1ef427180695e8f2f033c0a9c912e02b74e8c07efafab60f0f0a1a5c9f962074,2025-02-13T17:01:09.280000 +CVE-2024-24105,0,1,b576bf693f6d9733c0a26f63ed89a4b254ab10444b843390a53d78f8cf17229f,2024-11-21T08:58:55.537000 +CVE-2024-2411,0,1,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e887412,2025-02-13T17:01:09.280000 CVE-2024-24110,0,0,24e3bfd7edfbdc9c648c149e52de113518ac1893351463aa09c13045ca7b364b,2024-11-21T08:58:55.667000 CVE-2024-24112,0,0,f6f904d56964636026057ec672d9f84ee172228629a02220c0864497bc55f6f0,2024-11-21T08:58:55.863000 CVE-2024-24113,0,0,76a9d649e638013a0a10bc2ce28faef2817a4228fee697e65a3b46a10e812685,2024-11-21T08:58:56 @@ -251919,7 +251919,7 @@ CVE-2024-24377,0,0,c3571d591fdd08eb6fe4c53e100023da606530fd66732a886bbbbe622f3d1 CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce96a,2024-03-14T09:15:47.820000 CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000 CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000 -CVE-2024-24389,0,0,49aa6d9312e4d29e27cc709f52e604a0436c4e91d554f995739df03678e825b1,2024-11-21T08:59:13.837000 +CVE-2024-24389,0,1,a8627c501b7e0dd34f82f922dafae6af0c91e44694fbb68ae01ac90102f7965d,2025-03-04T12:24:40.610000 CVE-2024-2439,0,0,04c5f4fa6f67f489c58ccf593949bf5d9843594145e36bf2723ffa8d15715cec,2024-11-21T09:09:45.333000 CVE-2024-24393,0,0,48dfbe81842a64324199d0bfa1e284aff3b021c9ccffa6b60b0d1cc58917f1d4,2024-11-21T08:59:13.997000 CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000 @@ -252047,8 +252047,8 @@ CVE-2024-2458,0,0,319a78c86a58092ce1c5e35bc65fec9c0557613ad51751d54ef1712c397096 CVE-2024-24580,0,0,c82b57533ee2cdae632f5a7f262f01cd2e85179db0618007cb72f54ca7a8e33b,2024-08-23T18:51:20.207000 CVE-2024-24581,0,0,36fae7d53f9afffd69c2bce98990b53d6cc54ce63ef6e7416027a1f6696d8f33,2025-01-27T18:00:59 CVE-2024-24582,0,0,854212269199f6b7b51c3d0b584a8d0cfba3272b675c684ae2ac7ca7bf5233f8,2025-02-12T22:15:31.367000 -CVE-2024-24583,0,0,bcc0d97b1272a178e3384040a9e79397ecf386dff5ae4277decbfeb02e16846d,2025-02-11T22:25:31.757000 -CVE-2024-24584,0,0,6aa61e7cb66d06f7ba7f81956e3714ba73bfe1296669178782f9d4955fc09571,2025-02-11T22:29:21.440000 +CVE-2024-24583,0,1,bcd0b36abf44a7fa2077c97e50c898fa7d374e048ed94cc28c38e065a72e7e5c,2025-02-11T22:25:31.757000 +CVE-2024-24584,0,1,23e6f54c7dd15656c45c750e9b6439ceca6299220767ef74d90505dec60ed00b,2025-02-11T22:29:21.440000 CVE-2024-2459,0,0,25a3e13292c0e654cb7fca3dafd8a2a21d524bd7d615cdbca42cdbb547eef683,2024-11-21T09:09:47.813000 CVE-2024-24590,0,0,7ece5f7d85e7f677d2f819dca24899da58fde2979f5f40ed9b70a43da5301777,2024-11-21T08:59:28.480000 CVE-2024-24591,0,0,51d751e82b9be188fcfe13a3a316803b31f45c5a1d86eb9dbfe47d7d18116f6c,2024-11-21T08:59:28.657000 @@ -252071,9 +252071,9 @@ CVE-2024-2468,0,0,ee79c285973462515e70d1cd2da5bd3b8fd4566e8905e23739ea0319c22a04 CVE-2024-24680,0,0,474c362fefe258eca65be82ee02746cd95560765418ab406dcac5f7813a26c14,2024-11-21T08:59:29.843000 CVE-2024-24681,0,0,b61d4bd1e9ae9505ba694185a31b6b3f062c5e0a177293e5e405d1b6f70144a6,2025-02-25T22:56:29.053000 CVE-2024-24683,0,0,8f2ae4428ee5c111dfe0471d0522ee8f0f1aa241441321a4a91466595b31d3c7,2024-11-21T21:15:18.530000 -CVE-2024-24684,0,0,5c4d6a8c735fe8f9a2e12a43934c034c7be834c4472e9e150a372b743281853b,2025-02-12T19:29:16.393000 -CVE-2024-24685,0,0,3141fff8f24bf2ab2c3307a086354d8cc7343106fcd5ec98ef301e624bc6a830,2025-02-11T22:29:31.567000 -CVE-2024-24686,0,0,1c814552698bce1028a0b9ed2191003402d783f25a0e4442d7b9574b7e0d820f,2025-02-11T22:29:42.443000 +CVE-2024-24684,0,1,2eaacd9ce1adfd9eced32407f759d3842eea3b6fa2b57db46cb3ea37e09dd3d2,2025-02-12T19:29:16.393000 +CVE-2024-24685,0,1,739f798e8b87f75ec9e88e98f35786f3491aadc057b3c3d732b150059f131a23,2025-02-11T22:29:31.567000 +CVE-2024-24686,0,1,6fa1c4e04167da145634d91fc8a73a68545a78a78cd43c80a80561bd3f4e5c83,2025-02-11T22:29:42.443000 CVE-2024-2469,0,0,64cfef5974ac04d8e1d219bffdbf7345a68085414e30bec48058697bc816803a,2024-11-21T09:09:49.290000 CVE-2024-24690,0,0,da067a4f63d8f2803f589953dcfaaf7d9ae69a71514cc0e06984f59cb20bc03b,2024-11-21T08:59:30.693000 CVE-2024-24691,0,0,73c2b9b5db4bdb88283e16426f6f00b01b4478cf0f37b167d5f276a891260657,2024-11-21T08:59:30.850000 @@ -252106,7 +252106,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000 CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000 -CVE-2024-2472,0,0,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000 +CVE-2024-2472,0,1,b209d134dbd170e7e6b490589342ea2337c9cea4b16e58632262550a528f2274,2025-02-20T15:28:10.360000 CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000 CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000 CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000 @@ -252155,7 +252155,7 @@ CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a59398430 CVE-2024-24775,0,0,7f0cbc7d6af894e75c1d6dc5713fcd9f630cd471f82e9ecb0a63fc95da2f7ff6,2025-01-23T19:53:31.737000 CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000 CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000 -CVE-2024-24778,0,0,8e69505cadc4079a45418c71d867e3a3f3dd8b7a21b0499700cd2514fa5e55d4,2025-03-03T18:15:28.933000 +CVE-2024-24778,0,1,d74b7f7074a19b5be59fcaa33d57fbc6a17817b75ff97c6c75e77bbe3a08f4c5,2025-03-03T18:15:28.933000 CVE-2024-24779,0,0,7865ce8073200edcc497f4b351f74becfa65acde228d4f6892cf22addee64a54,2025-02-13T18:17:09.103000 CVE-2024-2478,0,0,3c239e842dee9874af5c6211db90ee2eaf9a1e0be73fcbf1799989b16285416b,2025-01-23T19:24:38.173000 CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000 @@ -252177,7 +252177,7 @@ CVE-2024-24795,0,0,2da97a6e56c40203aadd88660348ec99ae7b68424772c3720e921ac678e72 CVE-2024-24796,0,0,936f569a4e34fb4d4aac1ba450fe67ab1232609d0c0323046d33e8e209938b91,2024-11-21T08:59:43.837000 CVE-2024-24797,0,0,067d8188b693e0ee4b12c52f8b196bfe51310c68f65d14af22bddd959f943a34,2024-11-21T08:59:43.973000 CVE-2024-24798,0,0,c5bb0364de6a32ae0059fc62bce418f0115c8ef80a60990b33c1206ede4f4950,2024-11-21T08:59:44.117000 -CVE-2024-24799,0,0,2de0339d7da838c99a8acb6d666ca4cd712d7b4db0d617eb199747f254c4f180,2024-11-21T08:59:44.243000 +CVE-2024-24799,0,1,ca3469d87cb2c01ebd90a7601df95ed4e0aa6a96f934d12cb24001c335d3a3ce,2024-11-21T08:59:44.243000 CVE-2024-2480,0,0,ce00803e39255555a99ec03cfae896022682a09f2c57f68554b689efdb172f8b,2025-01-23T19:25:57.537000 CVE-2024-24800,0,0,dbe60d3968d5b952b66adef8c28c56be1673a0644aa5f108b8354581256d30d3,2024-11-21T08:59:44.353000 CVE-2024-24801,0,0,4515ade1c54a6676b32c21cdc744d9933c5c155323292753062789136d4bafa3,2024-11-21T08:59:44.487000 @@ -252234,13 +252234,13 @@ CVE-2024-24848,0,0,4c111a7b3bda17b2f7f0cb61fe7135433ebc8ceeb9bdbd4e678bce0337cec CVE-2024-24849,0,0,d6fa97d34a9f8ee5cd27ec0b205f20369d7c9f2e74bdce13f8ada0b878beff1f,2024-11-21T08:59:50.900000 CVE-2024-2485,0,0,adb1797256b1beed5858dfc25960a724942db9de19f1b038e5acd84a4e61c2a0,2025-01-14T15:04:40.223000 CVE-2024-24850,0,0,358a48632f493dca7103f0e0c7ddd1ca29e6043f56e8ec4ac8435732328792c6,2024-11-21T08:59:51.027000 -CVE-2024-24851,0,0,8a0de2d372cc00e0501058469de2ba4c4c3dd1c300c2bacaa49d22d23637a75b,2025-02-12T17:30:47.617000 +CVE-2024-24851,0,1,90eb2efce7408b8129669f3c17cdb128222be1673fe320f4a7252b578e88afc2,2025-02-12T17:30:47.617000 CVE-2024-24852,0,0,0166ffd44290bd7f5ddf41905bdea4409d07418a9bef403c1fe35d9c9b179831,2025-02-12T22:15:31.513000 CVE-2024-24853,0,0,a10ce97855e08511e97986f9ca05abd9dff99a60ae512e9aae90160d4c0160f8,2024-08-14T17:49:14.177000 CVE-2024-24855,0,0,2d2cc7e7d5fb06a33f26ef44e1f1e7a2395fd03f1ba9c19687037bbddaf43e03,2024-11-21T08:59:51.400000 CVE-2024-24856,0,0,edb9e16ab701f1d81ac7cd6a8857e1142fec8ecd54bd3157273d221937841e28,2024-11-21T08:59:51.540000 -CVE-2024-24857,0,0,6139e34a0f330e5061282d0dba0a22fa8f7922cf22310931a3697bb7512d414b,2025-02-13T18:17:10.400000 -CVE-2024-24858,0,0,0a28f2d237d8463a2b7c11f8b0faa6e161e1a3b2d3b60746af305bfa341c5ce6,2025-02-13T18:17:10.597000 +CVE-2024-24857,0,1,3221a103b7d47446979ea528af613a27d865ea05fc375d568496b953ec77bd9a,2025-02-13T18:17:10.400000 +CVE-2024-24858,0,1,cba56159caa3f20f583ffcc3d3cbc60c5783fc8b4ada7c602f05da6ceb5bbd85,2025-02-13T18:17:10.597000 CVE-2024-24859,0,0,1e9af0a415a84c2f4d791281793ccaa6011f306402167f817da3af157684475d,2024-11-21T08:59:51.947000 CVE-2024-2486,0,0,49d70eda15c81eabb63461524b52b0bd95e9edacb07020579cd4d397a5734699,2025-01-14T15:00:51.100000 CVE-2024-24860,0,0,6a035dbccdd7cdd85285af7c4b76d564f419bfa6006869dfa1bb048ecc0fc83d,2025-02-13T18:17:10.967000 @@ -252251,7 +252251,7 @@ CVE-2024-24864,0,0,27b4318b0077aecacc0bff97a7bfbb119dcfd9017e02ec3f588a32590804d CVE-2024-24865,0,0,d08cc7a5f4e640cb6bc3d4882fe1fb48396562a861f7afa982a5961eb7360320,2024-11-21T08:59:52.543000 CVE-2024-24866,0,0,ca01e7ab9182f580c2df3cc16f43bce2d9101083ab37c189e1385bceb76e0af5,2024-11-21T08:59:52.693000 CVE-2024-24867,0,0,5a246564c5ccaa080317adcae2e224bd6ffc62017f7842c13916429403d09a7e,2025-02-20T12:44:20.437000 -CVE-2024-24868,0,0,7d9ace72fd51c3ebc4fe627c26865f075dab094d6310f98b6c6f4c9bade4f981,2024-11-21T08:59:52.977000 +CVE-2024-24868,0,1,faf815e14243ecda8a4fb79595070f834b313c71f8b0c23ccde8243cafc5e3a7,2025-03-04T12:24:19.653000 CVE-2024-24869,0,0,eaa1bccf1ddb288cf6ae98ff79cb753c80b1b38e0069bd3f25d738e7d525e442,2024-11-21T08:59:53.090000 CVE-2024-2487,0,0,154b62626197a03542ee0c0398cde6999f209ff33e52a9d26afaadde0098fa01,2025-01-14T15:05:51.047000 CVE-2024-24870,0,0,6aa9e51d9448a0e10a1161f66474e51dfb7b958ca3b6f9bbc2044595a50090d8,2024-11-21T08:59:53.213000 @@ -252326,18 +252326,18 @@ CVE-2024-24941,0,0,fa0d1586eeb626539cff2e8bf22b728aa85462712b484b0e1230b11eecaab CVE-2024-24942,0,0,563210d81811f20dca2f0d31fb8a3f809a103faa9f572a2543ac563f930d5f1e,2024-11-21T09:00:01.683000 CVE-2024-24943,0,0,39797c58f877efcb960a5c14e3952b4ed965705c28abbc91788b0766abbf7e47,2024-11-21T09:00:01.907000 CVE-2024-24945,0,0,1a32182f01b8efb3b584bcd9740c8c6b7f92a97eac5ec81f3a38816d6387c7e5,2024-11-21T09:00:02.077000 -CVE-2024-24946,0,0,6e1766ca1b48ddc97e37caac6e87887cf9d35afcf4513c96a2130795607ee10f,2025-02-12T18:34:36.453000 -CVE-2024-24947,0,0,4ca04ca961ffa2c96ce1cd4ff018754921d1195c2c56a51519b328d38807ddfa,2025-02-12T18:30:42.337000 +CVE-2024-24946,0,1,6c95bd8ba77edc7f25868e78a3518eca55293adadeb268b683194c0140562b6f,2025-02-12T18:34:36.453000 +CVE-2024-24947,0,1,dde25728d15e2ed176ff53ba6f463565e56a0b470c28f05e63a653046f703e10,2025-02-12T18:30:42.337000 CVE-2024-2495,0,0,bd4f8634593ff81cb17e20628f6195b87d6b1a7ff0eee06d72d356d112925df6,2024-11-21T09:09:52.873000 -CVE-2024-24954,0,0,9e81e689a300e5d54b2cec335fed963ca2904549d465794eeba898865678b7ec,2025-02-12T18:30:49.627000 -CVE-2024-24955,0,0,7148364b6e70fb3fbf9c869f973afc84e1c8b5b176b9ab283a17d9b7324241d4,2025-02-12T18:31:05.193000 -CVE-2024-24956,0,0,c2a5bd245e1d4d253e968f8ebcb0346c2f0bfad71ca2ee7b78d16be6e69237d6,2025-02-12T18:31:17.050000 -CVE-2024-24957,0,0,f5538d011521f604eb4f1c558ddb9e0c5a6a8b9f31855b2719e3da5475d6a486,2025-02-12T17:03:40.950000 -CVE-2024-24958,0,0,527c1451e793518e00c18fe6b2670f2e7bd5a513105d9a01c3741e602eb7681a,2025-02-12T18:31:11.083000 -CVE-2024-24959,0,0,694af09c402bb04a432a9114478ed7de7611779253cef4ad2aa61954429d1495,2025-02-12T18:31:34.233000 +CVE-2024-24954,0,1,a0216ee78f0352cdb318df954d0f9c1883c2de4e94772ef5ca6583150fd66983,2025-02-12T18:30:49.627000 +CVE-2024-24955,0,1,146169a1e1cacf377a62c58111d96cbe83baaa11c7592f78e33ee894ef7213e2,2025-02-12T18:31:05.193000 +CVE-2024-24956,0,1,e3270228bd393e0527e3f45dbca121efb9cb8d83501175f02d74f66628dc56fd,2025-02-12T18:31:17.050000 +CVE-2024-24957,0,1,0c1b1ef6a12a1868762dfcd1411dba7e22e260f66964befdde4f1681757d9c61,2025-02-12T17:03:40.950000 +CVE-2024-24958,0,1,5d62a4edb03f4d39bbfb8815c5e9a04a49ec079bef906370eddc396586562628,2025-02-12T18:31:11.083000 +CVE-2024-24959,0,1,117ee43ac05c50ea96f3a78f346b228fdad98bcf5fe1f1cf29e5351fbd021407,2025-02-12T18:31:34.233000 CVE-2024-2496,0,0,051579418359f85bbcda93fbe22a82cdbe6432c139ab0c0ffad8ae83e4581f99,2024-11-21T09:09:53 -CVE-2024-24962,0,0,462526816590ace8be0822706ac0315b9ed293e99ef0b9e5c0875302ab11ec1f,2025-02-12T18:31:24.260000 -CVE-2024-24963,0,0,c3ccea828eefdc726220c28926ef37931db8f41d0ee27dd9d1feafaf13a8a3d0,2025-02-12T18:31:43.123000 +CVE-2024-24962,0,1,9b3a9aaa83b9b91eab35e72e4986ef4c120504afe25c1bc20cb59322ee3cb9ce,2025-02-12T18:31:24.260000 +CVE-2024-24963,0,1,1b89e7a03b029e28d7474f0811b20c09d2c25d0e024f8693aa4a92170d43d5af,2025-02-12T18:31:43.123000 CVE-2024-24964,0,0,f2f90e1f53bc2e9057a1ed570baa4ea348ebae1fccc952c0417838ff4dd829be,2024-11-21T09:00:03.480000 CVE-2024-24966,0,0,7f40249452ab29b78281e89da3b43963bc92b9dafe5558c0305b23f778ea8514,2025-01-24T16:03:35.577000 CVE-2024-24968,0,0,696d26673f8bfe4c4d2a73b4f148f6d11f8d01112814d7ff9d1989df891ba417,2024-09-16T18:03:16.707000 @@ -252394,7 +252394,7 @@ CVE-2024-25029,0,0,b687f5b3fdfbde494167fcb1f03a00ea37c9c79db373d46255ea84ad0b785 CVE-2024-2503,0,0,0a8ceaf40ee6d348134f20a61aab597ac54c9e02f02542b8489429dec92d39ae,2025-01-24T16:37:14.727000 CVE-2024-25030,0,0,919614696c7355d4b34af9f26782392447276c6505979ecc2115be67223d88f9,2025-01-31T17:45:39.267000 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 -CVE-2024-25034,0,0,3f9fae6169c872a2766847e3a2299dab96c127dadcf1e6d60fac2157502bc279,2025-01-24T16:15:34.747000 +CVE-2024-25034,0,1,8a2396aba350a941c20a1192591cb1971e0075a0411a81032add385116843cd8,2025-03-04T16:58:06.783000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000 @@ -252478,7 +252478,7 @@ CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2ace CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000 CVE-2024-25139,0,0,fdeb3d927e69c956014f96de124a68cf6bb51b7f07318e0d74877516eaff6a55,2024-11-21T09:00:19.547000 -CVE-2024-2514,0,0,c051d432ba69a4335415d0c374311dad98702c979251fa62476929e55cc64bff,2024-11-21T09:09:55.013000 +CVE-2024-2514,0,1,3666fc6fa40a32c1dd3511d6121e7494bc9c41cae56c32653f020114fd88603f,2024-11-21T09:09:55.013000 CVE-2024-25140,0,0,4ce38a5e52087d3f6ac88d58a99d775b8a3a482d26af7aec3ecdd9c1eb0cc9f2,2024-11-21T09:00:19.800000 CVE-2024-25141,0,0,569d4c84f026c7313d1be9b590a56d17544ba69d3b1c743c7f697b7d4b70ae6e,2024-11-21T09:00:20.073000 CVE-2024-25142,0,0,db42fdc65111e68e257774ac0212736096b6a80463cfaa3d305c8c982827e10b,2024-12-11T15:37:21.737000 @@ -252605,7 +252605,7 @@ CVE-2024-25325,0,0,b9a6eccdc6c82e87ce40cd5511f956ad176fcac06b9d26c743462dcd60e30 CVE-2024-25327,0,0,200c2b510342a3e155d5c5aae84c1549b1fe17451fa1d4b0fa553a648fd4f02a,2024-11-21T09:00:38.827000 CVE-2024-2533,0,0,e346cf84b9f2f449ac50f84ba3df088cc28ba956b6844353c3136c630c632e16,2025-03-03T16:40:55.250000 CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000 -CVE-2024-2534,0,0,97424fd59d63544788b3bddf8d6f9632a6b45872cdeae763936c7deb3e7b6689,2025-03-03T16:40:55.250000 +CVE-2024-2534,0,1,ddadf50002ef1b94584e9ef358ec9f81a25ad5282894f23cb1bfcb6fb335a20c,2025-03-03T16:40:55.250000 CVE-2024-25343,0,0,e95b5c5e8048e4efd735c454ea3bfb2db00d33bbce0bc4a2a17d6a93c15ddff4,2024-11-21T09:00:39.283000 CVE-2024-25344,0,0,33d39ecf8d6ac556c3d5bb95eb67c067ec31235f8aa78fc627aabc924889d088,2024-11-21T09:00:39.500000 CVE-2024-2535,0,0,db38ebb41a68a314837b286eb732510d8807566971f0363fbff364d69699d835,2025-03-03T16:40:55.250000 @@ -252637,7 +252637,7 @@ CVE-2024-25394,0,0,dd7bcb693a4d2d9ff2fd759d1b0c796a34b3635d993f1c8142f2d3b16bfc9 CVE-2024-25395,0,0,07219cd720070ff37f334ac8c7e862bfaece2ae36620eeaf2cae3f2974f76f03,2024-11-21T09:00:44.250000 CVE-2024-25398,0,0,f919c2593c4ed3584d6838cd87f2bdee41966c5d10decafa94aa0009b9f153f2,2024-11-21T09:00:44.480000 CVE-2024-25399,0,0,4a204de7f3e37a388b9cec089329fc0f4837af302e9f0eb9d8a0a92dc2c5915b,2024-11-21T09:00:44.720000 -CVE-2024-25400,0,0,32c1bbee155d9a2f625e1691142f1164a4fc09b539f40dd8763af271c46f0842,2024-11-21T09:00:44.967000 +CVE-2024-25400,0,1,b8395d2e0e2441d89e46af5e06e62a588ad3ddd0715330b6c3bf06010e7fcfd1,2024-11-21T09:00:44.967000 CVE-2024-25407,0,0,4939cab519cf350d5a83f5e15d262b1f15c4e14d17e41bb83ecfc7c35d4aa4e4,2024-11-21T09:00:45.103000 CVE-2024-2541,0,0,5e4a53f51ba8752f74c9f57c8894c57856dd31a2758293bd1ba5d82829a52e5f,2024-09-09T18:40:23.437000 CVE-2024-25410,0,0,dac9345065649fdfa0f1b15fd488c61a195353f59bfe50961a146c70428ea44b,2024-11-21T09:00:45.253000 @@ -252655,7 +252655,7 @@ CVE-2024-25421,0,0,4aaa4c906586deeb67dc43ed5331c3d0f3499a1d45ec23efb878770db6ed6 CVE-2024-25422,0,0,9df224cee5c73a7df73f9ac56a9b3271c481ae811b4a91ce17eee9b9b71feac7,2025-02-14T15:32:48.860000 CVE-2024-25423,0,0,94ea816a321c84c96a2ebe547c547d669f3866b10bc313b7f77b960fe74089b8,2024-11-21T09:00:47.563000 CVE-2024-25428,0,0,22a547278095b4eb8bf134210b7be8d293871bec4b1bd2f6683fc4f7d51a5b7a,2024-11-21T09:00:47.787000 -CVE-2024-2543,0,0,ccf6eabe332a490974ff591a3e766c8f7df32a51f19058b6ddbefb9a5c069197,2025-02-05T17:11:54.403000 +CVE-2024-2543,0,1,e35575ccd402f68f321b7401fe74212ccd49958980ed309abbebc7424e6af3c9,2025-02-05T17:11:54.403000 CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000 CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000 CVE-2024-25435,0,0,ffd6ea695301c706aa6aaeae767f55f3015b17dd1a5a656ab28edf92accf1629,2025-02-14T15:30:26.980000 @@ -252716,11 +252716,11 @@ CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000 CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000 CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000 -CVE-2024-2554,0,0,7dcd141762c59c777385201d2ebaf06ae1510edc3eb06ba1894ee7a9d4239f3d,2024-11-21T09:09:59.897000 +CVE-2024-2554,0,1,23ca9060cbf9a43b8d041de969328d4ee4d8e171a129b441d75d09c2a8a2620b,2025-03-06T14:24:40.890000 CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000 CVE-2024-2555,0,0,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000 CVE-2024-25551,0,0,650440c21f088bef59f5c6a3697f7b30ab533966a389f6fad3ff6f66329da998,2024-11-21T09:00:58.770000 -CVE-2024-25552,0,0,222938f125636cd21594f8e62c4f14b44e1a2a8c530deea47338d0180408e6a2,2024-11-21T09:00:58.990000 +CVE-2024-25552,0,1,42ff385dabc036e6dde0ba6fae86976b5bf3eb1e7518889aa9f67e63da6cff36,2025-03-04T12:25:10.853000 CVE-2024-25553,0,0,d425d147501fa8006dbadf60a3ee6d0e30ea870822653a9e9b85ebafb1bf219a,2024-03-01T08:15:37.950000 CVE-2024-25554,0,0,5ebde31c21d4e190368d0ea561a226f998eab9ab1a3ffbf4889f3384c5f1c9da,2024-03-01T08:15:38.107000 CVE-2024-25559,0,0,d15ef6a8292ff4e3cc5d05413efc5a3e9dcb2e2f4913411a9a6afc4ea649c703,2024-11-21T09:00:59.190000 @@ -252740,7 +252740,7 @@ CVE-2024-25572,0,0,3b91a9b2b3340e450f0ace2854bb810c9267cbdf3d9a3da323e758f101a51 CVE-2024-25574,0,0,38bfb683ae0693e82bc82c0914b5a3ec48f1a46d22ae174727a38920b3e6e3ae,2025-02-27T14:53:37.577000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 CVE-2024-25576,0,0,8c96953d02c3ecec70b0880ceff32ab69ff1846b5ba0dbd1e89bf62fd8ac88d6,2024-09-06T20:17:14.003000 -CVE-2024-25578,0,0,1ec583cdad1bcdd404a73ed0beec19ba1360982c3f7b911b3a7e6b729ebfb87e,2024-11-21T09:01:01.047000 +CVE-2024-25578,0,1,688471da2fbb08fccc6f2385061a4a225322b62336ad0196f4da3f2da0896fce,2025-03-06T14:24:40.890000 CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000 CVE-2024-2558,0,0,02ce2f2a64668ffe21ec4c1d0315a119eeef07446a2ef7cf12a8781dc0fd14f3,2025-01-27T16:56:47.900000 CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000 @@ -252807,7 +252807,7 @@ CVE-2024-25640,0,0,eca1a9dfeb497966580e78cbd95fea629a14b5d4a11a799afa1f6a8b14c7d CVE-2024-25641,0,0,b2a3939e97b39fcd21b29c24264b7985fc76caf1e5b39f061eee970c5b7ae5e8,2024-12-18T20:54:30.227000 CVE-2024-25642,0,0,7609fb69f5c96f5be6b0a3f61c2c584ad7b6c2324d5e497cd7edd3b04d9bb49c,2025-02-13T18:17:14.807000 CVE-2024-25643,0,0,8e6a356b8ab89fdd686b237a9d72bcd799dde27b91b093e0952fb685911508c3,2024-11-21T09:01:08.590000 -CVE-2024-25644,0,0,6856145ca66c40fcde11d013db1ad166b203ab8f85940dd5ee792ff27d663cd4,2025-02-26T15:15:08.143000 +CVE-2024-25644,0,1,d19dbebc2354f1fc55a84eff5d7aefd98631a7bcecfe8e59231ac1e6dee272f8,2025-02-26T15:15:08.143000 CVE-2024-25645,0,0,e9bfed7fd8ff5b807d29634868c865f6230d3239042945dba6765272aaca1309,2025-02-07T17:24:54.693000 CVE-2024-25646,0,0,44fe52cac33c14917646765b719e0181c8f6a16956565ea90bcc52cfa7963b87,2024-11-21T09:01:08.960000 CVE-2024-25647,0,0,6ba463439932268f415cad2033565cebf5b38360197928ebbf36d39da23efd4d,2024-11-15T14:00:09.720000 @@ -252861,7 +252861,7 @@ CVE-2024-25708,0,0,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc CVE-2024-25709,0,0,e4b0ec44272d6a266af0f61140023cf74e93b905fc1b38dc4d3a6cfeb46aa3ed,2025-01-31T14:35:45.990000 CVE-2024-2571,0,0,e582357e70f62facc4e9492592fa1228759dbdc12736beb495fabfbf81689210,2025-02-20T18:13:36.077000 CVE-2024-25710,0,0,4922d2b8c6c59484e2f96bdfd1fa1e7bfad107bb66f26dbc6d083080fea0c895,2025-02-13T18:17:15.147000 -CVE-2024-25711,0,0,4068e08dc723e7c588b00eeb41db7f2e01a3316c72de096e8359dddf94fa8982,2024-11-21T09:01:15.250000 +CVE-2024-25711,0,1,375f5c5dae8a65b33989b07ae3c27b043f203d4815f117dc318e2515d1359feb,2025-03-04T12:24:19.653000 CVE-2024-25712,0,0,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000 CVE-2024-25713,0,0,7cb9846da4920671c42e088b26485e0952d0f913d5cb2aa4287dd0a1359ca489,2024-11-21T09:01:15.537000 CVE-2024-25714,0,0,5f5ec83991c8636624f4337fd8c71900ea8e4cac894cd5c5104c7c5d2e9cd5cb,2024-11-21T09:01:15.770000 @@ -252963,16 +252963,16 @@ CVE-2024-25896,0,0,27e7ea1636a151061689223212aece2065c7f69b7c98d93f82bbadf54d10c CVE-2024-25897,0,0,234d7bc3ad5db294358ea8462de8ed3775160c86133962c3d1daeea643b0d5f6,2024-11-21T09:01:31.853000 CVE-2024-25898,0,0,86006dde909e57a7bb647fd23ecf23a25c1344653211bfc4f446ecc8f96a3aa0,2025-02-12T01:12:54.453000 CVE-2024-2590,0,0,60a3bdaafc99a02849a3826c8a92974160c52fb0a8b38349972ea2276121fa28,2024-11-21T09:10:04.693000 -CVE-2024-25902,0,0,9e85e06d0db0784b47e56235b85ad5adfefeab85e70dc1a736754c33262db567,2024-11-21T09:01:32.237000 +CVE-2024-25902,0,1,d65de434de069d697ca8ba5779713af8cf086613ebfb09aded99a83dc50b768e,2025-03-04T12:24:19.653000 CVE-2024-25903,0,0,c3f84f35a3282788fe160d3d473df15f0b09e88298aa51a0236e7775ac839964,2025-02-27T03:34:34.637000 CVE-2024-25904,0,0,25fb95b169a63bb75786e1711607587107350b8156e41da3f4a9c1bdd9726dbc,2024-11-21T09:01:32.490000 -CVE-2024-25905,0,0,dba8a615cc91c2c1ff66774f8d42215e329b9c8000a3117459241e683e60d0bd,2025-02-26T15:14:42.477000 +CVE-2024-25905,0,1,1febcba01e91dca499326e7dd3443523e1f883890900f60e88e42d4d044b1a57,2025-02-26T15:14:42.477000 CVE-2024-25906,0,0,93bffb1502ee48ad5d77c7933107ca201d3edf7f2af544bbcc488109cde4b857,2024-11-21T09:01:32.740000 CVE-2024-25907,0,0,511b2b2f5bd715980d7380bdd35ed1b0d884cd6649560ed9a472aa7210bb30e1,2024-11-21T09:01:32.860000 CVE-2024-25908,0,0,e6d921eb95eacb1e7bcfd9c82dd8c4fbfb5ba6db971664c950171fd1ed8d2a73,2024-11-21T09:01:32.997000 CVE-2024-25909,0,0,936024f782818de242251baa1ea32ab1f7f80398863ebca1202290b7092830fa,2024-11-21T09:01:33.130000 CVE-2024-2591,0,0,cbec197e7ea5440fefc207550ff80d0ba4deb5252fa0b48cbefb57714ecbaa87,2024-11-21T09:10:04.807000 -CVE-2024-25910,0,0,5ffe238ca3c404d263127cbc6e9dd15d02d77b883bf9ec40221bae65baf91d85,2024-11-21T09:01:33.253000 +CVE-2024-25910,0,1,be28239d9bbd5647dd25439c545a7035a84b77c61e668f99aff029dbf7ca4524,2025-03-04T12:24:19.653000 CVE-2024-25911,0,0,1664c33281a54823b3d051158d82e344e32ef39c834a05ce92d0d7e6e87f624e,2024-11-21T09:01:33.370000 CVE-2024-25912,0,0,d4b947c3d7fff0b2c5e2ccfa5ee844cb3a0338eede6b5691bb5b6459c0716d5f,2024-11-21T09:01:33.490000 CVE-2024-25913,0,0,ebec482b5808dc094acaeb196f3359f1fd287cc0e7e51def8562c38f937f7a5e,2024-11-21T09:01:33.617000 @@ -252990,7 +252990,7 @@ CVE-2024-25923,0,0,113df91aa477bc92f3335e80693c330592d18784bbd85f7855e76930bd10e CVE-2024-25924,0,0,993ad673b187b284ff850e2a446115899f5fcdc0fca26fa60bc104a6c1f99e74,2024-11-21T09:01:34.997000 CVE-2024-25925,0,0,5b65ff06c07a682d21a3bc12f978f0842bde923d3e23c46a8bec75e6c6c601f4,2024-11-21T09:01:35.123000 CVE-2024-25926,0,0,8d9ea57a814de81413189f910814888f6f8299699929c5609d522a505ee9a11d,2024-11-21T09:01:35.257000 -CVE-2024-25927,0,0,9a2ec260393b74221abe4b24b71cbd49448878ad023e8fd708bc315b53d693c4,2024-11-21T09:01:35.380000 +CVE-2024-25927,0,1,e0baf77a92fb43d7b330b5f60799652bc652a242f043278234b659682f02e1cc,2025-03-04T12:24:19.653000 CVE-2024-25928,0,0,4ea2214e9a3506917617edb767aedb0b23c86a2fdc749a97772db530f9ceec1b,2025-02-25T15:38:49.633000 CVE-2024-25929,0,0,a345c209e6ba592f3cf75f81619de24a58894a576bbf017e35677fd43e3029ae,2024-11-21T09:01:35.637000 CVE-2024-2593,0,0,f2c3aaff93814841c841cb17b61fd4128828a2f8efd9272fbb0bae22c31d38fa,2024-11-21T09:10:05.037000 @@ -253283,7 +253283,7 @@ CVE-2024-26205,0,0,1eedb693ca617b70f8f7dbc381fc54378f46034ec4355ab294c0cae2d9faf CVE-2024-26207,0,0,d69d2770a577e2557f8fe0929d81004182cce5f815dcbdf95760d8f42bc0592b,2025-01-08T16:16:18.420000 CVE-2024-26208,0,0,67dd5efc6d369d17c59569d101f31edad1df106118efd5376783c637686aae58,2024-12-06T15:39:42.890000 CVE-2024-26209,0,0,2bbce2643a43b63a11e42fcdb9a853be4678b53524c23cf955a0a5bff6798159,2024-12-06T15:37:15.937000 -CVE-2024-2621,0,0,9d5b6e0b1a1796c4b7a6e5397876b24a809a0d867d565eb05e5288d9425d3542,2025-02-27T03:34:34.637000 +CVE-2024-2621,0,1,e7bd9a67a77e252635145fb6d0e18bd133e16482518b31715859dda7c8e60dc6,2025-02-27T03:34:34.637000 CVE-2024-26210,0,0,11c6431e52401c541d08b6fba66683ebb31d75a18ad9628294d1891122253016,2024-12-06T14:42:44.433000 CVE-2024-26211,0,0,730329637306ac55f4eebb9dfdcdba0c120b48315656c0f30f1166d6eb67ba90,2025-01-08T16:16:41.933000 CVE-2024-26212,0,0,927ec7d1b9f37606904827f7f2315cbef88842bc995b3f3d04c32ad4f2a62780,2025-01-08T16:16:58.303000 @@ -253578,7 +253578,7 @@ CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5d CVE-2024-26667,0,0,e5ad506f4c73ca6a1fa85cffa41c22f32b9dc8afefacf0aae7843e76fbaf00b7,2024-11-21T09:02:48.243000 CVE-2024-26668,0,0,19e99ff104cefd1cd23ad3007ee1b6d98ed06b00b2ab1e0701085c50b1f5ac6e,2024-11-21T09:02:48.360000 CVE-2024-26669,0,0,90097569a49a5176e771f573d811a05aad14be50ef5376396ed78cab8665c6e3,2024-11-21T09:02:48.477000 -CVE-2024-2667,0,0,d282ffc5e01fe0e8e2fd621d0bc389071ac6381353033f69580a1376a7d3d05c,2025-02-06T18:05:25.020000 +CVE-2024-2667,0,1,27b21a53eda6df055088fa7ca753cc0e39ec841212da03554fec70e1efe6b4e4,2025-02-06T18:05:25.020000 CVE-2024-26670,0,0,f0434dc6654cbb832b662a959d3f3c14d1ada1ad2e2fe326da6066d12f65c9f4,2024-11-21T09:02:48.597000 CVE-2024-26671,0,0,84084285a16fed952d677d5fd710644ee60fc8d9cf10cb504c7604e28c9208a6,2024-11-21T09:02:48.720000 CVE-2024-26672,0,0,c70a64110bcd68bbde0a906463b82213fcccd910d662981df3a389ebb7bea170,2024-11-21T09:02:48.840000 @@ -253724,7 +253724,7 @@ CVE-2024-26799,0,0,94e40360a58865d9d67dfe9e60236d4a43830fc422ed0bb78cda58451cb64 CVE-2024-2680,0,0,6ea376fc52b91ddd8d9069e3110b704d29b0431f6bd7f9db05d8e399b22344a3,2025-02-19T18:16:52.490000 CVE-2024-26800,0,0,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000 CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000 -CVE-2024-26802,0,0,623a323539e824d0db51309395a06c843a666f3fd703a522dd053ba5e22f3f57,2024-11-21T09:03:06.387000 +CVE-2024-26802,0,1,28f1e846fe609a1d5994d291eda399afa598bb7545906b96e654133908a79cb9,2025-03-03T17:47:59.260000 CVE-2024-26803,0,0,da1a5e4a8e1ccdf52da3c008697a74e25b55e57ecff04da71adde2377c898cae,2024-11-21T09:03:06.517000 CVE-2024-26804,0,0,59bfb883bba3b84feb6cabc2a731628af8063660636b34871b628531b08d0367,2024-11-21T09:03:06.640000 CVE-2024-26805,0,0,6145167443e14e76f499ad74849672ed15ebdfd5fc7470da88f90504d2566084,2025-02-27T14:35:09.517000 @@ -253768,7 +253768,7 @@ CVE-2024-26839,0,0,86fe097dcbf1f910ddfbdc3d002b0e89833c44044f118c1ed9d8f2af58339 CVE-2024-2684,0,0,36e490d85d7234da321a46194796c8fa056fa3119c8d5201c9965332b5759c9d,2025-02-19T18:18:31.810000 CVE-2024-26840,0,0,184a6898c218b037239b30da9b8ff36296b7dddccc7007005850bd631f698139,2025-01-07T17:13:19.863000 CVE-2024-26841,0,0,595c74555dc4b25e8ea88566fd859ea64ec149ad165f7c91a511ba37a9b2ffc6,2024-11-21T09:03:11.233000 -CVE-2024-26842,0,0,8e2f4d4fd606d2eb4c644850a66f66c4662a5930f90b58178e0ef98b470ebdee,2024-11-21T09:03:11.357000 +CVE-2024-26842,0,1,ea179ac84a508b2b0c30ea768b9943458aa0351485d6fb471758790fce5a21cb,2025-03-03T17:47:59.260000 CVE-2024-26843,0,0,b9d654eaca8b971ba143f7f4fb87196ce8b745706b2c80bb9e34065be3c35694,2024-11-21T09:03:11.477000 CVE-2024-26844,0,0,611b38c770b94c1fce4dca5df6a1f22a7d2c575242825737622d78cc55cb4ae6,2024-11-21T09:03:11.670000 CVE-2024-26845,0,0,a146e1955ec3f1d00ef31b55978170d880fc368cff9fbb490f61d56ddc041ddd,2024-11-21T09:03:11.787000 @@ -253777,35 +253777,35 @@ CVE-2024-26847,0,0,5bf200b97f40200ea3f4c5fdb26ae6099a257b5d52b62ec285f4e0e9e2a25 CVE-2024-26848,0,0,ffc3816a37936f13d3499a1dca28cdbad7a2ad9759ea9c44a36194e432eb3857,2024-12-19T16:15:07.703000 CVE-2024-26849,0,0,ec63ec406fb7ebcbc467522e7345b2afe48ccd4f6c1f158a6f70ead7943f174d,2025-02-03T16:18:03.157000 CVE-2024-2685,0,0,af7b5fe0bc722f2565defc335a1325015e61e0af88c61bff0c5e5184e6d38397,2025-02-19T18:20:20.510000 -CVE-2024-26850,0,0,f4b8afc4ca9b5986200b08003800b7f32e5433e61eb396f8d39ad0ed7a44f65d,2024-11-21T09:03:12.580000 +CVE-2024-26850,0,1,d22cda1ccfc0ff405c728d4eec09ada4b416ecd1775c4b47bbd049415d115313,2025-03-03T17:47:59.260000 CVE-2024-26851,0,0,6e3bec1a4c10667fb8ac1e3787bac484f3ff56735f1084c7552b609d42ad91ae,2024-11-21T09:03:12.700000 CVE-2024-26852,0,0,86895d5a9082f520ea7cc4247cf45e9a0864c97e8f51f735ee80ceef101e0307,2024-11-21T09:03:12.853000 CVE-2024-26853,0,0,92cc7cb6502d647ed7793d48a497cabd5b87799860a174a884240562d715c3a3,2024-11-21T09:03:13.087000 CVE-2024-26854,0,0,0c9ab848ba46617ecbcffd4f1556a5554ce08fb9c94a290def4913695ceb8d33,2024-11-21T09:03:13.223000 CVE-2024-26855,0,0,56b630f771d4eb82fb88fdfce22b5e50ddb19d9e6dfda25139a755420be7f379,2025-01-07T22:06:59.357000 -CVE-2024-26856,0,0,37551207196da27b59e6796268e7db5c92d8592c6025cc9c62127727e57de8d7,2024-11-21T09:03:13.557000 +CVE-2024-26856,0,1,25ab22fb01245a19da0c2a1957a55b53202a7cff07e7e6e32ea41395b68e2b66,2025-03-03T17:47:59.260000 CVE-2024-26857,0,0,17f9879de007a3724949c9b26519f2d2821087aeaa81cfe5596c2e79c9baddf5,2024-11-21T09:03:13.687000 -CVE-2024-26858,0,0,3d3213339ba0099686cb94ce62ad6a93cea448d7888dc37f8f11d8214953872f,2024-11-21T09:03:13.893000 -CVE-2024-26859,0,0,1bf3deb774f1c5161044c43ce0146e23fab530fcdfa56cae5d76a73464bc9baf,2024-11-21T09:03:14.013000 +CVE-2024-26858,0,1,e8249bfa194cfc85f99632b1096b68279a955b95433f6519a173d59c1831ddf0,2025-03-03T17:47:59.260000 +CVE-2024-26859,0,1,4a69d16f769930f5890bb411f1bc2b05b01ff3fae9b981766d4d3c78d46e24a7,2025-03-03T17:47:59.260000 CVE-2024-2686,0,0,bac91b2a0b315b3ebc5bbf6c1bb2c336340a5c22ef8a3208159393817d781f58,2025-02-19T18:21:37.067000 CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000 -CVE-2024-26862,0,0,6c6c75fefcc717db23a5702c117b40dc8d27d9023e82a6b0ba67ffad67e229af,2024-11-21T09:03:14.403000 +CVE-2024-26862,0,1,0578807b6bad0064a6be60f1220e48a15020c83282aa009e133fe5e721f05346,2025-03-03T17:47:59.260000 CVE-2024-26863,0,0,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000 CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000 CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 CVE-2024-26866,0,0,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000 -CVE-2024-26867,0,0,4f97ef7063c981f6841ed7b4fabebbede6ebd3aea76ebd2a9d165318504cf304,2024-11-21T09:03:15.117000 +CVE-2024-26867,0,1,9d4bd0257699e43499c0fc297be15a0d350d696c8ed6a7268003174c8fdd2cc5,2025-03-03T17:47:59.260000 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 CVE-2024-2687,0,0,6f0c6f512aea2d159b998919ae3a9f3bca3478e9a3a7d98bdba876ef95bb49f0,2025-02-21T16:30:17.263000 CVE-2024-26870,0,0,2bd6a183ad1975d0b6c0de2939cb199738c8340cd55c7843614845b5df49e754,2024-11-21T09:03:15.490000 CVE-2024-26871,0,0,869aa89d9c16dccb1fc19ae6f3deafd10c976839580428434667c5b886257213,2025-01-14T14:46:37.293000 -CVE-2024-26872,0,0,3e6c24344343f074d8ff914559c7e1344329b90929acd6dc335bd1ef9fcbcb5d,2024-11-21T09:03:15.740000 +CVE-2024-26872,0,1,77bed85e85ee395126257f053397d7244ab713b5f8753d98ee279f14e2ecc305,2025-03-03T17:47:59.260000 CVE-2024-26873,0,0,65d9833100a12a05ec6dd2cea519a8e619a52464806ebff7909cd8d25bbed206,2025-01-10T18:28:25.100000 -CVE-2024-26874,0,0,a478f8432d8fbbd82ef175f5ad7e4cd8407981c65fa04a079495ee0b84139e21,2024-11-21T09:03:16.010000 +CVE-2024-26874,0,1,2efc3c3c9ba71a19df5d860cffa80ef8087f2b9a6224215297ee57046d96f19c,2025-03-03T17:47:59.260000 CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c863c,2024-11-21T09:03:16.137000 -CVE-2024-26876,0,0,578ed6a8c84e332450d5e1005a8564b380780daf06c4048c85ba5a42cfae7b65,2024-11-21T09:03:16.380000 +CVE-2024-26876,0,1,684d890d4a4cf739714db62ab1f60de7f0e5cfa687921b78c1f89573405bd485,2025-03-03T17:47:59.260000 CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000 CVE-2024-26879,0,0,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000 @@ -253813,7 +253813,7 @@ CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc9 CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000 CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000 CVE-2024-26882,0,0,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000 -CVE-2024-26883,0,0,d72e5c2a08cc96112a7158053aecf4ca442365affa186e749544aa6413017d60,2024-11-21T09:03:17.527000 +CVE-2024-26883,0,1,a3a1f6c97fd33c02dfb7f1c52089de1c9812f7f0091bdd8c6189d86dd0d0e3c8,2024-11-21T09:03:17.527000 CVE-2024-26884,0,0,90485ab2ad08ce5980bd35da2176ba31c8ca763f26d4fd993f1e3d22b12d7886,2024-11-21T09:03:17.677000 CVE-2024-26885,0,0,643e9d45f6fe64f6adea383a4fb760538978a2ffe2a06c1ba228c5eda0e1253b,2025-01-24T16:15:35.030000 CVE-2024-26886,0,0,dd647380a56ebf8acf36498a32884a21c01f77b53c500fad9b448c6df387a244,2025-01-24T16:15:35.193000 @@ -253846,7 +253846,7 @@ CVE-2024-2691,0,0,859a8da48cc2fd514d70eb54ec762c38cd07356d5ed21ad585d502c5cfd642 CVE-2024-26910,0,0,b54f157e17fb75a21612fecb8086eddea4b1912aff8ef1e94f11150cf9f09506,2024-11-21T09:03:21.630000 CVE-2024-26911,0,0,e979a8a74dcd1427a2023e0f6f06ab14470f5a77dc6da16e1b01fb62ca6d7e63,2024-11-21T09:03:21.793000 CVE-2024-26912,0,0,af2960e26c21d51b40d9a2f4d23d19ed971905cf5d8304da3c4d7035350ccdd0,2024-11-21T09:03:21.943000 -CVE-2024-26913,0,0,dd4cd00af5d2f82fbef45f4fc82a321d85c2c773efae02d1f53ca5302d8b379a,2024-11-21T09:03:22.087000 +CVE-2024-26913,0,1,3fe306b106496592a384e3debb29996fecc041384282b7051827a88c9e9d2e31,2024-11-21T09:03:22.087000 CVE-2024-26914,0,0,87cddcd687f0c5f3091be3532d54a2204a35b10253c4c61f7740c146626894bc,2024-11-21T09:03:22.227000 CVE-2024-26915,0,0,16f52bfb3e577eebc6d2599d6112556de57060d7756ddd977271e34d91c2bde7,2024-11-21T09:03:22.360000 CVE-2024-26916,0,0,7d08689445b962f57999bd6175bdf87b0d4c80905ad2c2d6ffd97738de7148ff,2024-11-21T09:03:22.550000 @@ -253865,10 +253865,10 @@ CVE-2024-26927,0,0,0fecf20cf7794b1af701d3a69af1d6c8a2e09c8b8b3ce436eaea422a6f78c CVE-2024-26928,0,0,12e429c2f9b4063e83fe9375ac72719500e95092853217831d1e8baf0db3cf10,2025-01-07T16:44:17.763000 CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000 CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000 -CVE-2024-26930,0,0,09db815ac2b49390346c0187e051f7a56a9f41aacd4cd6e8d98f1c9ac24f90d0,2024-11-21T09:03:24.700000 -CVE-2024-26931,0,0,22220a3732c0835b803548981e35201749af2e7c91bc21c2cb4968d69ca61e52,2024-11-21T09:03:24.837000 +CVE-2024-26930,0,1,79ab656967f71a29d299ea06b03baba5d964531b775710d27c9d61a1e63a8adb,2024-11-21T09:03:24.700000 +CVE-2024-26931,0,1,7a8b2bc0665bab012bd29f450af2f9b61fe7d42f4e437fdf0b46ba3dafdcd986,2025-03-03T17:47:59.260000 CVE-2024-26932,0,0,c1aceded26af8e1a981f03fcd7dcda2e798d6370154c489900cfe35a1406823e,2025-02-05T22:15:28.717000 -CVE-2024-26933,0,0,4d480ee2da293b2db1d391b4167efd091b48be0914a762bcff3028da76833dad,2024-11-21T09:03:25.203000 +CVE-2024-26933,0,1,9d6f6604533416861b03279128055a026b67a0d193566c7939f88d48cb7599e1,2024-11-21T09:03:25.203000 CVE-2024-26934,0,0,111813ca5533001333b02b7aff67718c94dbbcf3dee498229b6c065da945a88e,2024-11-21T09:03:25.347000 CVE-2024-26935,0,0,57b6f698c25c97ecde915494ca6f15e62c5e3a9e42413ec44564d14c288879c8,2024-11-21T09:03:25.507000 CVE-2024-26936,0,0,144cdd371322134fa6d98993e0f4fd26022aa1c68b494cde3f81066b3fc31841,2024-11-21T09:03:25.637000 @@ -253879,7 +253879,7 @@ CVE-2024-2694,0,0,4d728e1d04ebd874b9753d4251373dca1c8d4686a42dcbe990217886910977 CVE-2024-26940,0,0,d30d92f81d3759151961c208b8359740afa7da7c58e7ddc1f671b87559059ac7,2024-11-21T09:03:26.170000 CVE-2024-26941,0,0,e5ae6d1a3983ec93dbc1ebb0a1587dda9da5ac8274be6169e8d6e3064e41052a,2025-01-14T14:37:37.710000 CVE-2024-26942,0,0,39f881a4e4cb31695225028db7c03542160cc9b05d12914f25d1ff64ba466f9e,2024-11-21T09:03:26.500000 -CVE-2024-26943,0,0,4c6114238b1d66be270895fdb48b0bb0fcf58f54461c4379c2f62274127c9e9a,2024-11-21T09:03:26.737000 +CVE-2024-26943,0,1,d96a7bd880244cfe81b811322efdbea93667af16a04039f786fe114c995c764e,2025-03-03T17:47:59.260000 CVE-2024-26944,0,0,5173c263c20ff41500d77cd506c0a135055112f78a2020af9be2ee11c60b3759,2025-01-14T14:29:21.517000 CVE-2024-26945,0,0,ae6f96764324a673726732b05b955bd355f5976653ec8b043463e0baff11019d,2024-11-21T09:03:26.990000 CVE-2024-26946,0,0,42cd5cabd74c9173279dd3289adfb70a8262c89e7ffe80862a160dea1859eae9,2024-11-21T09:03:27.650000 @@ -253891,7 +253891,7 @@ CVE-2024-26950,0,0,d31e1d93bcadf1ac54fc3030fc0fd5978d202286aef9343bb6120ae2dfce3 CVE-2024-26951,0,0,a15c37b6d5bd54a202e9938ffb1789819a2cb3e9336b9ad3d9b6d8aa6ed8946a,2024-11-21T09:03:28.350000 CVE-2024-26952,0,0,7c0652b844a091a629cc08288938ed733cd9531d49f62a44fafb0cab152b6ea5,2024-12-02T08:15:04.977000 CVE-2024-26953,0,0,179c4f51f5d32640d42d1d8a2094db4cb129bb21640949e2a59d8ad9aa7d6249,2024-11-21T09:03:28.677000 -CVE-2024-26954,0,0,01e847be2aab9550dce113c9d68fe030ff94cee989ae850971f0746197b90565,2024-12-02T08:15:05.363000 +CVE-2024-26954,0,1,933f24da1070c35ec0c87f5abcd66f124aac06330b36c373a31233d7fb78d607,2025-03-03T17:47:59.260000 CVE-2024-26955,0,0,76bca89ce82e5ae6c5b930181ea09e09a5aecc8071be56ab85e1544b92d9d183,2024-11-21T09:03:28.917000 CVE-2024-26956,0,0,adbc295fe7031fb20e7ac181bad0bd27d6ef9768db74f4b24283887b46cb7420,2024-11-21T09:03:29.057000 CVE-2024-26957,0,0,2409839e0521f559e3d3cc6cf7633c5d9f9bf4c27be04b06051b3d2a69741c7f,2024-11-21T09:03:29.263000 @@ -253910,9 +253910,9 @@ CVE-2024-26968,0,0,a130cf597cb4edb15223eac1e16071b400d01cf32b8a920a46f83dbcdb106 CVE-2024-26969,0,0,50687f1643da292b237a2f57aa470a1dc3a4b62f7f074a278c79c2fd62373103,2024-12-23T13:58:07.573000 CVE-2024-2697,0,0,75185752f94c46a8517aa2b7e60fa3a9d28d1b1692134edfaaeea70946ab0b18,2024-11-21T09:10:19.120000 CVE-2024-26970,0,0,a672db4cc38f97538246e763011f8e043ad7cb6ea68c17c5902e1a5c00ecb7ca,2024-11-21T09:03:31.017000 -CVE-2024-26971,0,0,140fd3363199a95c965e15a932d8af85d5fa87c5de473083248d4d0d2e5571cc,2024-11-21T09:03:31.260000 +CVE-2024-26971,0,1,986fbf53de7ffe6063d8e8405abf14062ffe149a07b59d132f7d06e14cda624c,2025-03-03T17:47:59.260000 CVE-2024-26972,0,0,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000 -CVE-2024-26973,0,0,d19ad6622873c24625473951e55d0f288da61c848aa4bc59ebfc13a2e4d1de96,2024-11-21T09:03:31.523000 +CVE-2024-26973,0,1,9bc60473a5c9f7eb6a095297acad667c87d6b8f2d05dfd90e719df9d2e751c7d,2025-03-03T17:47:59.260000 CVE-2024-26974,0,0,0e4a56366252557edbb2b1398208500709b44987bfad59520bf0a9bd4532569e,2024-12-23T14:00:33.587000 CVE-2024-26975,0,0,4961103f5afe82ab19bd2d5c28d95ec6a0e6e841685afff291147442422c4ce9,2024-12-23T14:02:46.103000 CVE-2024-26976,0,0,4660a52215caac481687e5a7d29aecca4ed04fa21a373cba57d090e5d9c5d1a0,2024-11-21T09:03:31.953000 @@ -253939,7 +253939,7 @@ CVE-2024-26995,0,0,0b338507604cbb1e8de1a588aacac642604340925bf7ef4099cd8e3bdade3 CVE-2024-26996,0,0,94196a92dedcd59ff65c8d8bf38cc6eafbc4d2c42dc054f5538bfb34db4eebf2,2024-12-23T19:49:49.543000 CVE-2024-26997,0,0,56325b5ec86fb7da94104b4d1eed21b17473267625bfb004c22f3f5d9b456480,2024-11-21T09:03:35.063000 CVE-2024-26998,0,0,744733f8c7e40554e20d2146afebd3eb629aa7e3bb4b5274484b3c3b2c66f4a2,2024-12-23T19:50:05.873000 -CVE-2024-26999,0,0,ef4e9b3783a33ea95f418cc77a0b22ca06d7c292f9ace32bdb14d075b2cb39f8,2024-11-21T09:03:35.323000 +CVE-2024-26999,0,1,d0c57aab9979c5bef88dc0930d037a397d88933d53e7e8ce7234bf464c074f1c,2025-03-03T17:47:59.260000 CVE-2024-2700,0,0,2d26752bea08305a869ee1f5f945d4063d004cec5729f287c9f6fe9b7fbeebbb,2024-12-12T22:15:07.877000 CVE-2024-27000,0,0,ec8e70532984c41a55949dd8b1543183d45686bd12b5d8f12c15457a149aa761,2024-11-21T09:03:35.457000 CVE-2024-27001,0,0,68a5501bb9c3e0b332c21c192c280c2859679c23e4fc027f83619dd9c15129d9,2024-11-21T09:03:35.587000 @@ -253949,7 +253949,7 @@ CVE-2024-27004,0,0,f83d4726c9eaf02e20d27777484adeba44d10c3f8142914019d0b828afc6f CVE-2024-27005,0,0,90b0627f5d8f37de60d811f44c5fb13c405a58e5343912faef8949e8f1b9ab45,2024-11-21T09:03:36.110000 CVE-2024-27006,0,0,f99857766778f03ac72a3c7e775775eadee02d9df0193c5fca85f4242b8c61d6,2024-11-21T09:03:36.310000 CVE-2024-27007,0,0,f2a05b178ac4106d9070d246425a81626e2e0a7f121bcd24031c8978d22c585c,2024-11-21T09:03:36.437000 -CVE-2024-27008,0,0,e4eff2aa7252415b61c5ff39327e8bb01e586b5be78027302bbfca9393ca933a,2024-11-21T09:03:36.560000 +CVE-2024-27008,0,1,36afd2e5a7b5f81e6dfb5bf019b17d9862e2e2ac9043144f373049998ffcb838,2024-11-21T09:03:36.560000 CVE-2024-27009,0,0,56a08cc283b225cf86d33c977cde7fe16d287c90a7e78b50fdcc1bf72160b491,2024-11-21T09:03:36.687000 CVE-2024-27010,0,0,97960f90d5f8b3bf5d51908449345af17f673343664d872a4fe0c28390341888,2024-12-23T14:05:34.153000 CVE-2024-27011,0,0,f6c5ae5bd00c199fb1f8ce883fee32167577ef6bda898e38e50c46aa10dc2a5f,2024-12-23T14:06:38.180000 @@ -254192,15 +254192,15 @@ CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49 CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000 CVE-2024-27237,0,0,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000 CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000 -CVE-2024-27239,0,0,4043e7ef3c2858dfc9dcccdfcb09c646fa6a75112371e68895c330ed898a622f,2025-02-25T21:15:14.863000 +CVE-2024-27239,0,1,c04ef447bb9616e546467cbb23cc631d9e633bab2554247b98e115c9dbcb7480,2025-02-25T21:15:14.863000 CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000 CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000 CVE-2024-27241,0,0,45347d103123fed3175f7256b0f9dde0924e53aaa046e74b7023bf2cc213a5f2,2024-11-21T09:04:11.063000 CVE-2024-27242,0,0,f33ce25a9956d99846a9acd82a9ea4985a01ebbb0e6b663b1a579ca28308e103,2024-11-21T09:04:11.193000 CVE-2024-27243,0,0,3085f4a9d57b9cf39036149bc3895f9299fe33d129d1642a616a12b88b1bf4e1,2024-11-21T09:04:11.317000 CVE-2024-27244,0,0,3ea43f42d5905c8f2e1abb3facdcea93d942c7980488e9ccc833afa0c3630664,2024-11-21T09:04:11.443000 -CVE-2024-27245,0,0,8b32cf0a6aed9def0789703e4cc30914abfe515871b77e664f3679ff1dbf9557,2025-02-25T21:15:15.013000 -CVE-2024-27246,0,0,97c0377ba61e13eb68ecebf92f009182d0ee777243b2bd21664ca73b32162d0c,2025-02-25T21:15:15.163000 +CVE-2024-27245,0,1,9d5873c4d642c2dcc15438b089eafc739285674867d7b44f52880cc7c2ebcf45,2025-02-25T21:15:15.013000 +CVE-2024-27246,0,1,a365917c110967162fdda4bd9b4f4a8f6c466a3860b7abc8dd5b86144da8e99a,2025-02-25T21:15:15.163000 CVE-2024-27247,0,0,80b2c738afb7fd372a582a5de229fc1b8561eb2e037fe8418073b03a3ca01917,2024-11-21T09:04:11.573000 CVE-2024-2725,0,0,b1b1eca530920ff690dfb0fd89719f48c747479f1615873b2e02b96009cc4c1e,2024-11-21T09:10:22.883000 CVE-2024-27254,0,0,85cba9b8055ff115446973e30807b0261d64d6409e7536e0bfb4af3100c99a5e,2025-01-31T15:02:40.980000 @@ -254210,7 +254210,7 @@ CVE-2024-27257,0,0,691c5dc8e8ee6dc8cf4d467dc5d3cecba3bf33df4b5a8f7cf103f192a777d CVE-2024-2726,0,0,7bf287b1ed61a27957754b43bb3eb83ce224f5526d7a8605b12bacbec8912e82,2024-11-21T09:10:23 CVE-2024-27260,0,0,d8abf1871a989c63042ef17773af437c6f9012fbd4c3caf016f954fa2e26ad04,2024-11-21T09:04:12.017000 CVE-2024-27261,0,0,8a152afe0508e226578f25c9f52deacd0f59dd2457ec4bc2f42635e62029058d,2024-11-21T09:04:12.160000 -CVE-2024-27263,0,0,2e245e2b7944e11dd55474df19696b6d5309bdfff36e7593de65aedca7ec2142,2025-01-28T01:15:08.950000 +CVE-2024-27263,0,1,967750a95dc7239216793db768776baac4236105c297ed33ad9a1ca2c4901be4,2025-03-04T21:58:37.043000 CVE-2024-27264,0,0,f19cd12d9cfd08306f329c4a07156366819b05a23c905069a90f1109f1306031,2024-11-21T09:04:12.307000 CVE-2024-27265,0,0,503786b57301ba8f6178e18f9e45624064bd29cf748a0b95c345d7c29dce0e4f,2024-11-21T09:04:12.433000 CVE-2024-27266,0,0,8354de79cabd73f9a0b21f06f2a9cfd665437e90c03c063357f6339e60cc24a3,2024-11-21T09:04:12.583000 @@ -254239,7 +254239,7 @@ CVE-2024-2729,0,0,4ed49e02bba13e6f77ba0824396144306dcb694a171acd381c3d24d60c4835 CVE-2024-27290,0,0,e6351e36fccf78750391be14824a1927d7d886c71914a08afcab3c0676cfe3b7,2024-11-21T09:04:15.570000 CVE-2024-27291,0,0,a17901c720fa960198c0b15c85cdc3abb819356f307d51b08722f19c95d7a841,2024-11-21T09:04:15.700000 CVE-2024-27292,0,0,0985bf46a0f580555a70e94b95028857bb5056e62cd8bc4114703d5e8c1fcfe6,2024-11-21T09:04:15.823000 -CVE-2024-27294,0,0,6c9745089b37fea4e34227a2ae0490e79fb9663b63f04389d03e927a9b199715,2024-11-21T09:04:15.950000 +CVE-2024-27294,0,1,04373dae7bd3b9b15d5193a6ef338382229fe2b7f59686ebfff93d0f36b35f65,2025-03-04T12:25:10.853000 CVE-2024-27295,0,0,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8081,2025-01-03T15:57:16.817000 CVE-2024-27296,0,0,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000 CVE-2024-27297,0,0,ef20090b8ac4cce5327a6d67445e8580ded214e3d6bcc9508b8911eb5c48b2a6,2025-02-26T15:14:55.753000 @@ -254267,7 +254267,7 @@ CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079 CVE-2024-27317,0,0,76b2a59ff51f548a5b920f9a9e5de4c3dbbbe200760563bdad4794a3fa9cb613,2025-01-19T03:23:26.087000 CVE-2024-27318,0,0,190ec0397da7141764fc9a11cb1390b995fd6355abec6b64d5b450b556038080,2025-02-13T18:17:29.120000 CVE-2024-27319,0,0,422e08ddd18d1b64051dca2b5411320dcb1755e89fbb6d24ae9879ac3340f718,2025-02-13T18:17:29.507000 -CVE-2024-2732,0,0,c53ca86f62810bb8d7151754be48472811994b863d082d4f89a0e05dc2c7c2e4,2024-11-21T09:10:23.810000 +CVE-2024-2732,0,1,0d15710fea555fde380ef59adb2b8f17147ab6ae8ff69408290d2e6003259035,2025-03-05T20:50:02.120000 CVE-2024-27320,0,0,9bd432bffd8b92613cb510da17aad942a21d8d3e1a29df2e50a7d5d1126a5837,2024-09-23T13:56:48.353000 CVE-2024-27321,0,0,21cb175abd156e3dc500ea41f70806ccea3c2efdc89a895115ff1bfb44978981,2024-09-20T17:06:58.440000 CVE-2024-27322,0,0,90a30a8f73bbcd6fae7496011220bf4154fc63d06125e5732becd553fa9ebc94,2025-02-13T18:17:30 @@ -254298,7 +254298,7 @@ CVE-2024-27344,0,0,2b2469f12515824f584f118a281d1a413dd821722b40f8da0255a4bbb6dfe CVE-2024-27345,0,0,5302856250baab7bca128752a37153ad7a81fb0b5758186316dafc67abd8d57e,2025-02-27T20:15:38.220000 CVE-2024-27346,0,0,4ef1236f8b7db87812c0165f7f7fb6230e69020f019ead98bf2a8322c5b12458,2024-11-21T09:04:23.063000 CVE-2024-27347,0,0,dbda497b12017e7409f9dc9e20d1261b56f61b10be208d0427d8ee6a8ba51174,2025-02-13T18:17:30.360000 -CVE-2024-27348,0,0,964ae7a436226f80d1e8db51c8d85454bf7c086863b76e184e67ff96363ade4a,2025-02-13T18:17:30.597000 +CVE-2024-27348,0,1,073ea72a1a733ee44abd094ca2648af76a9adb44fbcf2ad0fe4e912d07fb3363,2025-03-06T19:48:51.880000 CVE-2024-27349,0,0,182a6ef32e9c7d451197e3afb7e727cfc2c680a5848b8ff28e90f7790debc56e,2025-02-13T18:17:30.980000 CVE-2024-2735,0,0,58eb8e801b828e96d4d3a0b893575290d14b8ccf76fef7a100e552908de15596,2025-01-08T17:52:42.690000 CVE-2024-27350,0,0,5d2af758328dbaf2f007a2d7df7e7c029e0e88326cef12f01f6df91c842f3c2e,2024-11-21T09:04:23.840000 @@ -254330,7 +254330,7 @@ CVE-2024-27376,0,0,4933dc44dfb96c4e538596b4e2e9cd536be7813adb068cff5b23389f1bcc3 CVE-2024-27377,0,0,3d2ce6efe62522bb5f433d63f14f5fb65cb6bc72f8fba22cfb2b1a9c8904063c,2024-11-21T09:04:28.990000 CVE-2024-27378,0,0,652b7588281be428bdaceaed69357a614dccdcd7a2ced5944baecf12c0bb0848,2024-11-21T09:04:29.150000 CVE-2024-27379,0,0,3cd7a3bc568502beed867940be9efaab8a2476bbffd4d9c34135b745bfc52a2b,2024-11-21T09:04:29.327000 -CVE-2024-2738,0,0,a74dc6146ce8c3ef8021138cc10f36965e04d78eabaad98b29b4f7ea628086b4,2025-02-13T17:01:33.040000 +CVE-2024-2738,0,1,93b58d0b4b0867809b18d6b9219831b6a83c9f9bc044abfa6d93410bae4df006,2025-02-13T17:01:33.040000 CVE-2024-27380,0,0,fd67f29d4e726d7274d19c0bcf4177f4144236ebf19de60c64cc3610d19682c7,2024-11-21T09:04:29.500000 CVE-2024-27381,0,0,3ba55b8d2d556d8527b1f2c215c04f0a6f84c336b1409f0e8d0ec597f7c1a95e,2024-11-21T09:04:29.667000 CVE-2024-27382,0,0,707f41c0c38fdff19534efd7998b66186ca0c9cb742581a2c484f59be8fbb318,2024-11-21T09:04:29.837000 @@ -254350,7 +254350,7 @@ CVE-2024-27395,0,0,574d9fe9b6861b86a67985da6f3829a04cbab7adac1a4f8c46394c30d29e0 CVE-2024-27396,0,0,619052d7edfa2606a0df6550296e33629a00872a87588e2fdde8447ec8bbd43c,2025-01-14T14:26:09.117000 CVE-2024-27397,0,0,aa595a4f1af133353403fbda30ee2eba1c22c43a6d923ec09fbe34a915bc914a,2024-11-21T09:04:31.830000 CVE-2024-27398,0,0,5d668964db5f8581f993f825ac2b92d8b5b4a6d169822c73d205cf76d493b5f2,2024-11-30T08:15:05.417000 -CVE-2024-27399,0,0,2441bead541c7f566e35edcc3bc5bc55c9b6f47a2e4593c9316c027e34d9505e,2024-11-21T09:04:32.110000 +CVE-2024-27399,0,1,5f92637171e2373c10fff9cea5c1d82a32e443e313a4fd84e9b066334101d2e6,2024-11-21T09:04:32.110000 CVE-2024-2740,0,0,f03cdb84978c157244d947fa3562f2ce11bbbddd1a001c2eea72ec562c054db3,2024-11-21T09:10:24.690000 CVE-2024-27400,0,0,8b03899195e0fb73532435fff4f87147f528491b1ff215d68b0b90f74eb9c008,2024-11-21T09:04:32.260000 CVE-2024-27401,0,0,85871a9d45a55e18d4ca18c5ebed4d206be6cc002d9e11ff2be4b7959c24b40a,2024-11-21T09:04:32.393000 @@ -254457,7 +254457,7 @@ CVE-2024-27567,0,0,1cabb61feb31ce9256b51a36fe51ecd8a3fe0d13c184bf0c394563554cdc6 CVE-2024-27568,0,0,f60461d2234dac0a41c0e3ac1d3945e36e4cc38ca6bc0749c4b7d5949db225b3,2024-11-21T09:04:45.523000 CVE-2024-27569,0,0,4cedce0d2d8555105b481b4a2b248a6ef9a0fbb7e692408cafbcc2b19a493a18,2024-11-21T09:04:45.727000 CVE-2024-2757,0,0,b6a58696e8d78b44d11f214bd59212dee93b29323cf80730dfa63c3675a6e16c,2025-02-13T18:17:57.187000 -CVE-2024-27570,0,0,e981c34fab44bcc162afccbb42d5a9a171bca8979c91891025a9038e1cd5b22b,2024-11-21T09:04:45.927000 +CVE-2024-27570,0,1,ad9843f604fda476d26a2ee54aa7f6c310e91195239d84a81bfc2bb3fd6bc19e,2025-03-04T12:25:10.853000 CVE-2024-27571,0,0,c503204113538f77292ea19433990d5a2f981efcf24550bcb77c7fda84580dd2,2024-11-21T09:04:46.057000 CVE-2024-27572,0,0,edeadca2e30c63ec3bf09920d1967999a9dbf7af68af6e2986a8e0b3d8d65232,2024-11-21T09:04:46.270000 CVE-2024-27574,0,0,1ed2792d66dba95eaf1291cd1f79efcac416f4905846dac9ed130d5eee0c5e62,2024-11-21T09:04:46.483000 @@ -254519,7 +254519,7 @@ CVE-2024-27705,0,0,3233e9b763f57c6dfaf8627c6d6ec7d3ff266929e0ec29e347f4290ec6ac9 CVE-2024-27706,0,0,09be5dff0dff62897d4b671897beea1323154b3e00d34465281c351db1a9a829,2024-11-21T09:04:54.783000 CVE-2024-27707,0,0,4a3147229ae75fdd871763049e313de06f4e4ab116ff888bbcd9fcfca501d9b3,2024-11-21T09:04:55.010000 CVE-2024-27709,0,0,0dc8a00434a9bdc593d8c809bc45f53ca009c10107690ba39b988794ca398a66,2024-11-21T09:04:55.230000 -CVE-2024-2771,0,0,aad3fa90a08950deafce786c821cb832ce7543d9c8b3a9d708d7c98814f8cda5,2025-02-06T18:33:57.330000 +CVE-2024-2771,0,1,955043eeeee69f1fa6ae12fcf3ac03db40de8de5eca7ba7161afcd20f2acba7e,2025-02-06T18:33:57.330000 CVE-2024-27710,0,0,c8353ddb223f00eb8be323f22ae1c338a10420e1d09067b6d197578182aaeae6,2024-11-21T09:04:55.450000 CVE-2024-27711,0,0,e77b75fdc2ee9d9427d667dd496df30c03c8c25b9aab7888b9e4b92b504ef697,2024-11-21T09:04:55.667000 CVE-2024-27712,0,0,2902d6c089684557ece1a3bc166a4d74aee13eefc7e652a85152dc904b72ec22,2024-11-21T09:04:55.897000 @@ -254561,7 +254561,7 @@ CVE-2024-27772,0,0,382c305cd846d5a30ad35bd61d3aa56f63db66c1de69259926b60ff8a7a8c CVE-2024-27773,0,0,9937f907ae86df124158e0d3d02b2f6a356bd36428cea000a9bdb98a6113f917,2024-11-21T09:05:02 CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9ebe,2024-11-21T09:05:02.147000 CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000 -CVE-2024-27776,0,0,ef49ef17c1210e0ed2c1ff489a27f0662db66dc8a6e90113cd624459aa34be3a,2024-11-21T09:05:02.433000 +CVE-2024-27776,0,1,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000 CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000 CVE-2024-2778,0,0,3f1276203f90b009e4c7f6d1e7f79cb2399150023bd01e1e305fa9cf1af8da84,2025-02-20T18:28:46.003000 CVE-2024-27780,0,0,f04cd8a4518fae52b47e1499947545d117e7ab549094d2b1c1a46aabc5c3aa05,2025-02-11T17:15:21.850000 @@ -254592,7 +254592,7 @@ CVE-2024-27806,0,0,04ae2f924f27899fabc437b68048a977a78d58a5dfac718be7ed36670048d CVE-2024-27807,0,0,b016f86f84ff3be5552fb4afdb86e3ff10dc5c6f121c45f7bd657b8d06f30e77,2024-11-21T09:05:06.567000 CVE-2024-27808,0,0,dfd2c1144d0a5d419427b718c6ce49475ee3dbc0e0385d1e51f26b909b153ec5,2024-11-21T09:05:06.720000 CVE-2024-27809,0,0,37e58d803d63de85ca90a78876427abd2ec5daef1ccaf9e8d7067d55f7a69003,2024-11-21T09:05:06.963000 -CVE-2024-2781,0,0,5db24c11b7ff425ba8bd3bc724b16605f1e9f4ee6d83ed18dad9d4756913a2f4,2024-11-21T09:10:30.277000 +CVE-2024-2781,0,1,ac16f4d0373479b59e5dd09474c368e9b4ed0d3bd2e16f5e62ce9564ec93bd0b,2024-11-21T09:10:30.277000 CVE-2024-27810,0,0,0628d7b2890240a6eb441f13cd3ca854f8e8cff37b4689a851937f7340f4db89,2024-12-12T14:33:00.640000 CVE-2024-27811,0,0,c04d71d0d3f7fe84fc297afd712b4cec9b87b90e7c1dcdf468cbc3048db22a41,2024-11-21T09:05:07.357000 CVE-2024-27812,0,0,990107596f1e534025072a9bc1ed03a11b1fa3c1694782e485345ceb7b5df925,2024-11-21T09:05:07.637000 @@ -254603,7 +254603,7 @@ CVE-2024-27816,0,0,d126026a0e8c09579a5f31347cc45bf3577225eb227c98451e45b114e71fb CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000 CVE-2024-27818,0,0,bf2ff5e56a5dcc0026326b877c5d2f40490029874fbc80b54df6651b77bfe1fe,2024-12-12T14:33:00.640000 CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000 -CVE-2024-2782,0,0,4931fdc4df8ed3acfb0c8dd9f989cff8c77993e44758615114a33bc703f78142,2025-02-06T18:37:34.907000 +CVE-2024-2782,0,1,f30ece096484acd311740c505403a9707b51c9f15fcdefcf44fda54064e0e15a,2025-02-06T18:37:34.907000 CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000 CVE-2024-27821,0,0,662c0fdb4a6b9881c4e3b0e9bdefd91c75dc8c6155b30ede36ff0f65a0b09925,2024-12-12T14:33:00.640000 CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000 @@ -254770,7 +254770,7 @@ CVE-2024-27983,0,0,b2589cbbb580d16047bd9ecbfda79c782676d32c5fdcf965b61589244d8bb CVE-2024-27984,0,0,aae42ff7c5e2f91ad6145729ed698347fd731a0e279fcf89bf92ea79157be3c0,2024-11-21T09:05:33.767000 CVE-2024-27985,0,0,f676f56e2e471158652755ca904ec0d0cde36c5d02615232aa2347c1a3f78b3e,2025-01-28T21:17:20.540000 CVE-2024-27986,0,0,6e6ed6493f00348a10c965f4cc638de5d51e1e8a66be90ac10c9b5e04d22c698,2025-01-23T19:18:34.027000 -CVE-2024-27987,0,0,8c70eb7dcd1653dcc6c21a7f71fc3a97e4d3e3f16f145de5d9fc075f78b5f7a2,2024-11-21T09:05:34.230000 +CVE-2024-27987,0,1,fa3abefc0ee231b819485d291f86d42c2f7bc0860a16a9c485ddab05fe474c49,2025-02-25T14:21:17.147000 CVE-2024-27988,0,0,c686d670cc748ce822fc38945ce5b40635e2e005a14b8e9934b0adbae696c579,2024-11-21T09:05:34.380000 CVE-2024-27989,0,0,7f894ef41691189e0c1df3102dcb631ad9f4b4b2ff7a95ff2ab4bf4eafb7ea15,2024-11-21T09:05:34.520000 CVE-2024-2799,0,0,01a914f1bbbd17207124839b023845bb2f1eeccae4d17b6eb6ce7c0bc20ba9fb,2025-01-10T21:35:28.493000 @@ -254785,7 +254785,7 @@ CVE-2024-27997,0,0,22f4fb6f3b39d82e394fe18f65ca042130372e9bada301d1cd93068c16ca8 CVE-2024-27998,0,0,54f18276f1d5483160e1a1e41d61ad89be34f3ae2accfcf25da20100c04c5253,2024-11-21T09:05:35.870000 CVE-2024-27999,0,0,0c8d1a9cb639cc67d838747570319a17fd78c021aab367af1a23901f90e86008,2024-11-21T09:05:36.007000 CVE-2024-2800,0,0,f15542999864a2d01aff04d2848e0075e23dc9c31d2a81a0079b6b271c53d729,2024-09-18T12:42:50.093000 -CVE-2024-28000,0,0,b8bf3c28e31af787d661eff07324dafbb0f033f16c73a80ef6c694d709cc8e6d,2024-08-21T16:06:23.153000 +CVE-2024-28000,0,1,25b75568cadd9da2fb1e9d156dcc50385ae5e2f9899e91133334af97131f85e5,2025-03-07T11:54:06.967000 CVE-2024-28001,0,0,f4eb06df3530e1997d166a642d7fa8af6bff2e5a17b3a688669d50585c305328,2024-11-21T09:05:36.283000 CVE-2024-28002,0,0,904502bf78aba90ddf91ba1222073bccd0c322349e6a1c2472d455abd67e739f,2024-11-21T09:05:36.413000 CVE-2024-28003,0,0,9de581c0a89ffca55ba717b6e86d85f87dca3f2529eff590e3efb77ede4629e6,2024-11-21T09:05:36.567000 @@ -254902,7 +254902,7 @@ CVE-2024-28123,0,0,5099212f57d318f83757e71a466b9bdf4be2bbcb864e78e89326cbc09e003 CVE-2024-28125,0,0,a964f3be7fbf693cabfab1cab21a25243643637360f3b4dfc76dfcb0e2a98c0a,2024-11-21T09:05:52.107000 CVE-2024-28126,0,0,bdca6710977b6c4816da9b6611740c12aabc24c1dc8b3f05e1f936957ab23ed5,2024-11-21T09:05:52.337000 CVE-2024-28127,0,0,77e8cab03528d8443539f421af735f4841e64e2500d965d208c91c76c1e365e8,2025-02-12T22:15:32.137000 -CVE-2024-28128,0,0,08b4c738950a2b25e94d5164713beebfec35bfc9e419db39d0c60980e2657436,2024-11-21T09:05:52.533000 +CVE-2024-28128,0,1,c3924a01b67c69eba934c13a12256579772211374f388060eda093c69164cb5c,2024-11-21T09:05:52.533000 CVE-2024-2813,0,0,f6cf44b143c45f427a4e19d3a3c84fafa892be9cdc350a85d194bce1d00ab565,2024-11-21T09:10:35.157000 CVE-2024-28130,0,0,69640234ddd8399b998b711ea548de6aa4b7b8289789fb11379a6d5513f1b0f0,2024-11-21T09:05:52.640000 CVE-2024-28131,0,0,ac6341de81d38b323cb8d4155aaff35dcc48c0fd487702b27be5fe24c82bdc12,2024-11-21T09:05:52.790000 @@ -255055,7 +255055,7 @@ CVE-2024-28325,0,0,d1249e48fae34e16a671fbfa77e65f35cecb442da7d1f3e92632a41ef5549 CVE-2024-28326,0,0,50700555c90e4995a2db0290d92539dbadb4550abe62f00e140f1b1674d98ffd,2024-12-16T23:15:06.253000 CVE-2024-28327,0,0,1360bb692019a7ed2321e173175aa263e8cbe1c8a295b26b0cc70a6baaa74d06,2024-11-21T09:06:11.867000 CVE-2024-28328,0,0,3d9a6b8d42a538362e64f311f5c93eb07142a313db6510d418a4b48150139e7c,2024-11-21T09:06:12.097000 -CVE-2024-2833,0,0,aad754f09dbb19bc4b637199ce8301b0c71c443d8dfaf1063e5e20073cfca0c3,2025-02-13T18:53:23.640000 +CVE-2024-2833,0,1,0acd0b44de8df413179bb8331e9a117c4fbc7c9d1552f11de69bcf37e976ee36,2025-02-13T18:53:23.640000 CVE-2024-28335,0,0,60d3d10b79578b4cd9269c182f8b37ca951c370202f357335490f83d72157c3d,2024-11-21T09:06:12.310000 CVE-2024-28338,0,0,5c66cb73174a9deb522e0710bd16de161594f5caed8544d91f8b5fbf8bb68edf,2024-11-21T09:06:12.560000 CVE-2024-28339,0,0,c9f61e2c36b8ab7431a0bb4b150faa587c65bcb546a5c5f13ef23c8626c1f66e,2024-11-21T09:06:12.807000 @@ -255084,9 +255084,9 @@ CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67 CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df33448955ca,2024-11-21T09:06:16.637000 CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 -CVE-2024-28401,0,0,d9daf61f0a31c0cf448f7050c0bd2970c108b2edde4f6d4793b1c6caf94bf22f,2024-11-21T09:06:17.097000 +CVE-2024-28401,0,1,2802927e5ad9b082a6c099f44230ec67d2e7b0dc68f3c4abdb5e00577ed5f858,2024-11-21T09:06:17.097000 CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000 -CVE-2024-28403,0,0,6559de2845f0f7d97fb2cb783a016ae8989ddc4cd1995208e802b2b5204ee653,2024-11-21T09:06:17.480000 +CVE-2024-28403,0,1,860309db1aa80a38c13205a0c2daedf50384bd0d9a847292c61f38375d2f0dd5,2024-11-21T09:06:17.480000 CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000 CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000 CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000 @@ -255105,7 +255105,7 @@ CVE-2024-28432,0,0,da1f82e1e8772a9b8ac00f8c5126d8e5127ee09510def4e88254ccf20640b CVE-2024-28434,0,0,b4ec98e1977770c102909c7a0d588aabc57ecbb170e993639452a9a8542bb11e,2024-11-21T09:06:21.480000 CVE-2024-28435,0,0,c1eb3631efd3094abec5049eb4a799f488ec927a573dc60d97c11961b18410a7,2024-11-21T09:06:21.787000 CVE-2024-28436,0,0,fa5bd980c28c3f8f08d759f37ba571df3d374a0601a509206b0b069f844ed82f,2024-11-21T09:06:22.120000 -CVE-2024-2844,0,0,02b2e834cb94ee1867c9a211cb006efee2923a354c1d0199af7ea7e3476b8e0b,2025-02-05T21:03:26.840000 +CVE-2024-2844,0,1,868f7b743a9ced9e723d40ffdbe9584175a5971e2679cfef2899839f98050a91,2025-02-05T21:03:26.840000 CVE-2024-28441,0,0,d0df85189510c9a4a0220f2f81b5d4fb6f74418fa2c37372bdeafcbdef88439b,2024-11-21T09:06:22.517000 CVE-2024-28442,0,0,39f9ff8978e427c05b79b512e2e774e85082ceb0d52e4ded352ec1fb8b6270ad,2024-11-21T09:06:22.873000 CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661838,2024-11-21T09:06:23.270000 @@ -255198,7 +255198,7 @@ CVE-2024-28676,0,0,f0e87c474f5cd94c9c0a360ae3e4b29f0c55c5b9cf00b4c9204038ea97ae4 CVE-2024-28677,0,0,8135ecd2860e9918720503a973e6b70ae86292a85588521142ee4270ffbdc123,2024-11-21T09:06:45.597000 CVE-2024-28678,0,0,b297beb058ef2954362c94584a9c654b760016ed6fb653bfe093f1f20dd79e10,2024-11-21T09:06:45.817000 CVE-2024-28679,0,0,6f8b96e72bc5d8aed16297df3fc8d835288ed1497cc3fbe7b3bf726aa4d75453,2024-11-21T09:06:46.053000 -CVE-2024-2868,0,0,c87003e05e723d134eed34e8ff1c5739901e2e3d0152e206b8f11aacf27c2a2f,2025-02-27T20:15:38.733000 +CVE-2024-2868,0,1,23c39763bb8d8097c491ac18d8d4c630a1b3611faf195e660f942c3654af6674,2025-02-27T20:15:38.733000 CVE-2024-28680,0,0,bb616bee4faaaca8abafc5c68ee983a737f77186f2373e9fa937b02412501f37,2024-11-21T09:06:46.260000 CVE-2024-28681,0,0,d052c8b2f46496beb9ba179784cc8722289cb35e4cd4f371958f4d19cfd3d908,2024-11-21T09:06:46.473000 CVE-2024-28682,0,0,eba1627157a7a3a72608d0b3ee7a5e137d680076206e467179ea2ca655b76ff0,2024-11-21T09:06:46.683000 @@ -255573,7 +255573,7 @@ CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b CVE-2024-2911,0,0,ea8e4206a3c0bfceb3e41c8a3a3622f0f3db1e83a81f091f5308d2a4dc3ff64f,2024-11-21T09:10:49.123000 CVE-2024-29110,0,0,188b12a44958677313d622a075fc663921a549ff0ec7192ae3aa84b867a019d1,2024-11-21T09:07:34.573000 CVE-2024-29111,0,0,43c01cdf3c81bdb08ab32728f1ab12bd4d113a32f12b5b11c5a8312b12fa01f2,2024-11-21T09:07:34.703000 -CVE-2024-29112,0,0,f0251ab2d0c538230face7ef0d7209cddad5dae226895365cf62346d9a98279e,2024-11-21T09:07:34.840000 +CVE-2024-29112,0,1,22fbc807a608e11c3ab90c64425a997e5eb5ddfdf96a55d3fadff1c9efe3e429,2024-11-21T09:07:34.840000 CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4edf2,2025-02-04T20:59:42.987000 CVE-2024-29114,0,0,88300e212efe02d630837b11131224e74f01a0cd0f11f5165976518107e30b35,2024-11-21T09:07:35.123000 CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000 @@ -255765,7 +255765,7 @@ CVE-2024-2941,0,0,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68 CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000 CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000 -CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000 +CVE-2024-29419,0,1,0ce606f5a5cf07356613fec2326ebde34442b78001dc20551d09af7fea8ca551,2024-11-21T09:08:01.520000 CVE-2024-2942,0,0,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000 CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000 CVE-2024-2943,0,0,beca67e7e14d7fa541ce7bb02133b5918a7ee95ca547f351aa0b1a0c61776892,2025-02-21T18:30:31.883000 @@ -255789,7 +255789,7 @@ CVE-2024-29450,0,0,f8cf179f4a6add956335a8b5f4847b5af52a5d30ae676cfa0c38b4dea9207 CVE-2024-29452,0,0,8e1bfc2abfc91b5ca6aaff5eaf1d9a62e09db612bd6386c944cc6eed8e948f68,2024-05-27T01:15:15.387000 CVE-2024-29454,0,0,1c893aa9fc261c831d35b219df714ee3ff6151f3ab4ae74ce0e7125ab45089bf,2024-05-27T01:15:15.473000 CVE-2024-29455,0,0,c5766b7ace224fe7d010005c23caa8535593f35607a7498893863c39faace774,2024-05-27T01:15:15.573000 -CVE-2024-2946,0,0,67783660028175e8f51492cd24dc18b819900c4e675fd543211c67172b2871ba,2024-11-21T09:10:54.347000 +CVE-2024-2946,0,1,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941f1,2024-11-21T09:10:54.347000 CVE-2024-29460,0,0,8d92453cad8a8393fa15cddde56132ecc5c7ca6e2ee3a6965bdc21d4886ca532,2024-11-21T09:08:02.840000 CVE-2024-29461,0,0,19b6d7c33a79db7e051a85f7a454bf3abf537814857bc322df2b6ca84388e42c,2024-11-21T09:08:03.070000 CVE-2024-29466,0,0,dfd330dba5d7fba0202d1e5874291f2f8ef3b988243824c2ad389998fb4c34d7,2024-11-21T09:08:03.290000 @@ -255800,12 +255800,12 @@ CVE-2024-29471,0,0,aedd63d93fa18021f61e0c8ed7383f117836a9ddd5bfe77b5e623c014ee1e CVE-2024-29472,0,0,98d793f65a472950111f763c4f5e352153e432d1a01101f086d6aa9974ea10d6,2024-11-21T09:08:04.180000 CVE-2024-29473,0,0,f2998a926737c827876c84ada013454825da8f5d7ba056248f2c493caf13fc94,2024-11-21T09:08:04.343000 CVE-2024-29474,0,0,8d13151693ee147ceb114c1cd4d5297dd4a25e25b3dffd00fd435190cec6d708,2024-11-21T09:08:04.493000 -CVE-2024-29477,0,0,e08c7b2a339a013a32867cce3e96f8071d2e9f356cbdf9466da8be30461fea85,2024-11-21T09:08:04.723000 +CVE-2024-29477,0,1,da68615ef0faeaba18ceec444f5fe63a8571dde08cdccaf14e8c6cfe684adeea,2025-03-06T14:25:09.843000 CVE-2024-2948,0,0,9b014acbc58947b357b9e41de566aaedde9b165ceb6c89be18c403d44f038e7f,2024-11-21T09:10:54.623000 CVE-2024-29489,0,0,07f5b3a5e4c9d9dd4bd17cfda9a58f8a163c6a3150e80753fbcf5f8a1d2c0bab,2024-11-21T09:08:04.877000 CVE-2024-2949,0,0,11b974be9885d5644668b962c773e64f2e6f92f893e1bcee80ff1c59fb3840e0,2025-02-27T14:53:37.577000 CVE-2024-29499,0,0,bd4ce64f6211e7fc23490fa7c7f55cdf17a8ef0d6b6835f5123192a44428f6cd,2024-11-21T09:08:05.103000 -CVE-2024-2950,0,0,bffb35f8c09e324d42792c06ce8f000f842588ba10810091f1f2e2e1d5d5a2dc,2025-02-27T14:53:37.577000 +CVE-2024-2950,0,1,d094005cc82202f670a27c75bcd8f4d958939d1e90ca9051d62e6d9f2a0e3f50,2025-02-27T14:53:37.577000 CVE-2024-29500,0,0,ad46c577f881754394a64146f58971e607b60852c9a92a6949948e14750a53a0,2025-02-21T17:15:11.583000 CVE-2024-29502,0,0,8b281ceab8400deda3cbd9fc2a92390088e4502010861b3ce65f71a4a35dd1ba,2025-02-10T23:15:13.337000 CVE-2024-29504,0,0,53fc663b9e6d96ca964c735e36e903d675794b657641161dbc25730d9236f310,2024-11-21T09:08:05.703000 @@ -255821,17 +255821,17 @@ CVE-2024-29514,0,0,56238e281b09c58b20685d81eaaaef1458a4b7b8fdd241384659169e027da CVE-2024-29515,0,0,4c7d3b5dc409348876dc1c9451a2b74aca5498a484337cd93ba972321229df2c,2024-11-21T09:08:07.547000 CVE-2024-2952,0,0,86f83cf0cce7a7fbabeb7daf8a8b0958c74c3422adf9a77157f3abb0d3c7274f,2024-11-21T09:10:55.170000 CVE-2024-2953,0,0,fe0c95ef397a97d7bbb4e0de661b60ec52f5f63cc8250bdaa006a983beaef204,2024-11-21T09:10:55.313000 -CVE-2024-2954,0,0,dbb7d9c4d9f4170c1a78605c6d88825f4158e4842cdbaac47670c8eafaccd6b7,2024-11-21T09:10:55.450000 +CVE-2024-2954,0,1,ea22a57fcdbf13ea894b27c19df57ac607e20fae62fd2c4a9e4da8b5f7259a9f,2024-11-21T09:10:55.450000 CVE-2024-2955,0,0,420657a43dde0ab938ceaddb77748ca7f47b9e7c4f2c6d78bbc949386f6ee08e,2024-11-21T09:10:55.577000 CVE-2024-2956,0,0,ee35a1837ec4a4cb126daa569e6aec5c705f36676ded3fdf2be5c2b9fcde5ad5,2024-11-21T09:10:55.720000 CVE-2024-2957,0,0,f9a1c843e62657fa10197867d25d9608c11fa033333e2c1c375aa097ac937bcc,2024-04-24T16:15:08.880000 CVE-2024-2958,0,0,ecaff893853ba75981d7321da609b6988c8cbb45da181c34ec1c3f095e55912e,2025-02-20T19:47:53.397000 -CVE-2024-2959,0,0,57dd55fa544892609df9432a80851546c1686068246de4bbb2a93d179d14c961,2025-02-20T19:44:24.913000 +CVE-2024-2959,0,1,ba986b2eabf7fea9d214ab9db204fa0f9e7a71d6ec0077b37d2fe751739dd03b,2025-02-20T19:44:24.913000 CVE-2024-2960,0,0,b4bef65fe6db3c6c321cb6d6a9df046483c0d83e7172e9a700e4dfa3328b965a,2025-02-20T19:47:32.867000 CVE-2024-2961,0,0,f1bba8b4f06316b5573c5d642ec0907f1ed7b105105c983fe0c2a39eb1e5127c,2025-02-13T18:17:58.060000 CVE-2024-2962,0,0,89a3331e528f6bca440fb1e5ac52085937df2cf4d043afb751bb1e4bc331e9c4,2024-11-21T09:10:56.493000 -CVE-2024-2963,0,0,dcdc501163c67a22dfba5bd5eef1b98f46dd567b69a9baffe1bea55a8bb5f83d,2024-11-21T09:10:56.607000 -CVE-2024-2964,0,0,c6f606448570a617b869ab59eb1eef60539206172254b57930d414027bfbe0bf,2024-11-21T09:10:56.730000 +CVE-2024-2963,0,1,fcb3ee9f060633b29d85c17d1374bd7ff6ec6876d6da1d6264175d180a897c48,2024-11-21T09:10:56.607000 +CVE-2024-2964,0,1,99535720b524f3b1a925f71ed7baa99c4bfb084313fc6d88be8395d6ed1a9ba5,2024-11-21T09:10:56.730000 CVE-2024-29640,0,0,65d6530699a7099d302e2fbf8d4b7ca80d9e1a53023aa40de7aef2cea04c7ef6,2024-11-21T09:08:07.760000 CVE-2024-29644,0,0,7b36dddaf548433646a6424210ed0ad6f03f12fd40f0d6d35dd73bdea49e2298,2024-11-21T09:08:07.980000 CVE-2024-29645,0,0,a6a74f9039264972a9c805d4ae9d2f097ab4e597f535a3fa7bafb1d74a950cb9,2024-12-02T18:15:09.453000 @@ -255893,12 +255893,12 @@ CVE-2024-29755,0,0,131508e7f31b5dd773300df31549782ce0ce017525cc3577b3551d26eabf9 CVE-2024-29756,0,0,e77feac16a93aca73ccbe8dcfafacd1ca46e891f6b1a10023dff30a1bdc4c245,2024-11-21T09:08:15.560000 CVE-2024-29757,0,0,bd7783b6715cff85d146b7f3bcffcb931e226d2a557937fa75537c3d9b443b55,2024-11-21T09:08:15.743000 CVE-2024-29758,0,0,6ea6f820d39944c9f593511e726a4e557f489b72484f2be43d28f1260dec212a,2024-11-21T09:08:15.927000 -CVE-2024-29759,0,0,dbf65f6307d1a88ff3bf5c846fdc8605dfedd83e634a2f8bf0fa6afff967dae9,2024-11-21T09:08:16.050000 +CVE-2024-29759,0,1,c2dfb00f6e1bc85acc51fca4c87b232f29bacf43ab7fb57706676573571deb58,2024-11-21T09:08:16.050000 CVE-2024-2976,0,0,be906ae6792b8669cd4d4b057f3766fd4a8c9c37d055d1b85958a80dc6b656bd,2025-01-15T18:15:32.177000 CVE-2024-29760,0,0,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000 CVE-2024-29761,0,0,768c3eca5f21654a3a2565d24ad5040669ec8be99a6791320fd6dff74c94e8c9,2024-11-21T09:08:16.287000 CVE-2024-29762,0,0,c27a800dbb174c1babee78adb8afb77016b4c238a5b56aff46b53838c8024717,2024-11-21T09:08:16.403000 -CVE-2024-29763,0,0,66c36ad957a998ad218894eedf89488939637b025f9ae7b2157ac94c4a6c8c04,2024-11-21T09:08:16.533000 +CVE-2024-29763,0,1,3f31a5021abdf326c79c53c1ee7b42abc0c1c86d7034869587a302a448fee66e,2025-03-05T18:25:53.837000 CVE-2024-29764,0,0,fa18b4f1aa7c0d32352cf717f54e868b11cc51ce798585c286453805894a407e,2024-11-21T09:08:16.663000 CVE-2024-29765,0,0,e4e73f33f0378e43f2adf30e88a1a0c42725f87f192e9980ffa3882fb3bcd8c2,2024-11-21T09:08:16.780000 CVE-2024-29766,0,0,f2725fe2f69156459ae390ed15bbe0b29a7197c362f30c7344260d4bf73a3aef,2024-11-21T09:08:16.900000 @@ -255910,7 +255910,7 @@ CVE-2024-29770,0,0,35abe9e3f3a785f920867510180dd2561063ab1b3ef7f9afaf12ab5a4015e CVE-2024-29771,0,0,666e339ddfb461c6c9508f4e2ad09bc1bd952c01699851046127d4fb2f23b0a0,2024-11-21T09:08:17.513000 CVE-2024-29772,0,0,2a3f410f5d7a3835884b95cee4041eb3410d4fb7ac8e626500c58432ce3ff35b,2024-11-21T09:08:17.630000 CVE-2024-29773,0,0,3a4135e82da5b1b5c317ee5a57a4fb632eadd9fc142214ffb19ce8a1b2425d3f,2024-11-21T09:08:17.757000 -CVE-2024-29774,0,0,5be27e674c2a74f913e5e654638f3bff022d27cbe2d519ed8e7c7f62f72bc99a,2024-11-21T09:08:17.887000 +CVE-2024-29774,0,1,0dcc0f2c0ce7d9ff1358ba4fecde701d7e8033e2e7a9f420f4872003e8c8d750,2024-11-21T09:08:17.887000 CVE-2024-29775,0,0,8a32d6ead85c3d0385149f4c1e948b755d934ea1153906d6f461377664eae18a,2024-11-21T09:08:18.030000 CVE-2024-29776,0,0,2e120c49ed65bcfed6afb334fbde2e379057011e9a9231fe131a7f336c27e8a2,2024-12-06T21:15:07.013000 CVE-2024-29777,0,0,96c3bea8cd0c596ccb503cca01d64317828a3a70ede5d81d9e50be91afd9929a,2025-02-05T15:40:21.993000 @@ -256046,7 +256046,7 @@ CVE-2024-29902,0,0,dbc994511c59992d8f4890edc9b93c133835d42175a447af75cdc90341d56 CVE-2024-29903,0,0,4e75979640c0d3550a542c64c0c85b4d0b0d5b2e2a4cb658db8ff5ee25fbba55,2025-01-09T15:40:24.663000 CVE-2024-29904,0,0,3b82461af54de981422dbcb971e4a30989613a212e17414bf835e8e7a446b2d0,2024-11-21T09:08:35.173000 CVE-2024-29905,0,0,e28529c4ebb79bb595d0286c5983b5ff8d1ee69e2915406ae352c6ef9363fb2c,2024-11-21T09:08:35.300000 -CVE-2024-29906,0,0,d939314ff6b3596b78383612c189867cfee38ec6725ef26a59f650d4784797d5,2024-11-21T09:08:35.427000 +CVE-2024-29906,0,1,d8573fd98931d43b25e17f790adf8aca39c320ffe76894b012d9b8a5da39e18c,2025-03-05T18:25:53.837000 CVE-2024-29907,0,0,6a6dcf1abf6285cfc2a5cb15e8dbf09a7ebfbf7c0b9c54766035c8a196da0082,2024-11-21T09:08:35.543000 CVE-2024-29908,0,0,2015ea0a79e2dfbfcfcc8c9f56219cb4aa05d88d8743a9e6a62e5bb7ea1c486a,2024-11-21T09:08:35.660000 CVE-2024-29909,0,0,fb9ae7b23fa5013e6341fa9c080778ffeab890f332e295ba676aa55a587bf1de,2024-11-21T09:08:35.787000 @@ -256063,11 +256063,11 @@ CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 CVE-2024-29920,0,0,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000 -CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 +CVE-2024-29921,0,1,b9c2dd4a6ac014b1d80df166ec8cf95b75954206dfe5823ed81b4aa10da07d17,2024-11-21T09:08:37.447000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29923,0,0,a45a81b524b42be32edcb85a652cac38dc1e978ac5963a2acd47db1d0bf7d066,2025-01-31T18:23:56.537000 CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045f92,2024-11-21T09:08:37.800000 -CVE-2024-29925,0,0,70daeb595f4a9e6539dd04700868ed8ba7ed703ffa0e91f01ff9fbd047d02414,2024-11-21T09:08:37.920000 +CVE-2024-29925,0,1,741a1b83114336e7e00db1ac9c4ad6c0646d7c9b5cba9cea2fe9d5d0216d43e3,2024-11-21T09:08:37.920000 CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000 CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000 CVE-2024-29928,0,0,cae0001505e95b812c21633d98b96b15f5b908a7cd513a5258817260411218f4,2024-11-21T09:08:38.310000 @@ -256075,7 +256075,7 @@ CVE-2024-29929,0,0,f91bd0d65bfbafabbfd1e47fc42f253445f71d47c1a395703c4c93c760349 CVE-2024-2993,0,0,ca085be1f41ce1cdb604449d670421536b9009a843dba261ec4149fee50495e0,2025-01-15T18:21:04.553000 CVE-2024-29930,0,0,9749f3c46d5ed598350d72b277cf5b80576c9e694bfca9cc9de48ba3f3758cda,2024-11-21T09:08:38.547000 CVE-2024-29931,0,0,5eedac47918823a53eca0a53bbda2170a969920cdefa72cdcc49a87359eb038d,2025-02-11T15:56:39.607000 -CVE-2024-29932,0,0,475505c36ba76054edd9cd43f8327f3b3b11dc00dad68c7fe49c4699a5a99050,2024-11-21T09:08:38.790000 +CVE-2024-29932,0,1,bd55945644262e613ea8050ee5a723bf21f9ad4ff5daeced09aa3e04c6e9218b,2025-03-05T18:25:53.837000 CVE-2024-29933,0,0,7dece04b0d250730bb6c8f5d1ee2f214de430141eb9a6cbcb49346ae6a9985fc,2024-11-21T09:08:38.917000 CVE-2024-29934,0,0,b297fa27d74f1971b9c10285a66c0488aa6ad5ec882afa30cbf2c2b6be6540cf,2024-11-21T09:08:39.063000 CVE-2024-29935,0,0,d8f8dd640102425c5140becffd8fb6166f281d4721890fd59d5b0e2d6c5227ae,2025-02-05T15:39:57.193000 @@ -256167,7 +256167,7 @@ CVE-2024-30016,0,0,f14e2b30562661a4ff2229a6cf966afa3e8b1b1d4a8bca3ecb33c5cb24a03 CVE-2024-30017,0,0,e67d0e79d48005dff5e96ca4240ff702a62d87cc11261645103efaa57520fa65,2025-01-08T15:45:33.653000 CVE-2024-30018,0,0,78eb900d0e305c5426aba068baa9e9085e482ce3790fb76fe45e8bca8845b5af,2025-01-28T17:15:22.960000 CVE-2024-30019,0,0,7895e4301f8329f0d3bbc3f85de5145162e754cb364ac2d6125a1780ba065c87,2025-01-08T15:46:05.617000 -CVE-2024-3002,0,0,4ac4fdd927e3ca9386eb683072b265b68cff788c7cb7589d721ccf895bc609c8,2024-11-21T09:28:39.160000 +CVE-2024-3002,0,1,d2e0d5a28540720df6525f0ba66fb0f07c4521be0885e24455d538b812026825,2025-02-21T21:42:06.143000 CVE-2024-30020,0,0,cc6801de5fe4e02339df6739ba20205da5b257c845d519ab27900816e8676433,2025-01-28T17:15:23.177000 CVE-2024-30021,0,0,32ea6e2004046ee2f59a5edab463b3ea0b497769e657e3bc75984d5c4fada69c,2025-01-08T15:46:36.790000 CVE-2024-30022,0,0,adc9bed26322e1b6cdebce6ec02a5a280b16673d9ee8734b490ac0aa670b6fe4,2025-01-08T15:46:52.783000 @@ -256208,7 +256208,7 @@ CVE-2024-30054,0,0,9f5508f8096df6f5ba243cc60547ecdd2cb04dad23b56561c31661a40deb7 CVE-2024-30055,0,0,e3e0e36f68fafb68ae27aa9c3ac6c2d5b0418a8d876e10e3b5bbef42db4a0362,2025-01-17T15:51:50.370000 CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000 CVE-2024-30057,0,0,ba33c9985864f7902ef361ee4e4e325819ac2bc85f178562cda86ff59e397ce3,2024-11-21T09:11:09.533000 -CVE-2024-30058,0,0,b4f547fcf1130bb74814b5e7ff0cd38cf3a88a60e4e9667adab43d4a9e265e30,2025-02-05T14:22:29.687000 +CVE-2024-30058,0,1,a41788115e648121b4f52955db7478673764d745bf381141dd00a1608fd1f328,2025-02-05T14:22:29.687000 CVE-2024-30059,0,0,3163a987284d43fc0ffca06b376cb917d6abd4a21ba6d05abf0a3e3c9f35694b,2025-01-08T17:33:36.930000 CVE-2024-3006,0,0,cc76889acf8a20fb2601ddff61a2879ca5cbbe1a349a88df84e726957a8b5ba3,2025-01-15T18:21:47.937000 CVE-2024-30060,0,0,93687c17e1e63342d793c34ac51cc1b88fb3d3ed26ced70218b3fa9d11d4c9dd,2025-01-29T21:46:43.927000 @@ -256291,7 +256291,7 @@ CVE-2024-30141,0,0,366cb3a10440e3b30cd871e21bbc3f740fac05dab178efaf9985b3ce33a27 CVE-2024-30142,0,0,363bc8d9ef2cad1109db0231f1d9e043ce9476ebb48510d5ff80d7b6f8e54e19,2024-11-08T19:01:03.880000 CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d679,2024-11-01T12:57:03.417000 CVE-2024-3015,0,0,1506150ce9c24bf5c6495b2770f1f82863089e0097a38aa6e6b97cbe25ca1071,2025-03-05T18:25:53.837000 -CVE-2024-30150,0,0,a62c26783832b053b5bcefcdb3738447ad86959ef5b6422f707ac574e115fe4c,2025-02-25T23:15:10.753000 +CVE-2024-30150,0,1,4fa60d6dd4f0daeaee31653e34cf1f5215c4dba48f3d62569322a4d06540dc29,2025-02-25T23:15:10.753000 CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959affc,2025-03-04T17:15:12.010000 CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000 CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000 @@ -256370,7 +256370,7 @@ CVE-2024-30228,0,0,bae82ddc8fd5dc1643cab86dfb0675ea4a30b8239df3eaeed916854313d32 CVE-2024-30229,0,0,618b341ddde842ab963dd32e5b58768f172ceaac30eeec0dbf9d1f8b20aa5590,2025-02-25T14:24:44.603000 CVE-2024-3023,0,0,263153a293163fa286e9c101f6bafff3237bb13b48d4d071321a37d0a1fdd8bd,2024-11-21T09:28:42.340000 CVE-2024-30230,0,0,9ae9ce9e1df99b9edb0b3840d298f6742d8d81c2fa9cbc5be63ce42438c755d5,2024-11-21T09:11:29.843000 -CVE-2024-30231,0,0,68fd351a4c37be841f842b0166a1b15234ac7b80a2d9bb89976da51bdd09f04f,2024-11-21T09:11:29.970000 +CVE-2024-30231,0,1,2c19c82b00ebdfa395130265697b3d12ed6a975c1b12ac937137214a1b807e28,2024-11-21T09:11:29.970000 CVE-2024-30232,0,0,cb4ba1f0c953f5530e82efb5a6283e946b5575664e80c37efadf1d45825da04a,2025-03-05T20:50:02.120000 CVE-2024-30233,0,0,f1d9cba1fef6a20f771e2e1821d5ed146e740ade1e79062f0b361b5e672abd33,2024-11-21T09:11:30.203000 CVE-2024-30234,0,0,fc7aa33bf67a605070883714eea380c59e25f899a3a6c90caaacb9b95ffca289,2024-11-21T09:11:30.333000 @@ -256424,7 +256424,7 @@ CVE-2024-30279,0,0,89f43f89b3e5bba50f5808c010b76f800b9ff2c0060a07fab9f057bacf37b CVE-2024-3028,0,0,3ee0af1c7862d83961743b09e0ffbac3b70e00c3f9f6a7e4d75611695830912b,2024-11-21T09:28:43.047000 CVE-2024-30280,0,0,a24b5a5df6125ec3b12932ef2fab975f460fb22c422b61330287285016833a38,2024-12-02T21:07:30.440000 CVE-2024-30281,0,0,29cf5e92f710e3a250a71e63736588b07a76e812cb5743e63bf156f3697f8678,2024-12-12T21:12:29.690000 -CVE-2024-30282,0,0,4f3d83bba32f44268f2e2708a47a032a9faff4161197534209c3d6a5269bd702,2024-12-02T17:48:54.733000 +CVE-2024-30282,0,1,b3c03e0ff3a822c72abc2aa52cb3e2c6239376971e87e41a3305cbc9ab9fe430,2025-03-06T19:48:51.880000 CVE-2024-30283,0,0,cf19bd9731720c937fc78a93920d4f5aa07ae86785c2689219d69309e610bf03,2024-12-02T20:43:17.603000 CVE-2024-30284,0,0,0ec4c723eab9c12eec1ed917f36cbbb94ddd4885d7beefd188b4e7e02f5094d1,2024-12-02T21:22:08.673000 CVE-2024-30285,0,0,cbdfa919ef56e8390c2ff8dd219bd60a3c2f6b875dfe5939c00f9b638e43565a,2024-11-21T09:11:37.467000 @@ -256522,33 +256522,33 @@ CVE-2024-30374,0,0,5750c84f0dfce3e388704bb4ab938fe04de20050b059190da07191e8eeb9b CVE-2024-30375,0,0,cb0368348c49f86546e5f7857b0c0a61bb5922fbcf3db6a88e5f77172355ae24,2024-11-21T09:11:48.357000 CVE-2024-30376,0,0,2248943ee02f5c871a122c8a9507747e520818300358783dbb175412597e8e17,2025-01-09T16:08:38.383000 CVE-2024-30377,0,0,5fedfa7ad2f481f3b5188ccaa34065076e4b733235d8435732180716c5e929f4,2025-01-03T20:46:41.177000 -CVE-2024-30378,0,0,30fc88d6543d61370ff685003ac9b981f1d4788efd1700b8d54929a7c0fd2b8e,2024-11-21T09:11:48.497000 -CVE-2024-30380,0,0,8ebca385f032137fa9c9e6f7fe14fd8c9cc9d99d8e585c858c4a863a27f2af96,2025-02-07T20:17:11.053000 +CVE-2024-30378,0,1,5d469225bd38fb8c019f3f25459942fb380b14f98605a97b4f7cf83063acd43c,2025-03-05T14:53:25.190000 +CVE-2024-30380,0,1,24fa77c57d2a674675b4261c6cf3a84981aad42e215c9e8dfa332fa111d75de8,2025-02-07T20:17:11.053000 CVE-2024-30381,0,0,a90bef5676486eb3e5fbb14050dd8453236401758496c5562e4edf0d6646718e,2024-11-21T09:11:48.810000 -CVE-2024-30382,0,0,7d8b8b2cc58afcae95b1b2e0f49114cb9fcabd2dd8af88170aad9dc7679e0d49,2025-02-06T20:37:07.020000 -CVE-2024-30384,0,0,b6b00ae338aa2596b9cf0ab2a2d7ba9486308541bc369452d8a5cb70380c1889,2025-02-06T20:36:55.430000 -CVE-2024-30386,0,0,728341d8909cf772b9833687d550dac7eede79a649bd6afc498a4f6fa8721b81,2025-02-06T20:36:32.980000 -CVE-2024-30387,0,0,56c8b449ac604da292fe9ad9e6b47d856515277e3823bb30844bdb634a54ffb0,2025-02-06T20:36:42.403000 +CVE-2024-30382,0,1,3ab14bc3a79fa66f85f9e3289da61d82fec65940eef099ebef5d24011c1666d7,2025-02-06T20:37:07.020000 +CVE-2024-30384,0,1,73f58efa1e05514a4d3056467472a8ae9078d8332b4ff0f4508665803ed9d7ff,2025-02-06T20:36:55.430000 +CVE-2024-30386,0,1,80a3f815f72b3a21568411742e6af067473d4075b16d67d06e32a57cb75d5a44,2025-02-06T20:36:32.980000 +CVE-2024-30387,0,1,5a89badbf8211b2a6fa1a59333a8d8ccefe61c1c54cc3997d9bea811c23527fe,2025-02-06T20:36:42.403000 CVE-2024-30388,0,0,60dff44e2e2ff8cdb661c390e455741e6d02ab3834355ffee513d12d9ea694e4,2024-11-21T09:11:49.483000 -CVE-2024-30389,0,0,ead8de7fc509a64228bbc0cb125c7917e23998253f714220bd2d3acd2fb45034,2025-02-06T20:36:23.717000 +CVE-2024-30389,0,1,f2c9888a03f2737628d4f9f21dfe3c587e1ef38cbad9091bd0a8e4cc67fe65cd,2025-02-06T20:36:23.717000 CVE-2024-3039,0,0,fd1ff7c564ec42e61fa3b9f7f46bf52f218469bf40f583b5d685a0203ba03271,2025-03-05T18:25:53.837000 -CVE-2024-30390,0,0,b0c47160df5018fa307d9cdcaedb980fd968b4d66e0d499456354ad6dee30f0a,2025-02-06T20:36:12.843000 -CVE-2024-30391,0,0,5f8bb06fbb4dd14695693db6dadd9e1ef2319b0089badf7ca89ab6c8b83db9e0,2024-11-21T09:11:49.877000 +CVE-2024-30390,0,1,724b8ac748c114cf30e61d8f762c0e71304b9d541bd66c05120f4e71a1df25ce,2025-02-06T20:36:12.843000 +CVE-2024-30391,0,1,3d89dc9f466be1085670981cedaf38b93163603b34d31c781fcdcd72c126a26a,2025-03-05T14:53:25.190000 CVE-2024-30392,0,0,517e3cf580a7b36ad2c5c6e6ae4afb9008a26bc26c91273ebb59522ceb358b79,2024-11-21T09:11:50.017000 -CVE-2024-30394,0,0,2e310b724857d9ba0d64b73bbc2975b1d718fc1817cc13c6e1a0a9e04ecab5d6,2025-02-06T18:39:12.470000 -CVE-2024-30395,0,0,b810e8a1564fab08e9fe6a3a931e04a1b04b9b061c83cb63795d73df6e1be31b,2025-02-06T18:39:02.430000 -CVE-2024-30397,0,0,b2efd318a4a612836bdac7542c6abccbcf52b4c59f77d9fc4890406d9279e16a,2025-02-26T07:46:51.690000 -CVE-2024-30398,0,0,dfeaf124bb71ed4c49bc50ae0da10cb75be922314ecce4572b4ca19d568b3bc2,2025-02-06T20:35:49.817000 +CVE-2024-30394,0,1,78be944a24b081df530ce71e52bf655b9e674a53821685db33266b6c6afe9302,2025-02-06T18:39:12.470000 +CVE-2024-30395,0,1,a5b662e9f5acdbde6b0ab8d6d9cf7a5d12a66bb2b14658b3399f574e8747f05f,2025-02-06T18:39:02.430000 +CVE-2024-30397,0,1,a58cf388c3329f65866337395a66f8d1f720b65167934cb24006ae7714d69486,2025-02-26T07:46:51.690000 +CVE-2024-30398,0,1,78c471c880d278a60974d5045434b8de76099ba62fb4e6092af96b4b67a1716b,2025-02-06T20:35:49.817000 CVE-2024-3040,0,0,c8af8750a613f5187d04c39a0bc66acbf0b9fe72661c80b26586a546c32e8090,2025-02-10T15:19:25.093000 CVE-2024-30401,0,0,f20a76f73e0db05aa6d3807f36dee1e1e205d0880fc0274419bcca7784f0028d,2024-11-21T09:11:50.720000 CVE-2024-30402,0,0,9ee52ab0fee0d26fb40d12b6cd26483f56b9e069080c4370f6b3957e5b8f5dfa,2025-02-06T20:35:36.530000 -CVE-2024-30403,0,0,d037343813480fcdfb01f5f93592098f6ddf03071bb563e66559945b53d3a6a1,2025-02-06T20:35:23.557000 -CVE-2024-30405,0,0,88f8cdb1edf6a21cff6aaa7e50de11c674cb8123802a969b14157fe38b8e698d,2024-11-21T09:11:51.157000 +CVE-2024-30403,0,1,22eb49b09a36fadd8507172a26504861ed191d244b2c85b95761b69f254eefb0,2025-02-06T20:35:23.557000 +CVE-2024-30405,0,1,7646284636ee039ebfdb1782e0bcfac6bc6a51a2d93c9d78da0c799468c04f87,2025-03-05T14:53:25.190000 CVE-2024-30406,0,0,25a716c33863d613579e0772d281fad8374b41388db638c6629bdb9b3e66b965,2024-11-21T09:11:51.300000 CVE-2024-30407,0,0,91553b743251c39aa28c274566912a07431ef9d0140387536448a128b91ff996,2024-11-21T09:11:51.440000 -CVE-2024-30409,0,0,66c5f4d2f0dcdbc2b7ba831a6da400b9a06aa9ba46342db92012fd73f92d2623,2025-02-06T18:32:50.510000 +CVE-2024-30409,0,1,d9771a824f59031ef88f641f6d03c0edbb15f17d6bde9358ee0b697ec084f4ef,2025-02-06T18:32:50.510000 CVE-2024-3041,0,0,6e439f18076de6ccb66c3448579367834ffd60c36a73fb0239a8fc716300de71,2025-02-10T15:32:25.780000 -CVE-2024-30410,0,0,623ee587c716ac7ac8fd61d8831b064726b023a0f1f2667fee05fc9a60d21c2c,2025-02-06T18:21:04.777000 +CVE-2024-30410,0,1,f2d5323167ef67334fc039e92c6a9de7a0641218561ca92f76bf312bcc192de9,2025-02-06T18:21:04.777000 CVE-2024-30413,0,0,8b2fcb61d9248313939f7e26b7251e9fe525eb574f922f425a89ae50be45b77f,2024-12-09T18:33:13.660000 CVE-2024-30414,0,0,1cbf0e27f204f782c07469ae5f2be612236272d538f377b4392129fdcb02311a,2024-11-21T09:11:52.047000 CVE-2024-30415,0,0,fd280c5c87e2b4090f2d65136432e219d0920e7ac6771b8b662f7b008a1b9bfa,2024-11-21T09:11:52.227000 @@ -256610,7 +256610,7 @@ CVE-2024-30466,0,0,3f10a773ea1b0ee7e24262d8c427eaca14741190389849d4a5608d917230b CVE-2024-30467,0,0,6e168b60b0b36864713e11c54e229ea5225c85b47c1df168ec13f8607f19f199,2024-11-21T09:11:59.037000 CVE-2024-30468,0,0,79e862513ecf1741b4e3abd5aaee830fc99b520ba2dd2cc3e933ac80d706781f,2024-11-21T09:11:59.177000 CVE-2024-30469,0,0,7377a0c701451e2687d535a47a9d2ac5bef35cdfdbb0f2d06a605f94ecbcb1a3,2024-11-21T09:11:59.310000 -CVE-2024-3047,0,0,1aafa80895dc734b4be85bf3dda813e3f308c493d1afaf0b327607a43b8f874a,2025-02-11T16:36:26.150000 +CVE-2024-3047,0,1,7c5da204a3ba43f3ece13a34093529402590915960463dbf733da57eff401f10,2025-02-11T16:36:26.150000 CVE-2024-30470,0,0,401350549a9af2e6d47de73b92a22226a42adb8030494eebd3f507fd43cb01d2,2024-11-21T09:11:59.440000 CVE-2024-30471,0,0,7f05159d7b1bb52c7f44f1503d91bcf3ddb878300d6d0f685babe2188a880de6,2024-11-21T09:11:59.580000 CVE-2024-30472,0,0,f99421b44702b1bfa7591fc35986a5e44a7c75afd2395131e35a18241f34b854,2024-11-21T09:11:59.780000 @@ -256683,7 +256683,7 @@ CVE-2024-30536,0,0,b64bbf7f9c01c096b1b74e9938a49c6233732ee60d9e8a6b094ffd1bc955c CVE-2024-30537,0,0,2b45600b5e6b9e30c5fe3b6e5e1591efc701341291b376e1e4dfb2fe2eb1d9de,2024-11-21T09:12:07.857000 CVE-2024-30538,0,0,06195d7ccd98399f3f9f94bd5bf07b79b47ebc66892fb46769dafce42a22e320,2024-11-21T09:12:08.010000 CVE-2024-30539,0,0,aeb6b1d179b3f64f668b930ea496aed34f976fb0f746752b911954296cb5f6b3,2024-11-21T09:12:08.160000 -CVE-2024-3054,0,0,07dc4e5132023a9cd67b0f2604fdfa79ab7c9505cc3bd8f42a20342eef290475,2025-02-27T14:54:18.293000 +CVE-2024-3054,0,1,9a33a1158bb484fc2fb609a1963d7f9fc5030a788096a4676dac4f306c0622aa,2025-02-27T14:54:18.293000 CVE-2024-30540,0,0,0f9002363e33cd96a9415bc6de11d92d8a1d3fa2841763d46ee8793caddf7a3e,2024-11-21T09:12:08.310000 CVE-2024-30541,0,0,cb59af723e8fb28a89a6f28f29871f40007040eb902bb3ca1e356ac21ac6d058,2024-11-21T09:12:08.433000 CVE-2024-30542,0,0,f931e6191576b13b64880f1a0b14b2ea5c164b26bc9b4f90d44c6053aafb01ab,2024-11-21T09:12:08.560000 @@ -256786,7 +256786,7 @@ CVE-2024-30663,0,0,b6da6bb4d25fb65de4f3357392cacd3570f5d77ee79f5ad2035dd6fbab86c CVE-2024-30665,0,0,ea024f63284f6f5491b2f08da3fde7ad5a2cdc0c6ce89eb0be99ff7eb5b4c66a,2024-05-27T01:15:16.010000 CVE-2024-30666,0,0,2bdde58a92e254956e0a99e6dcee93ef17fd82b400ac8cedac651cae39909115,2024-05-27T01:15:16.093000 CVE-2024-30667,0,0,bc4893a9fc0aae5944645af6b1d35394370765344617517ef63fd14d4819179f,2024-05-27T01:15:16.173000 -CVE-2024-3067,0,0,6ccd4d4e30a63bf110b9f0fd9bf956baa6d6e065357fd0b072ac98de8f2117df,2024-11-21T09:28:49.597000 +CVE-2024-3067,0,1,1d64280201fe07067f34483262f7a01e3efa1bca9f1e3bb9e3ece0c40713fbc1,2024-11-21T09:28:49.597000 CVE-2024-30672,0,0,1d957a4809046a072587e4cda0452fee1838c879e3d571f27ec94cbb7223e4fb,2024-05-27T01:15:16.250000 CVE-2024-30674,0,0,2f187d4d14e235ecf508fdc4a7188a6d16f4cfe28cd11785c2b11b0f5690bac6,2024-05-27T01:15:16.347000 CVE-2024-30675,0,0,ffc49cdafed4c4e4433fb2fd56cb653f502b0925217178589e325662e8a6b620,2024-05-27T01:15:16.433000 @@ -256986,7 +256986,7 @@ CVE-2024-31064,0,0,4412d32292f4f1a606e86dde19af7fec75a1aa99b33a1873a73f990834682 CVE-2024-31065,0,0,a00112f4528754b8c1afee754696d282ee5e69a60575a305b812e8485c2614ed,2024-11-21T09:12:47.320000 CVE-2024-31068,0,0,20586c5fa49863b3745dd6355729ba2a349b35bb6d89011c9b98b570d445f97d,2025-02-12T22:15:32.747000 CVE-2024-31069,0,0,fb53502e6d7be7a5a82d5cf9033afaa2c76b005b5ac9eb9741b945f53d80a4ae,2024-11-21T09:12:47.533000 -CVE-2024-3107,0,0,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 +CVE-2024-3107,0,1,4b9337a99fb5aefb135e096b04ab0f4a011bd640cf03b99070a2b4937a3bdb08,2025-02-06T18:05:03.810000 CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f19e,2024-11-21T09:12:47.663000 CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f77c7,2024-11-21T09:12:47.910000 CVE-2024-31074,0,0,a2f238abb53e6d12a2f868f2cb51afa58ab2d87eab5b0d20d91ca0ad2c12fd72,2024-11-15T14:00:09.720000 @@ -257184,7 +257184,7 @@ CVE-2024-31265,0,0,e1fed0f09414babc27e213d10ed6170c373759e1afef4106c3e5f999a120c CVE-2024-31266,0,0,dfd63dafabe2d930bc8a0a700e7d903803a7ad970a9887d40372b97dbe61fa54,2024-11-21T09:13:09.590000 CVE-2024-31267,0,0,50253515c1cf6441fce5132f11578f8f3b22e9dc69183ac929c73c086801c8b7,2024-11-21T09:13:09.707000 CVE-2024-31268,0,0,56f8f28cbe6fed393da02b46c53b8861fd5b8e2c037bed5b3264e72064db6f3f,2024-11-21T09:13:09.833000 -CVE-2024-31269,0,0,8e37140fb886b7e460a52bf727d61e48f714c2ca3021a0a56e120fb1dc09fca2,2024-11-21T09:13:09.953000 +CVE-2024-31269,0,1,ea4b93017bb3e311f1e9e138738909c3436285f9a0b603a1c36ad6d64a320cc7,2024-11-21T09:13:09.953000 CVE-2024-3127,0,0,55bc61b6799b0ce5ebc09ada63b698bca2c7a76f1ea429a68f35243d85fc413d,2024-12-13T16:11:44.433000 CVE-2024-31270,0,0,905cfd9a5b2484a5ed717c8c4159ba64d14991af65518b548e91bb5795af680e,2024-11-21T09:13:10.060000 CVE-2024-31271,0,0,f23cfda9cd61e94b0d27e597f36f679614f3d98747c04e85bfd3b84c535f9e39,2024-11-21T09:13:10.173000 @@ -257343,7 +257343,7 @@ CVE-2024-31416,0,0,fd70c8404ba8d7fa8c3907c21f99db1492b7038854f36063e43ab4be476e2 CVE-2024-31419,0,0,2a645677a108031d0ea7f186190c4cb3fec724be8cfc0357c530bba8fc6c5932,2024-11-21T09:13:29.700000 CVE-2024-3142,0,0,d1c35e8fd37a5112c9a370ac3e5390b89a6a95e49a79367ce9cd9a3d1d7b2a79,2024-11-21T09:28:59.360000 CVE-2024-31420,0,0,c4515874eaa66bf1c46c2cba75bb18edea80641a9c8f20b7f63811b139889df0,2024-11-21T09:13:29.823000 -CVE-2024-31421,0,0,9b9120163881c54adbaadba07ed7b799f15223dc5e32bc73302d4ee7406f7381,2024-11-21T09:13:29.950000 +CVE-2024-31421,0,1,6a51f60fa5af5006c5744588884e41d768750d11251812b8c80789eff98f0392,2024-11-21T09:13:29.950000 CVE-2024-31422,0,0,638c07891a9179b8b53db1ffbbc0402cc22e67c9d81cd2676c52eedb9ea1a5c7,2024-11-21T09:13:30.070000 CVE-2024-31423,0,0,ea28402c9fb216f03b19eea6af2fab9e6f1df1770d063065037e765d82c0ab5b,2024-11-21T09:13:30.203000 CVE-2024-31424,0,0,a69d524f507e9803b2fc5bc51c4c7b6a0f21bc42aa6e6d123a8fab3009de077e,2024-11-21T09:13:30.340000 @@ -257711,7 +257711,7 @@ CVE-2024-31990,0,0,4ffcd4cb931fab7999e9eb8c0fc52e9e3272d1dca2a60d8c32eb43175564f CVE-2024-31991,0,0,1685cba2269c871fb08c05417a1a4edf64703753007bd1772f9e51e2a3484db9,2025-03-07T12:36:39.820000 CVE-2024-31992,0,0,7d12b4878c1b2e89901111476fe106ec7ddc236472a2fa6dd95ed5fc7e400423,2025-03-07T12:36:39.820000 CVE-2024-31993,0,0,e418faa8040403fca97661322a299b203fd6b3eddb45663cfe7a132255f3939a,2025-03-07T12:36:39.820000 -CVE-2024-31994,0,0,bfe6e4352560c2047425e44009e084be345bb6ee469af26d50d0326874d8858e,2024-11-21T09:14:18.210000 +CVE-2024-31994,0,1,0e5f862d6845c41bd8f753b52c62094a9f19030e61c9f008cd1b4925d299868a,2024-11-21T09:14:18.210000 CVE-2024-31995,0,0,ba7074e8dce6574a8d648fc9b6c6b4c7092258a8c2104dfa1559335c4b2ef3ed,2024-11-21T09:14:18.343000 CVE-2024-31996,0,0,326190cdadf52514c522ae263564f81a122a5335079c21dd2577b2ce188f0ce2,2025-01-09T18:50:19.793000 CVE-2024-31997,0,0,1dd3fd932be272b1a162cec8343001ee2372502c26ecaaf5b40f9e6c3f035e9e,2025-01-09T19:02:51.310000 @@ -257815,7 +257815,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000 CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000 CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000 -CVE-2024-32113,0,0,bf72c93951c05bbd1b890b08455539ecaed0f5ce9378e3026c45b3947bbd54a9,2025-02-13T18:18:02.173000 +CVE-2024-32113,0,1,1ff9a10ff2bbfaa858146d22068a002c7eb5eb7315815d75bc89f4484c2c5787,2025-02-13T18:18:02.173000 CVE-2024-32114,0,0,fa0ace32e8331607700a098defe4a63c95a20c05c2f93247ddd5b9a066e0c181,2025-02-11T16:31:00.073000 CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27b46,2025-02-18T22:15:10.747000 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 @@ -257851,13 +257851,13 @@ CVE-2024-32149,0,0,014f32097e0adfcb798b4cc5314a257b8c989b51a39802edb1ce190faea26 CVE-2024-3215,0,0,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000 CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f25738557d1,2024-11-26T11:21:59.167000 CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000 -CVE-2024-3216,0,0,7799c08e33333b897e4af8143de9e5e152f9ad89d0811b1f2c66c02224de0395,2025-02-11T16:31:21.577000 +CVE-2024-3216,0,1,1a66c657b2c05dec189fbd499b73aad44096e6f6bac1f349f7d19898fe5882ff,2025-02-11T16:31:21.577000 CVE-2024-32161,0,0,0dc190f3981d5e79cad9fecc2e2149a6a38211e289bd6db07e8bb128e6f7dd9b,2024-11-21T09:14:33.830000 CVE-2024-32162,0,0,4e8fb3c00cf6f382448cea6d448092d5c7a04bbdd0f5ada2664c266ccef0c98a,2024-11-21T09:14:34.053000 CVE-2024-32163,0,0,70a810f0e7170dda71d497968384a8941bd9a15377fb1cc21b5d3bfeb42fa0ab,2024-11-21T09:14:34.280000 CVE-2024-32166,0,0,30c74ce7f6bd4f849723a2691bcc599fbdb2bfc2e47c9bf3e7bf78a858bb3187,2024-11-21T09:14:34.507000 CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec44841bc,2024-11-21T09:14:34.797000 -CVE-2024-3217,0,0,4ad3dd3a961bbd11d22ddb80390e7904d8f6201f4dd1722d5456e09d3a9d14af,2025-02-27T14:53:37.577000 +CVE-2024-3217,0,1,0179d108577a6128f860d30da62a8074b33dfe14b28f0ca8d2470fb7dcfa4187,2025-02-27T14:53:37.577000 CVE-2024-3218,0,0,81581ac92c0291d6ed71dd9b38de9b17941e2f3f078e37375ed0e3bad56cd497,2024-11-21T09:29:10.287000 CVE-2024-3219,0,0,de3f9fd70dd3922206912d5b11848a3b5ec7b145621830b3178421a5ed707f1d,2025-01-31T20:15:31.547000 CVE-2024-3220,0,0,732a955e3212f8f0fbbf2ff48ca938d8346e490659a1a4ed992439e5c452d39c,2025-02-14T19:15:13.770000 @@ -257970,7 +257970,7 @@ CVE-2024-32418,0,0,d8130dedbe76cdd228daed362bf2d1aca28a9841235dbcc9e6fc321e75783 CVE-2024-3242,0,0,5f9a392d5baa5578fca1ab76c564a35b8fe07ebbba529c9b61373bb8ee0e2f7d,2025-01-16T15:08:00.773000 CVE-2024-32428,0,0,60a38dad4b728935d029d05efcaf45ae388db9a4371b63af5cf892c6f872c55e,2024-11-21T09:14:53.750000 CVE-2024-32429,0,0,dbf9a7627ca091682b113486f07b5002a78b5c9605b6253476e7e45785d77881,2024-11-21T09:14:53.857000 -CVE-2024-3243,0,0,e7f1e7227bcf7861414f7cbfa95c4d6f14e40d649213c05801f8f5f74cfb2f96,2025-02-05T14:42:19.507000 +CVE-2024-3243,0,1,a9ecc98ff0665c402f2474510440fe79737dfaea5a7683f095a86f633140f683,2025-02-05T14:42:19.507000 CVE-2024-32430,0,0,c2a94f23061c8c38dc84ad2d335af353ee8e2e6c814c164a104835d6e77e967f,2024-11-21T09:14:53.977000 CVE-2024-32431,0,0,d468c4a3b1e0357b578a4927a4af3887ac84b32043b16899d6b8968f0aaaf0db,2024-11-21T09:14:54.087000 CVE-2024-32432,0,0,434c4647a66876bc550da9d3642b433ec7d53a18ae27ccf61ad2e877dffb5600,2024-11-21T09:14:54.220000 @@ -258222,7 +258222,7 @@ CVE-2024-32676,0,0,225c0670707cdf2a387fe59e380199fc7ecaa686000f74632b938a079c72b CVE-2024-32677,0,0,8bdad575f926c579b11688030195f9809fc141578e312d6097cd2363ccae45a7,2024-11-21T09:15:27.407000 CVE-2024-32678,0,0,7641fbb4727f544a250314692648516c0791c5bc4f107a1e7d58c2e4f6886929,2024-11-21T09:15:27.540000 CVE-2024-32679,0,0,fe54e15dc839123d941b045ae3670b09750598217110f0f298a92e4fd577034e,2024-11-21T09:15:27.677000 -CVE-2024-3268,0,0,1d112c6b083f08f14b2d09f93730e342e264f5fe9daadc083bf475de383ff173,2025-02-07T19:09:39 +CVE-2024-3268,0,1,fa062da5a5c790a6c85ad001c3a8b10ed479217119275462adc152f1cd898a91,2025-02-07T19:09:39 CVE-2024-32680,0,0,c7e3bbc2863f1f6c038c97dd7bd24f596f67341b6cc8523b4593e13c3e61f331,2024-11-21T09:15:27.820000 CVE-2024-32681,0,0,476cba4d3d7c527b8043035a88ce8d1329415a651c248f4e6b1c4a0a70da8d5e,2025-02-04T15:39:14.603000 CVE-2024-32682,0,0,dda0b3bf8b170e0ba23d37939705048be89c9fc3b986eb82eaf0cb6655f5bc88,2025-02-04T15:39:56.673000 @@ -258331,7 +258331,7 @@ CVE-2024-32782,0,0,e59ec9a3befbe904f9980d50b1cfa7e2d05d291bedc0f1f498dd5ca465c7b CVE-2024-32783,0,0,2ef660cd30a0ae4fdcb90a66d933542235d529b20d845301bd55b693993df428,2024-11-21T09:15:42.767000 CVE-2024-32784,0,0,14abe73c795ffd3332020a59fca51306d97d3fc775320dde3e49c2d901f2907d,2024-11-21T09:15:42.893000 CVE-2024-32785,0,0,6adc8d8c9cb626668adf06132fb6443a2863e71fb1917fdf4c56efea40690206,2025-01-22T20:26:59.490000 -CVE-2024-32786,0,0,610e891c42d6e580a68ec9f740b2457a69fe6d537e15ff4e5cde38d31a60eb26,2024-11-21T09:15:43.147000 +CVE-2024-32786,0,1,fbb5ff12c29079e119f22511fe1d87e076eea6bf0dcf1f63e231678dca77219d,2024-11-21T09:15:43.147000 CVE-2024-32787,0,0,f31bee818914c8319b33e4c8d2b3dfd92cbdcd1a30641764031401149bd9c46c,2024-11-21T09:15:43.267000 CVE-2024-32788,0,0,46dee0cff203cabca907a85961b57d3c514fb3ea5062d5eec2e98fe5b0dd1d0c,2024-11-21T09:15:43.387000 CVE-2024-32789,0,0,2defdcdd4734555fa465a0c5c0c0c509caa5aa6faa13ca6c19bcf982f4f524bd,2024-11-21T09:15:43.520000 @@ -258386,7 +258386,7 @@ CVE-2024-32833,0,0,2f6b6db4ebf550ab6abc8090dd8e329317573fd251f942534bdd268f93130 CVE-2024-32834,0,0,a227e1ccf0152a47fd85db9549d82fdb8761b715ed85b010cbc316593bbd6e17,2024-11-21T09:15:49.263000 CVE-2024-32835,0,0,05b62705f8fe1947a07363b4e892df8f42409b05042069433afef41ce49f6c53,2024-11-21T09:15:49.390000 CVE-2024-32836,0,0,ea0f93a2bb527667ea20b3ee245821cb666f4877955ddb999c58bdb00d1eda3c,2024-11-21T09:15:49.520000 -CVE-2024-32838,0,0,586d1607072b304ec49d7384b453a752859003bffb7d4fed3feb9dfd720e7763,2025-02-12T18:15:21.633000 +CVE-2024-32838,0,1,3f11d5c2de8e6ed127e9e5924a6214d89bb5fce1b9d0d076b25b54ef7e65d2ba,2025-02-12T18:15:21.633000 CVE-2024-32839,0,0,effbb78e054c1e702b27672f49d98c97e8196be19e4c903bd6639cf8548989eb,2024-11-13T17:35:03.780000 CVE-2024-32840,0,0,f81f56762fcdecdeada25fe978b6c3c4e0defbd18145eaff57266ffe44bdeb6a,2024-09-12T22:35:01.747000 CVE-2024-32841,0,0,cb04c1ed9fc3a164fd94ab42162387504166891d188c1af1c4f36b0577f48202,2024-11-13T17:01:16.850000 @@ -258692,7 +258692,7 @@ CVE-2024-33227,0,0,3fbc4ebf1d23195453495f6c1cce636ed1dc862a1d19c9994ba9b2fd5a19b CVE-2024-33228,0,0,4ff4c4d7ddc1074e5b4192589b22e052d29851c95e677aa6861377786c6cb040,2024-11-21T09:16:40.857000 CVE-2024-3323,0,0,180d6f1e89bef845d0f58006ebd3f1d76afb6eb7e2839fcc43d7d8b2c850159b,2024-11-21T09:29:23.787000 CVE-2024-33231,0,0,a47f041b83b7d6fc91b5ead0a32e9e7a9ac19ef2c483a3b7f9c5a134053085d1,2024-11-19T21:57:32.967000 -CVE-2024-33247,0,0,86d5fc4c17baf232c86cef48761b1572440fa2ff177509394c098dfee3ed40a0,2024-11-21T09:16:41.243000 +CVE-2024-33247,0,1,7948227d684547503284f915805b059ce7f8377dfed905ce4c4e6f7c647f4215,2025-03-06T14:24:40.890000 CVE-2024-3325,0,0,970662992d44c4496bd1cd63501302634c9c4877669706090d08eac5418f123d,2024-11-21T09:29:23.923000 CVE-2024-33250,0,0,4a20a6b53cc0cc2ba2056daf477d4e11c2d3162bfb1bc29c91792fbc22374429,2024-11-21T09:16:41.390000 CVE-2024-33253,0,0,2aa5aaf126e94e2ebb6e7920d3e43400587cc5bab3b143bfc2212ea050136444,2024-11-21T09:16:41.617000 @@ -258798,7 +258798,7 @@ CVE-2024-33443,0,0,14acb5acfda6cddb64998df336cedb58e1d4a32ebf4c410d2784c3e0ba40f CVE-2024-33444,0,0,8a881551cebee46d751f6085313d82dd40602697dfd755b1d1a1bb52d92daac8,2024-11-21T09:16:58.880000 CVE-2024-33445,0,0,d1c5becbdea6861d953d94b436842c0aaca61a7e83a189acb72e6f81097192ab,2024-11-21T09:16:59.093000 CVE-2024-33449,0,0,1b669aecff15eb872ea68246ff39315428a6b194bb949133a07b013352c7f062,2024-11-21T09:16:59.307000 -CVE-2024-3345,0,0,fe0116b5e755ccbaef36b339ac526a935bc14b0b06ada362174416aa25a25ac4,2024-11-21T09:29:25.450000 +CVE-2024-3345,0,1,3d54cec392d8195e579d4b0fb5a3c357983b9e7c55ca4cc462235ef9fd60b9fc,2024-11-21T09:29:25.450000 CVE-2024-33450,0,0,f0ea04c1234b3633871f0e50db2157ebebb8ae8660b3c8a61beb4023703e0cae,2024-11-21T09:16:59.517000 CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c372,2024-10-18T19:35:03.713000 CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000 @@ -258872,11 +258872,11 @@ CVE-2024-33549,0,0,4713a5feb8d21deebf3f7e9db033fd8b76176e435a67d86441a05d24240ed CVE-2024-3355,0,0,20ea787a5898385ccb436211e5551a7f2e031018766b8533a108a09cd1e74af9,2025-02-11T14:49:16.490000 CVE-2024-33550,0,0,41a3880b30ee017fb7b7bf796dd2845a0b2ed606cefe6efabdf2dd1eff6d44ab,2024-11-21T09:17:07.967000 CVE-2024-33551,0,0,60f0dcfbb59856c081de48f30912f9c6ffc1719dc3d8397f0d9d21c96cb03c68,2025-02-21T19:15:41.097000 -CVE-2024-33552,0,0,4e60a598d5493a6d0331b2aa26413e809a8abe8fb2e028f667dcf2dfbe6d3ace,2024-11-21T09:17:08.190000 +CVE-2024-33552,0,1,6117c35d4f188d1abc1275656dd93613ad1f7d3e093d2cfcc3d8622cf522ee84,2025-02-19T15:37:42.137000 CVE-2024-33553,0,0,aaba0c79b98db4a26bffa31140ced3254d42b9b9463caf17336591c46b78ccf0,2025-02-21T19:00:54.013000 CVE-2024-33554,0,0,a8ec7bff1cd6ad5faaf8296a80f2cfac80b5540b1de206a739bb2bdfc753f16a,2025-02-21T19:13:04.657000 CVE-2024-33555,0,0,6f80f9bc2404a51494bae2a82f25c8c74ead7881518cc61d180e98b88475db98,2024-11-21T09:17:08.533000 -CVE-2024-33556,0,0,d090e7a481b40254c1e1d84a49e3e6b4294ed62d8a1642f7a4e77c07029382d4,2024-11-21T09:17:08.683000 +CVE-2024-33556,0,1,d6b6107d4642e8563e6fe108646a9cd5613e5537042326682033746ff8e640a4,2025-02-19T15:38:39.177000 CVE-2024-33557,0,0,a8cba5af0392bea4c8938e94b6abda69a817287781f53a1971ef964386ddf84f,2025-02-26T20:23:31.263000 CVE-2024-33558,0,0,5c3c9c72e5b2451e2576964191f213e9a701a0da02164f092bc6a0e91db45db8,2025-02-21T18:58:47.877000 CVE-2024-33559,0,0,61adae8a090bd00a6937d8df7fa0d4974682800beec0f9609a7943b4d15394ba,2024-11-21T09:17:09.073000 @@ -258931,7 +258931,7 @@ CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79 CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000 CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000 CVE-2024-33605,0,0,a9cb4d5208af41cc5de9c408ee33e9c45cb9579d6429771105b2c468d7015554,2024-11-26T11:21:59.607000 -CVE-2024-33606,0,0,c985890681f8312f6c331286b5111bbcc05a42ee6b6581bcfd52ca7b79c45dc5,2025-03-01T01:48:32.590000 +CVE-2024-33606,0,1,7b7e490f84afef9fed700093cd8f33b74b09ba59b48a8f12c201a691810f686c,2025-03-01T01:48:32.590000 CVE-2024-33608,0,0,6b6e30ce1fedf01732e282330bf545e2f74a5077f949ecc9582f9d87f8dadf71,2024-11-21T09:17:14.893000 CVE-2024-3361,0,0,e51846f4fe680f8df41e14747a4807911c8fac068c47bd5e2b76eccb8d822d18,2025-02-10T23:11:50.223000 CVE-2024-33610,0,0,d559843ab86fe84848331c81e0bccb00eec583cdd8c349293cb7cb385684e94f,2024-11-26T08:15:05.810000 @@ -258940,7 +258940,7 @@ CVE-2024-33612,0,0,6c873bcc0c3bfbf7d886e64f30fdd4c53eb34d48f747397f5259bffa174b2 CVE-2024-33615,0,0,b0077641ba27b9f232ccc1928ba76be8582878949d0230dd977055112bfb6d07,2024-11-21T09:17:15.217000 CVE-2024-33616,0,0,b2c1e64cf451f906f0bc4bead91b511950fec536d39d5a34a17b142a6a1901e1,2024-12-10T16:15:23.160000 CVE-2024-33617,0,0,1e71f02faf23a708ef37c4cd0bfba6875a8643a968de9537679ddd14c247d0b1,2024-11-15T14:00:09.720000 -CVE-2024-33619,0,0,38565969e147be46af02d2df1bf7fa2e77d89a7a4803abe06afa09dded18b21f,2024-11-21T09:17:15.430000 +CVE-2024-33619,0,1,ec37b8be8b1ba1f1bc1ed1d20f13bf170f971b0de4b9e92eda06e1dc671148c9,2024-11-21T09:17:15.430000 CVE-2024-3362,0,0,8d22c4416ddefe0a10f6ea56b781d08c3d7373ddeeb7132ed8d3ceb58af5b419,2025-02-10T23:12:23.217000 CVE-2024-33620,0,0,992ad05cd66d5015e97a55a4d9dc858d4fa9bb3b818f3032c52d7b69f766c2df,2024-11-21T09:17:15.550000 CVE-2024-33621,0,0,da4e351d8bc8ea1f19bba428f20f5a1f07f43ca738d7c13849e37502e0f378be,2024-11-21T09:17:15.767000 @@ -259460,7 +259460,7 @@ CVE-2024-3431,0,0,bb0f9fee675ed2a26cd668610400c1b77161a57f06978cd64464c171e1536a CVE-2024-34310,0,0,82972b4a7271d7f072b904c774870b602afbf4962a5b24f811801ca0d72ef255,2024-11-21T09:18:25.067000 CVE-2024-34312,0,0,f09c25d3b09f6763e1739e71c548e7835a8b28389ef678f844ea6b574e9e00b9,2024-11-21T09:18:25.300000 CVE-2024-34313,0,0,b5500e4fe963557a3d43ad6825a0f75aebadcab488a2fa7d1b2936aa1c688978,2024-11-21T09:18:25.543000 -CVE-2024-34314,0,0,1e0fb558fe0addbcf4369c6184355b988af53e2d8e6ee4d29b36d859416c1313,2024-11-21T09:18:25.763000 +CVE-2024-34314,0,1,d04d2d8c51b9dfd8be6ddbd8bb0f7ec14ebb553ccbffc40a5eee15a9c45ab7fc,2025-03-06T14:24:40.890000 CVE-2024-34315,0,0,d6567e55b3e23401f0a9237df9526520fb9dce0f81214e7f7aed0529835acfab,2024-11-21T09:18:25.930000 CVE-2024-3432,0,0,2140dfaca241723443a0ece3f45fc71a47abb74b3f0db4742cb68eb380ad14d3,2024-11-21T09:29:35.637000 CVE-2024-34329,0,0,dab46656fd4d7e3b9c16c88e4aae0c6e9707be1b1e9635983fbf66552c299a16,2025-02-06T21:15:21.130000 @@ -259508,7 +259508,7 @@ CVE-2024-34370,0,0,3a2819603ce351747c3cc9df2f920cb8c37a163dfe688fbde1aba91f59b58 CVE-2024-34371,0,0,e846a2fe676040566f4e6efa50b35269655bad9983cf7c77a9c9788717f4eaee,2024-11-21T09:18:31.803000 CVE-2024-34372,0,0,6e08f9389cdc780953f7d11dfd76b886412e9c780b4d6714a57a67ed1541b47a,2024-11-21T09:18:31.923000 CVE-2024-34373,0,0,9a3853e05633db0457c23a26560ddf3c076d45e1bd24a34d6a00a0c54d2bec35,2025-01-29T16:41:21.897000 -CVE-2024-34374,0,0,a527a1d2996d1e2f0a995148ce15f3a2815570a5f249ae10c11b53749e5c2744,2024-11-21T09:18:32.177000 +CVE-2024-34374,0,1,7f2ce8a4b943ea86ab9d7e42d6f6eac4ed862edb11444f4522150eb825ad7929,2024-11-21T09:18:32.177000 CVE-2024-34375,0,0,42c642f287ca3e9930a3cfbb84eebb7ed663620473f6ae9bd8aeebdfbf7f742f,2024-11-21T09:18:32.293000 CVE-2024-34376,0,0,be096431336d572ee1902ef44d862b693396a16053ee69d5a1dee92f13e9dea6,2024-11-21T09:18:32.413000 CVE-2024-34377,0,0,0b60ceffc42897e0aa8d4a14f9f5ce05e55ff379f191206470a136664ca9465b,2024-11-21T09:18:32.533000 @@ -259568,10 +259568,10 @@ CVE-2024-34430,0,0,cb8e123ee870d0ae89dcb364b82927e6d901e132d937011b7ad6ee7e86ab2 CVE-2024-34431,0,0,66ab1d2dd8d93fb7cee43d9211bad6e473354e479eb13f9021fbfc509b3bf56d,2024-11-21T09:18:39.577000 CVE-2024-34432,0,0,0da8b72924f5d0664d8341e47be0bd240687d257d29506f56b1c3527ae64a42a,2025-03-06T14:25:09.843000 CVE-2024-34433,0,0,d7e888513ff0c09afdacd9ea2e3a72da4e6d670d8ed55cb7f7dbd78948a08387,2024-11-21T09:18:39.817000 -CVE-2024-34434,0,0,24065908aeeb0e3598cd5b17cbecb828decf9d2c1fb786080b8992ae95e57f54,2024-11-21T09:18:39.933000 +CVE-2024-34434,0,1,c51f02aec2e8242cda715bf264797a9b5f102cc1ef98faf8abf213502f8a09a9,2025-03-05T18:25:53.837000 CVE-2024-34435,0,0,71a1145b72cc4faa12fd4b02c097c9bcc91a4d5d67f8bf5c43e35bc8c1193b38,2024-11-26T15:29:59.840000 -CVE-2024-34436,0,0,a7b5b61bf80e32f834e45bc03a212c4991b46e83bba2c93a6fbce930b2c44c3c,2024-11-21T09:18:40.170000 -CVE-2024-34437,0,0,d8b40307bf4a1a1fd6751eb517538a978d5459a832a3128af1eac5adee095f2e,2024-11-21T09:18:40.290000 +CVE-2024-34436,0,1,49421a00410490fe24c1c69b8d3634f5b63f7861b0a7662337bce26d32c5414a,2025-03-07T11:54:06.967000 +CVE-2024-34437,0,1,a56540674e97768220b90736716998d7f95033fa1da907d196ebd9177f032f2f,2024-11-21T09:18:40.290000 CVE-2024-34439,0,0,8bf72eb97a6e69b453f23e87ee82ca6fc9532df8484fd5cd256dac500553c8d3,2024-11-21T09:18:40.420000 CVE-2024-3444,0,0,79f2ebb769a6827995b9d43382e26cc0bd732a05010677443f7fecc2eea6ca58,2024-11-21T09:29:37.283000 CVE-2024-34440,0,0,00e20bed1894b0afbfe028805538736912982481dfb0df074c164fde14bf982a,2024-11-21T09:18:40.547000 @@ -259579,7 +259579,7 @@ CVE-2024-34441,0,0,94dd88853e360a016ad326ff62dd661681f00298f624f5a76e447eaaa34f7 CVE-2024-34442,0,0,680b440b68d835b7324c128d859cd0968079735129e45f69d0499f7a8e852b7f,2024-11-21T09:18:40.777000 CVE-2024-34443,0,0,5b9baa6cec14c8026b07e62429cfda558b9dc0d4a87372176248e3e0814e9156,2024-11-21T09:18:40.900000 CVE-2024-34444,0,0,cc355ac27b16de5a6fcd556e1c85c97b239311f2ddd889289393e1d51bb6bc11,2024-11-21T09:18:41.050000 -CVE-2024-34445,0,0,4a0a011358396f8cc9f41db3e7974ae12249f88b066cacc487733268c7c72137,2024-11-21T09:18:41.193000 +CVE-2024-34445,0,1,d06e0fd4b52f67d5e408f9b156aee4fa7ed90bbff958571b6a12fdc3d5ce9839,2025-03-07T11:54:06.967000 CVE-2024-34446,0,0,5cac8b3c02517797194e9908657ec718d8fa3cf52cee0d279404b32b8419138c,2024-11-21T09:18:41.320000 CVE-2024-34447,0,0,6fad62f8e404336575fc5f7b5de6337fae8ff1610f49277f92c483c228065a2f,2024-11-21T09:18:41.543000 CVE-2024-34448,0,0,a63e9b8a89308818ad1b8e31075a67350d1a77473d68ddf936398fbf4ac2458d,2024-11-21T09:18:41.693000 @@ -259682,7 +259682,7 @@ CVE-2024-34567,0,0,2ab276be8a7d5ba54eff2226d21311c587c26eddbddaace14bc714e7d0243 CVE-2024-34568,0,0,e2a99021dbe034875bba53eef3b45ca37b51ca7526699e547fd5d14e77646bbc,2024-11-21T09:18:57.270000 CVE-2024-34569,0,0,cd8352582a68c7f60aec609b227b4580a06f5f85d280b7f4cd9eabb100d8aa73,2024-11-21T09:18:57.397000 CVE-2024-3457,0,0,c1377f6fbed834cde544f5adb1d6d1ebbd2571e7bab310a97c32643fa2e45ea8,2025-02-06T19:06:55.503000 -CVE-2024-34570,0,0,72ec41046fadce288923d6af421f065b956d18b06befcc315d2ec19a3c08a093,2024-11-21T09:18:57.520000 +CVE-2024-34570,0,1,14ef56a3c7b3c7958a5db850b29493ff7e7107f4c4bd41f4e6d3dd5126309256,2025-03-07T11:54:06.967000 CVE-2024-34571,0,0,5e9d9d242360c55f4c2a8c468ad669f3fc59cd02309a2ba9dae0eb9a6df020d8,2024-11-21T09:18:57.647000 CVE-2024-34572,0,0,873a14a5585dd6d89b1175c9cc14374ba21a587bd64e8d5e5b9debcd1ec306eb,2024-11-21T09:18:57.783000 CVE-2024-34573,0,0,ecf15fea9a46b1a7d769a0ae7e7a48e67613b9ca12f88eba450bd43ab08c4060,2024-11-21T09:18:57.967000 @@ -259886,7 +259886,7 @@ CVE-2024-34763,0,0,0d80d7f7318db383240d0ca2520e8f640be6fb2daf44f5aee5867163b4329 CVE-2024-34764,0,0,8ed24a25e06be71a2f011dff23b0d1c675730a25db5f3628955ebb1f46586842,2025-03-01T01:48:32.590000 CVE-2024-34765,0,0,0fe28b853214ac86964f27e06ac988e0205aacfd902bc4f28493e9f29a81459a,2024-11-21T09:19:21.400000 CVE-2024-34766,0,0,7fb82163863c0fd507cf095c51d5bd60fa8b2cfb5ec715ae651e1c65b8895d95,2024-11-21T09:19:21.533000 -CVE-2024-34767,0,0,81984f9cfabd647e2c7d21c906a68371c793ee214b8be1c36601906841b8b5bc,2024-11-21T09:19:21.657000 +CVE-2024-34767,0,1,ff6eeca108c848aa19a7251b78da22a8a71a3b20613ae3f7b1424c65dcf69a88,2024-11-21T09:19:21.657000 CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a160,2024-11-21T09:19:21.793000 CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000 CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000 @@ -259913,8 +259913,8 @@ CVE-2024-34790,0,0,daf003cc511e58c78361f2aae09d18742f71fd104c7d5d17bde7526bdacaa CVE-2024-34791,0,0,acb5c5c6e688959a11192c73142f81d47643c10b5b4e9f9ec51215254ab6633a,2025-02-26T20:23:31.263000 CVE-2024-34792,0,0,cab5b4c263b753eef62110fa6933306f82754c6f59a5022337e0b31aff177356,2024-11-21T09:19:24.460000 CVE-2024-34793,0,0,82e328c811b4d9a29d09146482906fd413ea82e9e6a0f6be24b3e4e33ed8698b,2024-11-21T09:19:24.603000 -CVE-2024-34794,0,0,6740520c8faf9763a03b0ffee37958368694cc20217881a1a098ae826e064df1,2024-11-21T09:19:24.730000 -CVE-2024-34795,0,0,1c4581b457748c2310ee0a65286e23e8a90ce0b0675fddab88c677ab0c342b61,2024-11-21T09:19:24.860000 +CVE-2024-34794,0,1,bcd62bcf70a27ff9f43759745016f9b6ae1a1b01416db2de74ee227c771ab15e,2025-03-07T11:54:06.967000 +CVE-2024-34795,0,1,684a1f0731b4d75e866e9d9f75dbc66d668e08010a31806704616f9d7ca8a340,2025-03-07T11:54:06.967000 CVE-2024-34796,0,0,adf77aa5ae0b05b743ffb54f6e8071cbc89938c22f10224c355d78ba52b91d39,2024-11-21T09:19:24.990000 CVE-2024-34797,0,0,6f530aafb0c79dc6e1942bac34aca54d202e7a50e42a13f1b4f171aef5c26c91,2024-11-21T09:19:25.120000 CVE-2024-34798,0,0,d31a3d4fd1229237b83c5c7aa24a3b9da19c0978a5ec908f9d14385769b6cc2c,2024-11-21T09:19:25.243000 @@ -260129,7 +260129,7 @@ CVE-2024-35185,0,0,74543feb74f9edc51386452d9161cac7ec5082e5d8ad573c944b3084e72d7 CVE-2024-35186,0,0,582e2f63f29a2c696b9108aad2d3aa7f63c677a1f9512c8476ae9128754011af,2024-11-21T09:19:53.587000 CVE-2024-35187,0,0,c93ff33135b209dfd379be10d77c667bf008bb9dbbc23a027bc119bacc7bc527,2024-11-21T09:19:53.717000 CVE-2024-35189,0,0,a3a734b5211523d61782bf46c6c563e384cbec4bc625bcfc7d9d293004503b2d,2024-11-21T09:19:53.847000 -CVE-2024-3519,0,0,5feb191d43983046680fbad9a88494df61bc266ef0d1ed18fe9f58dbe600fd4c,2025-02-07T17:56:35.597000 +CVE-2024-3519,0,1,233904464c97d419e6124c1e13b1394fb8501504b2fcd60dce5eb0620bc9fbec,2025-02-07T17:56:35.597000 CVE-2024-35190,0,0,93d9c2a866120aebc73f9294edc7d9ed21a3349f36c6fc6c0ac6470d3a429b84,2024-11-21T09:19:53.977000 CVE-2024-35191,0,0,5afc8c8d75c869b5979f88befec9d8717f40b2efaeb0bde3abd570f35d4948e9,2024-11-21T09:19:54.113000 CVE-2024-35192,0,0,4374d19a44421f2efd4885a558d4b7bd3f6e1e5b93d376ec2eb46e7e72a793d4,2024-11-21T09:19:54.243000 @@ -260404,7 +260404,7 @@ CVE-2024-35618,0,0,86fcbce4eb035f60808d5accf542869518cdd99394694db30f159b5f58d7d CVE-2024-3562,0,0,9c9f57c5460d61dfdd495d1b087a7861097e9d1e1b57cf14e2455042c8f7bd8b,2024-11-21T09:29:52.887000 CVE-2024-35621,0,0,ad44c3c072185b808b9e3b43fa899b631425ca6e10a0bc86cb86f1f74c43566a,2024-11-21T09:20:31.603000 CVE-2024-35627,0,0,ccde48a8bacc26f12c1c71247e00206b1167454eafcdd659b3ddf4fc995347d2,2024-11-21T09:20:31.750000 -CVE-2024-35628,0,0,0b6a1429a1dd8c390e9d784015fdbc2e1e67e8a94ef9e7c0c9fef87f2dcbeb71,2024-11-21T09:20:31.973000 +CVE-2024-35628,0,1,783915c31410f15185dbf33288dfd250a9bd8e8d8cd0af8b0fae17e30714c2d8,2024-11-21T09:20:31.973000 CVE-2024-35629,0,0,3004ba6ddd8df1e24a17fbe69a4ebfbee22dcab2dd7d88ef93d3205f1cfc727e,2024-11-21T09:20:32.113000 CVE-2024-3563,0,0,adbe59bd1d49de614b2ea4a992cfe827d7a619deaf1bf1464db4b2b89b108b34,2024-11-21T09:29:53.017000 CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000 @@ -260417,7 +260417,7 @@ CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615 CVE-2024-35637,0,0,9cb867c19f8006ef50e305ac0fcabaed89e8159eb2e4ffdf558c884c5c38b50c,2024-11-21T09:20:33.200000 CVE-2024-35638,0,0,e61de469a2786f9aa846ec4370d46e98924aa27b0a12eb528a1d8281826602ca,2024-11-21T09:20:33.323000 CVE-2024-35639,0,0,c1c3140f21137b15d0050023371e3efdce6f35ca6c3876825bc93d445a0b36fc,2024-11-21T09:20:33.450000 -CVE-2024-3564,0,0,fd59b89021e15ee9414091cc8b4de96e2264c0a1353eefbaaee97f0b2388d683,2025-02-19T16:09:31.300000 +CVE-2024-3564,0,1,3b833294ab999e99d57c2e86190b8e4c7cbfad05846f31bec92407b4cfae2ccb,2025-02-19T16:09:31.300000 CVE-2024-35640,0,0,0c90864f477ffe1ba66b00c51a04a27e372eff6a6b02cf6a105a750de1d0b8c1,2024-11-21T09:20:33.573000 CVE-2024-35641,0,0,3457fedc6b80777ce0968e010e69f9bd148c14d13719b302b790f3f8bd620832,2024-11-21T09:20:33.703000 CVE-2024-35642,0,0,c576a129dcdb2fd620b58c13cdcd6fc75c73e48dbf4cf648db0b11b0174d6781,2024-11-21T09:20:33.840000 @@ -260575,12 +260575,12 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312 CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000 CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000 CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000 -CVE-2024-35788,0,0,6fcf7b07d4069da9e5a81b8a32ba338b777e6c81b0cbed2bd247c936a4b8d653,2024-11-21T09:20:53.850000 +CVE-2024-35788,0,1,70fcbf86ab4559fb8bb2dfebf904002ccb8975123075a128f2b0a5f726b90193,2024-11-21T09:20:53.850000 CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000 CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000 -CVE-2024-35790,0,0,2df7f077aa925e7e77fd13e0ef93ace5e40da074e36864425d345579ed5f8764,2024-11-21T09:20:54.130000 +CVE-2024-35790,0,1,7d476249a15f8b3346ce9d3c8a752ba04f8dea8aa361030e384c1348152b3b79,2024-11-21T09:20:54.130000 CVE-2024-35791,0,0,85ead07022ef53c0e6f72e9e777d81e8d0ca2cd9792e2767bce0619269c60a40,2024-11-21T09:20:54.250000 -CVE-2024-35792,0,0,dba337d6b35c3694f860a10d1f0b0ab76d60e05e47669a7431ff24b72e452ff4,2024-11-21T09:20:54.380000 +CVE-2024-35792,0,1,21a5187a823fa4fdf38a562b67febd54aa36570876f9f99be7616d9ae38566a1,2024-11-21T09:20:54.380000 CVE-2024-35793,0,0,82ce6b2ac6f53564ddc7616294ad0293384da143f7096dd15ac59cf347e0a71d,2024-11-21T09:20:54.497000 CVE-2024-35794,0,0,2695b1155d89b898f0ed900892410ad905a678f0494cc5e70db52ca5ba102d79,2024-11-21T09:20:54.610000 CVE-2024-35795,0,0,c09e8fe8fee80ead4e3ba2b3693ee3cb2a70789311f668469221ad4e3410478d,2025-01-10T18:10:58.830000 @@ -260678,7 +260678,7 @@ CVE-2024-35879,0,0,fdee953ecf40921e3811620694ea222c4b446f467dc68b15424fdaa22fd09 CVE-2024-3588,0,0,afcab9d939a7e356f73b35985bb8be3dedc5f026f6190181395c275228352f4e,2025-02-04T17:35:07.437000 CVE-2024-35880,0,0,0a8170c333bf0261ae5c11c5ca251ddcbdefcd4ec60fc42a1fc39d0b77cf4726,2024-11-21T09:21:07.003000 CVE-2024-35881,0,0,18e9986624075074b5c849b71ec06ec755a0f3690c4e0f6ce9952cc43be815f1,2024-05-23T14:15:09.927000 -CVE-2024-35882,0,0,6c5b8097dfcdcbb585b2558f9823af5706f8ac3b0feecc46db4415440a8bd951,2024-11-21T09:21:07.143000 +CVE-2024-35882,0,1,c0458dc396951585e3f69bf220babb6df55a2be169a4976a21696e14ae4bc537,2024-11-21T09:21:07.143000 CVE-2024-35883,0,0,a2b640dcae8368f24ce720903948a3e556cd46de40ac218e93d27b39b31c98c6,2025-01-07T17:03:52.937000 CVE-2024-35884,0,0,64236ae9f1f6f6d7559964b4f8856712ac0636f40624bb99449f1adf1f5aae28,2024-11-21T09:21:07.377000 CVE-2024-35885,0,0,f5e4768226d469c9d1acb28dd4e1322cafbbc00c23365add839680801c3e93d4,2025-02-03T16:23:46.157000 @@ -260719,7 +260719,7 @@ CVE-2024-35917,0,0,eab93a0817c66f8a05ad2445d597c153a9b9d84611133e2a6e712f3292d1b CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000 CVE-2024-35919,0,0,e631246407300ae6e30d83cedcbee4935288a2744219786e10d196588f3f5df9,2024-11-21T09:21:12.250000 CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000 -CVE-2024-35920,0,0,bd778258ee3414e44b7379ddcd05833a3cf9206c0741679c62183878cdb5af6b,2024-11-21T09:21:12.443000 +CVE-2024-35920,0,1,197bce138eb4f9c8cdec38976bd1b258f875e28d4ec57c2ef0cf8a3014c46a68,2024-11-21T09:21:12.443000 CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 CVE-2024-35922,0,0,0c88e554ffaa341ceefcaf9be80ad5df621b046da9f94425d0c621a8e53f1e17,2024-12-30T19:27:42.720000 CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243aae4,2024-05-25T14:15:53.013000 @@ -260756,7 +260756,7 @@ CVE-2024-35950,0,0,ef079ede60c6c9326dca631d7f2fe485843c48efdf1d2a19a2dc54ee92113 CVE-2024-35951,0,0,2d5b5c467639e009ede1e6990ff54fde09b903b47b307d1450eac9b52b502da0,2024-11-21T09:21:16.630000 CVE-2024-35952,0,0,7e1230de99cd6e0ef4828e0aa17edf69431e43a75171aae4948881ed93086ebc,2024-11-21T09:21:16.750000 CVE-2024-35953,0,0,33abfe23421b351d0515548ec4d13b459eb151d37ce4da44fa67c72a29b72a04,2025-01-10T18:11:53.623000 -CVE-2024-35954,0,0,d2f876eb1b232ad5a20b6a855b32664b4b95a48fdca02d6aaab769ea48a63d7b,2024-11-21T09:21:17.040000 +CVE-2024-35954,0,1,0691b68f3102bfdd1b709e8c0e297890a3a5b64e6431d091587d63d303a20e9c,2024-11-21T09:21:17.040000 CVE-2024-35955,0,0,a36653f079fd989d828114c6d83b33634cfe8d6b0b740acb4cbd1772577609cf,2024-11-21T09:21:17.163000 CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f402,2024-12-14T21:15:18.477000 CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 @@ -260854,8 +260854,8 @@ CVE-2024-3604,0,0,0c726ac283946631d580b3ea047d73595adcfa6f29e4d6dd86387d266f76d4 CVE-2024-36041,0,0,4161ec03e4910e4c5c5920c414e1b3c98759b0d09bfd41e398f897b3d9dafc1c,2024-11-21T09:21:29.970000 CVE-2024-36042,0,0,dd61539a28198f3c8b42fd4591e0a6d17418212950f931fea78e92fd4e6935c4,2024-11-21T09:21:30.217000 CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000 -CVE-2024-36046,0,0,e0f89ab571addd6ccc0a13c28f0987d8d3a2bdf98f6b75fa4bcb1f70cd9694d0,2025-02-28T16:15:36.987000 -CVE-2024-36047,0,0,7e66dce3cf964e4f7a2d27e530fbb169401596667aecd9fd25058c0304521c6a,2025-02-28T16:15:37.137000 +CVE-2024-36046,0,1,0fa03cd99225281d3b3da75940c9e0b26805f2fcbac2af51496886199c1c47eb,2025-02-28T16:15:36.987000 +CVE-2024-36047,0,1,405820301fc8728151fab34ee26e9b80f18144974462026f6070016677f00776,2025-02-28T16:15:37.137000 CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000 CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000 CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000 @@ -260867,7 +260867,7 @@ CVE-2024-36054,0,0,f5357283184be4e58578e4e2328d047a8090238de7d70e805146273a9b828 CVE-2024-36055,0,0,292c3365bcacc2e3be2eb421a9d93b55b213be97c64e16019316602853bea166,2024-11-21T09:21:32.070000 CVE-2024-36056,0,0,a93a070ab87f57bcca026fb0b8f5772540e0549914e25a04da93fd27b0d9e655,2024-11-21T09:21:32.323000 CVE-2024-36059,0,0,3628efd57b1c7180707832a28485ee02f39f18e2c0552379ab54e8d43fbd0949,2024-11-21T09:21:32.573000 -CVE-2024-3606,0,0,1449706e62499cb330e9b1c5e6af39c3a48cfb753137815519e4c675b6217de9,2025-02-10T22:32:03.097000 +CVE-2024-3606,0,1,eedce53fb0e4f686f8b69228bbfae271b902d4684564e4d7968d4072f0ee6eaf,2025-02-10T22:32:03.097000 CVE-2024-36060,0,0,4c24128c97285dc9fe066e594d08b426886037cf3d33dec8f235d1fb10804891,2024-11-01T12:57:03.417000 CVE-2024-36061,0,0,27bd63bff8ebde50140c0fa5d9ad26fdd6fc5e7519faefba90aed2cfaa28c698,2024-11-12T17:35:07.450000 CVE-2024-36062,0,0,ca9ad1f8e31d666f37c5b50f0c731c1064e37af4c3a25388bc3a03476bcbde3d,2025-02-10T23:15:13.997000 @@ -260875,7 +260875,7 @@ CVE-2024-36063,0,0,b555cdf21e833840dd5658762df7410f96bf0766a40aec06c5f546c59823a CVE-2024-36064,0,0,bf7fd7b62e5a2fb95726ce7f1fb0026147c4b4a98515c74584e43c847c060816,2024-11-08T19:01:03.880000 CVE-2024-36066,0,0,eec90dfaef3a99ce0aa55a95636152d4fac09f53c1f5286af6eb5dd53561851e,2024-09-18T20:28:50.313000 CVE-2024-36068,0,0,3211c8cc1108b1cf5b554d20b9dbe1f13ba680cf18e634d0fe313e9859fb99b9,2024-09-05T20:27:19.640000 -CVE-2024-3607,0,0,480f0f28a6e157751d72ec46dd5eb84781e70fb3ce1c5ebffb6ab52f7efb3a66,2025-02-04T17:08:57.963000 +CVE-2024-3607,0,1,00eb3c93b2fe5b13cd3942958d1958984c5adf3d72430ebdb6e53915b9d11912,2025-02-04T17:08:57.963000 CVE-2024-36070,0,0,642e9c532620d6f665f08ce33cd9846f4b6246c6ae380744cc0df52be65b1743,2024-11-21T09:21:34.190000 CVE-2024-36071,0,0,9bafe84344bc2dc3777eaac1da2edb455c4ed81c1214ef6ff4b2f701c81200fe,2024-11-21T09:21:34.343000 CVE-2024-36072,0,0,b687cc556ab9d8f308c2ebf6b85e107f2750960f2795256e2a9bb1e7bda4077a,2024-11-21T09:21:34.530000 @@ -260906,16 +260906,16 @@ CVE-2024-36112,0,0,3bf7612d2d3162e12e05109be333fff4c206dc8bc4102f5c7c4f497db0f6c CVE-2024-36113,0,0,91f79a2108627898b62653f92e791963a7806ac8d8456e485660dd0b0eba86b1,2024-11-21T09:21:38.790000 CVE-2024-36114,0,0,5938d8d4edf93cf4d7909365be68ad735ccb27c9fe06de9cd0ac2a4c60796c8d,2024-11-21T09:21:38.970000 CVE-2024-36115,0,0,f523598c780fcbcc268e0307393c9f416f0099b6290d4e94756422d6cf43d87d,2024-11-21T09:21:39.107000 -CVE-2024-36116,0,0,b134622813301eb1b198a71ba139e1f628463ddb5a0536fe6fcacfccfa8f3a57,2024-11-21T09:21:39.247000 -CVE-2024-36117,0,0,c4ba5820d02d17ec7a8e16edbbbe7e8da10abc26e1e9eaa701e20596f4fde295,2024-11-21T09:21:39.390000 -CVE-2024-36118,0,0,d00900f1b9d13dc02614cf3d136a3a9522689debd12f5e749a737cf998511f51,2024-11-21T09:21:39.527000 +CVE-2024-36116,0,1,68dcf86b944059e4a605660ac0de86e23e8d3eedfa29317812db9e87b82dec91,2025-03-06T14:24:40.890000 +CVE-2024-36117,0,1,6adf58db8c6dc981612c9f18ae13f44a30420d340b240d62798ed3df5e6bb9b4,2025-03-06T14:24:40.890000 +CVE-2024-36118,0,1,8dca4d59196d8ff9af70ba740eacf223174d5485a8acbd2507bb0b719fe1c2c3,2025-03-06T14:24:40.890000 CVE-2024-36119,0,0,2a7933702e1ef327a50e3a5ca4d6124a1ea49357c49a13e3c36aef3511847f4f,2024-11-21T09:21:39.660000 CVE-2024-3612,0,0,92149e2dcffeca0078024a872fe02b35e11d7543d3168929a05ec6ad10bb0956,2025-02-18T17:46:18.770000 -CVE-2024-36120,0,0,fa958d04506ea31ab246612d2c6cb998a0ce9b2129b0e9ee3fb01a71db94846a,2024-11-21T09:21:39.810000 +CVE-2024-36120,0,1,d1367aa7073f38d347bd3d5473b8b4d9e883ec026cee9cd680dbe1d1b91901c6,2025-03-06T14:24:40.890000 CVE-2024-36121,0,0,ea5bca8e895d35d44db7855d1c126aa065d33ef7972857b1e702a1fb865283d8,2024-11-21T09:21:39.927000 CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139743,2024-11-21T09:21:40.070000 CVE-2024-36123,0,0,0becb813a926c1d3e70b86ff69319c608716e319069fda50086d3ab40b86a049,2024-11-21T09:21:40.213000 -CVE-2024-36124,0,0,792823f3ae7df4923d4487ee48c30bfee324d7872ac8bd607bb2215865697acf,2024-11-21T09:21:40.357000 +CVE-2024-36124,0,1,9b8d147283d2381fc4392838f1b0ccb6b3b56668ae7dee9ff56615430661fafa,2025-03-06T14:24:40.890000 CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000 CVE-2024-36128,0,0,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000 CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000 @@ -261101,7 +261101,7 @@ CVE-2024-3632,0,0,119403a424687bcfc6e7f9b6ed0b72a6392ff6135bcf171b98aba3696d4839 CVE-2024-3633,0,0,dbe24389bbbd4529b7f9091dcdd1cc4e50034e3cae1ae255b02e49488151e4ae,2024-11-21T09:30:02.327000 CVE-2024-3634,0,0,3383030fed20fc028b4b4484c7a11fba64d2ea257fb986bc506941077c30f176,2024-11-21T09:30:02.520000 CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5b8,2024-10-02T14:30:24.627000 -CVE-2024-36353,0,0,ade3955585b2e2df19175e76e2c957adddbd0f7fc9adfe05514ac8465db87674,2025-03-02T18:15:34.033000 +CVE-2024-36353,0,1,caf07d2a6c34feb51886f1ce6edb50e9937e103b379c80565763a756df3ec242,2025-03-02T18:15:34.033000 CVE-2024-36358,0,0,d02ad1b74b8c432827349c8f1ff39b47bfcc0cce31a5ed55b7cbdf51520b6cba,2024-11-21T09:22:00.920000 CVE-2024-36359,0,0,3cc0d651469873089668811614995b932e2a134931c52e95469939b03a9b9e74,2024-11-21T09:22:01.040000 CVE-2024-3636,0,0,4c7744b51293bd4e3a9aa3d916a63e7f32e699b3ac0ad0263818bae7fdeef663,2024-08-07T16:35:14.110000 @@ -261129,12 +261129,12 @@ CVE-2024-3638,0,0,a0e603bd5eafd59fbf4eda4332a70f4ff465bab094cf08cc0dfa6cf90aa9b0 CVE-2024-36383,0,0,dfdcebb9c4ed54272ace1d77d7b46f1144dff670c388870465409c92e750dde7,2024-11-21T09:22:03.837000 CVE-2024-36384,0,0,f4773f7602bde7ffb495e2fd0dc61ac13b6a017a351ab9847eb4b0f4191cb10a,2024-11-21T09:22:04.047000 CVE-2024-36387,0,0,cdb9f9c6e4f44e520b8a3f1244c0462cddbb4983a3da124e2c5e7faf4bb4d88f,2024-11-25T18:15:12.440000 -CVE-2024-36388,0,0,0c0989025ad32f17b7d068d4980b3b599fc5e11dde90ef804d636745dacc3be5,2024-11-21T09:22:04.483000 -CVE-2024-36389,0,0,2b33ea84699730379d371444d5b626a5f017cd43b392f926eaf35f619b9fefbc,2024-11-21T09:22:04.653000 +CVE-2024-36388,0,1,dca4a42592f4ea491fa45a1a01638b9052593fe78a0336bc781e46d713ce9788,2024-11-21T09:22:04.483000 +CVE-2024-36389,0,1,b623afc3446b95886354e8aaa4762fbf4c6a5873e2c75b207e449eb25e66879f,2024-11-21T09:22:04.653000 CVE-2024-3639,0,0,d199c27729d2cc3d067b398c1ad8ba1ae7ecdef93cc1489a574291968613cfd3,2024-11-21T09:30:03.413000 -CVE-2024-36390,0,0,8bfe0440881effec6e81c8472eacf53f93bf10fd44deaf720129b9fb32579570,2024-11-21T09:22:04.793000 -CVE-2024-36391,0,0,9f3fca54062b19bc8a5d85590f201feff7c59a98c6d682ea93fbb7be47f680e4,2024-11-21T09:22:04.910000 -CVE-2024-36392,0,0,e1238d26d2f66afc8565bd11f0c4a7e2f69b8d0992645f18a0a0fe7a5aa591c0,2024-11-21T09:22:05.047000 +CVE-2024-36390,0,1,5c9732c34bc15ac2acf064e8e72c8163da5b97cdea4c3c9cc6f391c4817fa39d,2024-11-21T09:22:04.793000 +CVE-2024-36391,0,1,413db0cfdb059fae35d0d2fbfb94bca11854b2716a97f0b9e981d3792f8cc703,2024-11-21T09:22:04.910000 +CVE-2024-36392,0,1,7b9f0d0620d62fb9ac78128dafa05295a180139c0bcdd212bd4e60b9eb6317b2,2024-11-21T09:22:05.047000 CVE-2024-36393,0,0,e6de8af8cf8dbe1c44c586f962e380cbe78bb0f59190258f9558a507012777e4,2024-11-21T09:22:05.170000 CVE-2024-36394,0,0,c4ccca993bf22180a1fe205e3a581776542b59f38d1277909ecc3c5fbaa42e71,2024-11-21T09:22:05.317000 CVE-2024-36395,0,0,d374474d45e1b64af957fb88700ec3f9271d680dbb6eff3e01cd74edfa03a8db,2024-11-21T09:22:05.450000 @@ -261437,7 +261437,7 @@ CVE-2024-3688,0,0,052feb44b8d1ec6863ef819b37585d4a5f02c3beff5aab7ac941103dd33698 CVE-2024-36880,0,0,21e36154778b1ce12ab1b71a171762d6872bbf86719de9c0dac19baad09c9e91,2024-11-21T09:22:43.190000 CVE-2024-36881,0,0,865b117aacccbfe6f687a7a3084b4b43e2681e536659c100c63b5a33a10278d0,2024-11-21T09:22:43.303000 CVE-2024-36882,0,0,335f539d979f451a24412009e0983597bbc7193c525f2e9babee0043eee8da9b,2025-01-10T18:28:45.857000 -CVE-2024-36883,0,0,7de80873a38cf83f62a3e265eec5f1c08243f08dbdcb75a2c6ede844df585856,2024-11-21T09:22:43.597000 +CVE-2024-36883,0,1,7a8c98819cff9aad35478db9de8d5f7f50773b3af47bc48d336d6709ddf1efb2,2024-11-21T09:22:43.597000 CVE-2024-36884,0,0,687c65bbb2dd2f603c1ac47ebda44100b26697c1b7819311390c4f344eaf0a18,2024-11-21T09:22:43.727000 CVE-2024-36885,0,0,e42429ca105987b3123d1dd2686d7aa54f4c4825ae074f67ad5efea854c755f1,2024-12-19T12:15:06.657000 CVE-2024-36886,0,0,ee9fdfbec95f1abe836cd3b0b5d78a461d1302ed6631e8ff9dc750e6e886f601,2024-11-21T09:22:44.007000 @@ -261694,7 +261694,7 @@ CVE-2024-37136,0,0,b5f8af3c6ce1ea377e0b85f7d3db19b56fd5719b7fd0510e18010f97532e9 CVE-2024-37137,0,0,9b0b7ef53e0683d38896a8e096d8938b67919cf817a15d7d2a19d9c93ee81043,2025-02-03T15:26:15.273000 CVE-2024-37138,0,0,d6ef23832385e35bb7e519cb753d89241acb3be21ebee0e81e54216c1eb0f5bc,2024-11-21T09:23:16.880000 CVE-2024-37139,0,0,7b9d8c883f50640f9399ef52e7f8fab19aa1fe6510ebf81659af0766ee170128,2024-11-21T09:23:17.037000 -CVE-2024-3714,0,0,2b9a0123beab098a88c05bd7824acf2b34d0fee6a54c2fb9890577808d643312,2024-11-21T09:30:13.650000 +CVE-2024-3714,0,1,7621d0b2564348d1dd14c391d303be806c447e55c5f0afb747320f888573ecf6,2025-03-05T18:25:53.837000 CVE-2024-37140,0,0,8c57f647f213730c5fd1366c82c95341a749c77d51418edbe67013d56f2b275e,2024-11-21T09:23:17.183000 CVE-2024-37141,0,0,20422cc5ebd81d16fd19d9eac4b179813fd89bba48e5ea015b9895911e59c2cc,2024-11-21T09:23:17.330000 CVE-2024-37142,0,0,8fa11e6aaf310d251d136a29c5d8490228637884219b2df2364c4ab099fffe63,2024-08-08T21:17:18.647000 @@ -261854,7 +261854,7 @@ CVE-2024-37296,0,0,8fc71dbfcf4f454c1548ad2a5b9cea08d7dbcb8a49e052f7e54f7a035f666 CVE-2024-37297,0,0,af9e1bda027731be4de1bbaee36759b58c27b2270b6d832e9228e38c0e0e4c62,2024-11-21T09:23:33.513000 CVE-2024-37298,0,0,41e8ff4c216b6813a6f6b741bfb714ff4496cef805aa5b18e54991599b1b2d37,2024-11-21T09:23:33.653000 CVE-2024-37299,0,0,755123dcf526d1594ee13a574a47b37804d8fdcbaf352ba8ec3363d2869a9bfa,2024-11-21T09:23:33.790000 -CVE-2024-3730,0,0,9f58ec3251b8fd9371c5de1cb2cd85fba0bacc2ae57730f819200cf6383e7302,2025-02-05T16:44:24.537000 +CVE-2024-3730,0,1,95943926d298298b2f95e62877c731872e48517e284f2174b3e98549a472251c,2025-02-05T16:44:24.537000 CVE-2024-37300,0,0,327306843054c8676d2221408dc33a83d57267f6b3e21abd64dd1422e5bcb99b,2024-11-21T09:23:33.933000 CVE-2024-37301,0,0,f7b550a52b9088823cc96ab21ef977078535db28b80093a45d29cd3cd05b569c,2024-11-21T09:23:34.073000 CVE-2024-37302,0,0,7b2a9eb27ea19c8915f2b0cb797d35b46de3b12ff5c79f98a96f7d24add90a25,2024-12-03T17:15:10.733000 @@ -261865,7 +261865,7 @@ CVE-2024-37306,0,0,b2578352b9513732bcaee4063d3cf321ea83eed4a45aec84e6870d82ea4ee CVE-2024-37307,0,0,c6d6b3e27dc302f4fb9b6f4e161309d2177d99d50abbf818405d4f5a2a3b0fee,2025-01-09T16:37:54.713000 CVE-2024-37308,0,0,895ef7a2083f4c94ef8836dceaa13a106f9be259524e481c5d3a96a3babc0d8b,2025-02-11T20:16:37.487000 CVE-2024-37309,0,0,652dd2bd4841d83ef4fb1bd11f09f90c6e3c31e57e961190e557cd8d6dd5b073,2024-11-21T09:23:34.867000 -CVE-2024-3731,0,0,0676b1f56def23045e44cb2b0372bdb337ee98b355b4c4c1508e0e35c405d580,2025-02-05T14:43:10.620000 +CVE-2024-3731,0,1,7d70670bf2c4725d5de9ed3061f28f85b16edc6c41df47392efd1b159b81f7ba,2025-02-05T14:43:10.620000 CVE-2024-37310,0,0,eb05b8516f2120bfcbc5418e421e5e76f45e2691c23c545deefa2d1e75b762e2,2024-12-16T01:15:05.320000 CVE-2024-37311,0,0,0d1d0eb8eb6052894a6f942ad1944d3a1c6de27713fd1218f1350a42fc4895ef,2024-08-23T16:18:28.547000 CVE-2024-37312,0,0,44ac521b45545a3aa8eb130132326f96cb9f75714a3ac532467145fc7d800f07,2024-11-21T09:23:35.253000 @@ -262133,8 +262133,8 @@ CVE-2024-37562,0,0,5fff92160e9f180d6fe1aded48520e5c6ac7153a661594f79b08cd1a412b6 CVE-2024-37563,0,0,d4e514fd48c3dba41649f3e92a70b0fc3d03714769849d8f74d1af2737d1f75a,2024-11-21T09:24:05.057000 CVE-2024-37564,0,0,5e5d8deb79ce02d4743630e479447f7c70c69d56d6a449fdd936c029fbd20c0c,2024-11-21T09:24:05.177000 CVE-2024-37565,0,0,bd3b0fed28622fea5585bed01c88dfdb2958196d65cd20b1a612d41bf69c1081,2024-11-21T09:24:05.300000 -CVE-2024-37566,0,0,d7487614f1383b8e2d54d9b2f7eb4177f926ae1fbac788241489dfbdff3f5970,2025-02-28T16:15:37.287000 -CVE-2024-37567,0,0,095a22db77c4c3bfe2298e23cb9487c31d572f438204db0208873abaceb7a794,2025-02-28T16:15:37.440000 +CVE-2024-37566,0,1,b3526aa009dce829d9ad3773508fccdc92f9b4029ecfe220fa8261415e49bfeb,2025-02-28T16:15:37.287000 +CVE-2024-37567,0,1,db885e1a5c1c0b2f22c5c9eaf3d1160eb054438d2fe20842959116ae1410c904,2025-02-28T16:15:37.440000 CVE-2024-37568,0,0,856c439c12dc3c079f8f1ff58d753340540c2c4d1ef54b75ce0508c5a8fc3e4b,2024-11-21T09:24:05.420000 CVE-2024-37569,0,0,8791820124a473aaae0983330573ab7c8bbd9a5bcb0565b37b2d1bf3d3a92c7e,2024-11-21T09:24:05.663000 CVE-2024-3757,0,0,3b15c3daf6ad6b887b44ee124913c1fe2d8b6654e23c894d9fab65c313615142,2025-01-02T19:05:19.333000 @@ -262247,17 +262247,17 @@ CVE-2024-3780,0,0,a09ec1f79188d078f50e7a2bb4abf902889a3f5b8d804aa8f15de03d54dac9 CVE-2024-37800,0,0,181e136eec13b5820afe4f39edeed05bd09a2f14d24d0cf641ab872734640d9e,2024-11-21T09:24:19.810000 CVE-2024-37802,0,0,706c958bf2a9284b7acd12ade4f60f428328e5fbfa19d79761e97fc7d6903788,2024-11-21T09:24:20.040000 CVE-2024-37803,0,0,d69eeebd204d2fe2694b3c38c1feea68fb9126791c5afcc8bafbf308aa06171b,2024-11-21T09:24:20.260000 -CVE-2024-3781,0,0,811024c81fcec4851635352f18340797a729395a722ecf3d2c858147ac01c2d5,2025-02-27T15:34:49.607000 +CVE-2024-3781,0,1,2b197e1131f2300e5a49107352d56bc50b44043aa0259b00b3dfa064ff587089,2025-02-27T15:34:49.607000 CVE-2024-37816,0,0,0255491dd0ac61fe8f883862d2c202814fc8f53a759901f88a06c7013f4661c0,2024-11-27T20:15:24.903000 CVE-2024-37818,0,0,adc0803b390ef119b7312d5c108656cbe1c41da7e77dc9f33c1c6c84e04bc7b6,2024-11-21T09:24:20.427000 -CVE-2024-3782,0,0,d675e8c9822f2b65f8432c08855c3bd1094feaf0965d865a7d0a6df5793df2b3,2025-02-27T15:34:49.607000 +CVE-2024-3782,0,1,3ee16d0da377501b1dae4c98acb6a3355160e200f090ce006cd30c98b8424a7d,2025-02-27T15:34:49.607000 CVE-2024-37820,0,0,cd852e1dadcb7edc135763a1f4f8f423dcb6c177e797c3b00dca3df88e5d65fd,2024-11-21T19:15:09.450000 CVE-2024-37821,0,0,1453a655cd572a4a0dd83a571605e37d7e86ccc97e2d883b331db535ee79a9ea,2024-11-21T09:24:20.780000 CVE-2024-37825,0,0,9415ecb729c8ea23547630f5e9156dca92043a10d0acfd9c137211bd64cfbf2f,2024-11-21T09:24:21.010000 CVE-2024-37826,0,0,20f0d54db5f0b645077d95bb794fe1fc2b56fd00b52ab4b12112458724d576ad,2024-08-12T21:35:07.723000 CVE-2024-37828,0,0,766adf4d444cb8eb6560cf67ecd774e30c8a3685f9d4dfd3f03a2ce063007731,2024-11-21T09:24:21.423000 CVE-2024-37829,0,0,78588a989f53424b667515b878467614f73062f0b4d3590146f49431c4122429,2024-11-21T09:24:21.640000 -CVE-2024-3783,0,0,f9c9c890bd245a2750970b7c27e2ee376854eb7a110663b8497d2dda28e722d6,2025-02-27T15:34:49.607000 +CVE-2024-3783,0,1,9dcba0cd861613e7d8839eabc4edf84b60094e5bd8c639274efe5b616eb8ea74,2025-02-27T15:34:49.607000 CVE-2024-37830,0,0,9396113938aff690243b110d71c1db69617c2b0e2f623a15484e143c1ba91169,2024-11-21T09:24:21.857000 CVE-2024-37831,0,0,441743a859c32d6468deb58ac518c2787d768e84d36d713eb3a544fa4a083a51,2024-11-21T09:24:22.087000 CVE-2024-3784,0,0,08cf7605e00cbc6ed6b869a77f3c8538dc73c871e3ce916a4a2b80cc73330a3f,2025-02-27T15:34:49.607000 @@ -262302,7 +262302,7 @@ CVE-2024-37886,0,0,f0a021a42cfb4f844466dd7ebce1cce59b3a76317d0e94d306a13047e6ee2 CVE-2024-37887,0,0,ce3b4f7dbbe9319f9a99f667a522474e95017d0525bbf21a311b687abc254ab0,2024-11-21T09:24:28.407000 CVE-2024-37888,0,0,bccd67c6879eca6b637a626b2dbd914ead368108981562eab53114bbf8992329,2024-11-21T09:24:28.543000 CVE-2024-37889,0,0,f2ae257286a98dcc092ae84d69912ea7fa44d6af4aa5a20997e5fb931ab3e7b3,2024-11-21T09:24:28.663000 -CVE-2024-3789,0,0,a7a3ce718301d5fd19a58b5131985163b24f09c224ba73f0b8fb3f9fafd5ce1a,2025-02-27T15:34:49.607000 +CVE-2024-3789,0,1,94f0ed4efebd56e86259d10512a6de0e300dc04ce3e0b5038ad5d48906c94391,2025-02-27T15:34:49.607000 CVE-2024-37890,0,0,6d9265d1a4019acbaf9847570ed538af8d32dc0fa6057c28dc3e7d41713a2cf4,2024-11-21T09:24:28.810000 CVE-2024-37891,0,0,5b4026b1f245b6ccfff5e5cab8cc3dc2679b2651a439a6bf43ff4bd6a0fb1b46,2024-11-21T09:24:28.953000 CVE-2024-37893,0,0,44cc5c1c4a811860b6120fda80d860a009e0adaa00644ca58af35f9cdce29302,2024-11-21T09:24:29.090000 @@ -262312,18 +262312,18 @@ CVE-2024-37896,0,0,7496bcb94686c1b20265c78118e271a3d1b71c6703352d6058c170f115cca CVE-2024-37897,0,0,395eb6e878dc08633c01647412c82e7154278b39adc62052dc129918deb2443f,2024-11-21T09:24:29.623000 CVE-2024-37898,0,0,ceb51e6817d849296a71d497367f9c03102417b6b660ee927a2bb10bd7f1cc00,2024-09-06T21:16:55.600000 CVE-2024-37899,0,0,8bcfbbbf28d6009c77956811f7c492e4be3248bfb507997d02b4550add2d9bfd,2025-02-05T16:01:02.763000 -CVE-2024-3790,0,0,fb51ad27d584644454272125d9ad2474825ac514902078b92cc65be535e14153,2025-02-27T15:34:49.607000 +CVE-2024-3790,0,1,08a5325e009ec0d45ec314a8d1a656f11173e6571a9ddcfc93050dab0285976e,2025-02-27T15:34:49.607000 CVE-2024-37900,0,0,71db7ce42b670bcfc80f61eb84d259055a053561c3204238aa43a0ced619d3ae,2025-01-10T16:54:03.820000 CVE-2024-37901,0,0,878c4a6a346bdf9361411abb10af3cf8a835e99c7a497cde963a683f3319ac14,2024-09-06T20:54:20.857000 CVE-2024-37902,0,0,d606c54ec49963dae75df14960ec3ebc5b06ce69f013e9eb9199335103f5ad62,2024-11-21T09:24:30.200000 CVE-2024-37903,0,0,ac28b821cf5d49d042613ed82e844b155151e9f3b20f26d94cc98ea876980fbf,2024-11-21T09:24:30.310000 CVE-2024-37904,0,0,e813ec7f77e1c4db357fbfbc330d401e07462134bcbd1a3b7af6bb82218928d6,2024-11-21T09:24:30.433000 CVE-2024-37905,0,0,cfbfe70dc3025c966e75130e8ffb3a66e205aad91789012e9278b2230582a572,2024-11-21T09:24:30.567000 -CVE-2024-37906,0,0,60638f015f60d4998ac5e53e04dc8278b4f14f313ae3fd281a3fcf7a24f402f6,2024-11-21T09:24:30.690000 -CVE-2024-3791,0,0,0c276d1e8f22610eb03676b939abf1e9583e8bb0ad093bb06efd426012eb8064,2025-02-27T15:34:49.607000 +CVE-2024-37906,0,1,29457bb5d4ecdd6e6039ce5158e13b7e04f43d88ae8ad1f4f8e2f7f71ea72710,2024-11-21T09:24:30.690000 +CVE-2024-3791,0,1,3288329d50badca400c39302b8557641b51afbacd32c81b67a583ddb8e962f9d,2025-02-27T15:34:49.607000 CVE-2024-37918,0,0,f2c0960766c039c73333a140c9c64ce658d1c2a5371f8e0cc54f919287aa2413,2024-11-21T09:24:30.817000 CVE-2024-37919,0,0,6b84d0d30daccc9c79cc1332a607796144e96d73003348dede97754aecdf1109,2024-11-21T09:24:30.933000 -CVE-2024-3792,0,0,92451412c7b4cb259739ffd69f765ed895686ce36bada0958cbe5445aecbf77f,2025-02-27T15:34:49.607000 +CVE-2024-3792,0,1,ba9da479cc385bbdb8cf4bbb487d07c01c086df523a0608b406c681ede27555b,2025-02-27T15:34:49.607000 CVE-2024-37920,0,0,890f1847ce5a987963fcae06b45f60f0a4de775bdd560e6ade71ec616ab1bc5a,2024-11-21T09:24:31.070000 CVE-2024-37921,0,0,ecc4d5f20e1a693d04a769d55d4de6eb4e8069e6c6ea9b19862ad1137c1a6db3,2024-11-01T20:24:53.730000 CVE-2024-37922,0,0,0144790ca3586a88bc548ff48ff61287508a4b6844538a0575c4e40a89e6afd2,2025-02-03T15:41:55.347000 @@ -262334,7 +262334,7 @@ CVE-2024-37926,0,0,690fc32ea92b25faf58f80d227097abe2c4cd64ea06bfbe0a84a93056612e CVE-2024-37927,0,0,4eba3bbba8c8fc6793f93a314c32aaa170c67d65057a7fc7bb8df3ff4a5ee904,2024-11-21T09:24:31.800000 CVE-2024-37928,0,0,88845070e40e5d4b843bd2b49d9131210be7e0694c6b4ca837387c51ffcf48f4,2024-11-21T09:24:31.927000 CVE-2024-37929,0,0,de597624344a169a3be44fadd933bc291bed1e8c9022a10f7c94d97e32d8943a,2024-11-01T20:24:53.730000 -CVE-2024-3793,0,0,6350427e125e78c107b32e512e08ccfe5e3bc005b606a15d9b465fd0e82a6494,2025-02-27T15:34:49.607000 +CVE-2024-3793,0,1,9a4e3e96e9328b3577e37c515c371e8f36292cfce2e8ef149a56d3cc43a54303,2025-02-27T15:34:49.607000 CVE-2024-37930,0,0,e48bdd5c17daf8908b5fe20b5940f98445ff5eae1cf2ab12b729cee9c0413a70,2024-09-12T21:24:59.393000 CVE-2024-37931,0,0,8886326d0fb4b164d58d74b09f166e7ff4eda0ca58e67142066eacce5d057240,2025-01-02T14:15:07.340000 CVE-2024-37932,0,0,6d856c356044ea2d56cceaf836c2b5ba62fcd331949b626635fd85b97ea9bf94,2024-11-21T09:24:32.260000 @@ -262355,7 +262355,7 @@ CVE-2024-37946,0,0,00b1fbbfc0d2087522919de371a22b11c465fbd70bfb589657c6d22d25f9a CVE-2024-37947,0,0,cd991f0b772c0aa9709524c9ab829a4556eefa1e363002da259de22b2af3066d,2025-02-03T15:36:35.497000 CVE-2024-37948,0,0,5097955877ffd34efa17e2fa108c28030a0542d43b802cc7941430a1a937aa26,2024-11-21T09:24:34.080000 CVE-2024-37949,0,0,a1091a4c75e1bd8344a63600b92c0ac81f8e705d5157c70b2633385463ebc0b7,2024-11-21T09:24:34.213000 -CVE-2024-3795,0,0,281eae0d40c411b316aff4ca658cd4420a6a08ad3f12e1c0830f2b174e55c751,2025-02-27T15:34:49.607000 +CVE-2024-3795,0,1,f0421e6f7b1db67bbbab538c5399d9695d28c1b99d1afee8c998f11101a261ea,2025-02-27T15:34:49.607000 CVE-2024-37950,0,0,e76389ff4658371d59501a8fc08aefcb4889b2fca8cde97cc9923eed57eabec9,2024-11-21T09:24:34.343000 CVE-2024-37951,0,0,03aad2c1ad69fa2b1932db5d4c84c2ec0549e9ade11e6efdf054aedafd6429b3,2024-11-21T09:24:34.467000 CVE-2024-37952,0,0,cd31cf21662ab17a9bbcc873ce1242f623f9ea892edb98ca03d91e645fe64177,2024-11-21T09:24:34.600000 @@ -262366,7 +262366,7 @@ CVE-2024-37956,0,0,61481c48e38db3f8a05369765f4eaaf2b442602110bfe4e8231954f68887c CVE-2024-37957,0,0,a8222dc719812e73523fa0449020fd6bfaed368e79ee525e6fb73e85d9b8f55e,2024-11-21T09:24:35.307000 CVE-2024-37958,0,0,540c02bec92c5d8ab60f85416bf350b9ade7701699ff3e5af971452f58e69d79,2024-11-21T09:24:35.440000 CVE-2024-37959,0,0,2862307e6b6656e94395dac2d8ff6f12ad600e913a0f2b2e4ab9d9950e1d2714,2024-11-21T09:24:35.580000 -CVE-2024-3796,0,0,84603d5fb01f38cfeb9eb059818cbfe14765a4480d54be17b62422201cf6f853,2025-02-27T15:34:49.607000 +CVE-2024-3796,0,1,ae045704c89807d64368bd7a1f92c36110b56b60bbdeb758dd3de89e73610f3e,2025-02-27T15:34:49.607000 CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000 CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000 CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000 @@ -262701,9 +262701,9 @@ CVE-2024-38287,0,0,faa7c6a555d3f131f1625bbd4ec023af2f94eff9de54923e9dcb7f4d8ef77 CVE-2024-38288,0,0,c40de2274d1de507df293bbfc1d11d8c4c24869512dd87166ea06a32f4f45c2a,2024-11-21T09:25:18.197000 CVE-2024-38289,0,0,526c880e7e040ba7a8358affe699d37e3219527db8ec294d498930a9afba177e,2024-11-21T09:25:18.520000 CVE-2024-3829,0,0,01a0c111086a56df7a8152424dede2af2945ece1419808b25f3a1751a9b17512,2024-11-21T09:30:29.107000 -CVE-2024-38290,0,0,5638ded89b91dae094b897ee1207a2308293d2e58b30554fd1a0110f7f7834c4,2025-02-28T18:15:27.187000 -CVE-2024-38291,0,0,9655f0a4d1b1e2eb63562f94e75c0732a1e4536609836bd8a398950fd05a4874,2025-02-28T18:15:27.397000 -CVE-2024-38292,0,0,fb74b924098871d266173f3595ff1910e1745e2f8abf2321b9df604c97edb8c7,2025-02-28T18:15:27.607000 +CVE-2024-38290,0,1,3098fce8e20b0fcb23d4331b2d2983d16911d3dfb3cf535f9142f083d136fa2f,2025-02-28T18:15:27.187000 +CVE-2024-38291,0,1,e011c09c94ce45dd995d4932a3e66bed83dabf1045a075c3a927bf640051a090,2025-02-28T18:15:27.397000 +CVE-2024-38292,0,1,9950e27d36e5e9e5da932c253d8d9c19053c66006bcf8ee2dd18a0a68f72f0bd,2025-02-28T18:15:27.607000 CVE-2024-38293,0,0,60919199132fd520a1e4f078a9a5c31f13510df36764c4be0738cf814e061e9c,2024-11-21T09:25:18.930000 CVE-2024-38294,0,0,6f3448200c484074d0836c56f5e1c9fe346f248c9334967a8e78fc758b5adfdf,2024-11-21T09:25:19.280000 CVE-2024-38295,0,0,f358c490df2a2504a6d87be69cb330bfbc1382bb00194c4d2ceb8f036013735b,2024-11-21T09:25:19.577000 @@ -262913,7 +262913,7 @@ CVE-2024-38525,0,0,227724d36192bb4e2a0af48cfb7f74f403105ccab9b447a7851963b5980ee CVE-2024-38526,0,0,c87b3796553d59f30541329f7bfb421e5fc1050358668dc3718477c22bb7a794,2024-11-21T09:26:11.483000 CVE-2024-38527,0,0,b80767cdd1dc141465114b74c2f216a3b5c29e7d46c42fb40a39c7ea6c867d2d,2024-11-21T09:26:11.813000 CVE-2024-38528,0,0,d097cbc3ca3150539f44bbab3c0f6ada852b6922bd6070662ea01e25baffb76e,2024-11-21T09:26:12.193000 -CVE-2024-38529,0,0,9a88889f7af982f13acf1d33a6cc19d23cc0ab24e650d7c5c54292417787e56c,2024-11-21T09:26:12.547000 +CVE-2024-38529,0,1,17edc3ffdfee3b5990048d6a8b087a13ff504d78585d55be18de17ee4163776e,2024-11-21T09:26:12.547000 CVE-2024-3853,0,0,04ed0bc7cd1bf967e526833d173186ef513eca887cd021cf37248dc393b70089,2024-11-21T09:30:32.893000 CVE-2024-38530,0,0,fc7c632d4c4f22f4d46f2d45280e56c6fe53703bb5e4293582f73ae91e9aeccf,2024-08-13T17:17:47.693000 CVE-2024-38531,0,0,be850591f97851f65fc535bd0fcf5503cd659f92ccc35c74667913b563427caf,2024-11-21T09:26:13.403000 @@ -263088,7 +263088,7 @@ CVE-2024-38686,0,0,c96b17eac27a682ab4213c517ddf37e22e7d25601c67b123cce362e18a1ac CVE-2024-38687,0,0,488e9bd51c0b31efd30893472a284e54811a587904ff2880a63d57213028cd5b,2025-03-06T14:24:40.890000 CVE-2024-38688,0,0,c5b30a411c671b0fd64a758fbbc25ac95f365e054aa5766ce55f55714b200b96,2024-09-12T07:15:04.813000 CVE-2024-38689,0,0,d3cfe121c75d04c62d411dc78570e6cff30ffbfd7916d881eaeb0ffadd59cccb,2024-11-21T09:26:38.243000 -CVE-2024-3869,0,0,b323001a48c948cf28ad984da5ff0468fd820c1c2cd9a50678a4aa352a0f9dfe,2025-02-05T14:42:53.307000 +CVE-2024-3869,0,1,10bd35e0df79d7b56b102dbd68e55d5d71ebecde22b6aa85e27ad33ab8dd2180,2025-02-05T14:42:53.307000 CVE-2024-38690,0,0,70914b4ab49716a13535437843abf6a44c18215a114c6e2c3408bf0943582650,2024-11-01T20:24:53.730000 CVE-2024-38691,0,0,d3be7dc577bf2a1550c480df8f2ffefff37b2685cb959952bb24601b77caa4ca,2025-01-02T12:15:22.423000 CVE-2024-38692,0,0,f7131c70baaa801d230e1c518d3d7557b1026cefa4f16b21994c0453533b226a,2024-11-21T09:26:38.480000 @@ -263296,7 +263296,7 @@ CVE-2024-3893,0,0,09efe4cc959eb8a4000a2996938df3ee2abc638e569f1f06c5c89fa7fb7b00 CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000 CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000 CVE-2024-38949,0,0,37157e233df90a73366a05c90945fefa68ba5959ff251c7bc601be03a335c73b,2024-11-21T09:27:00.007000 -CVE-2024-3895,0,0,0566768cd3a689d7435eee0d258e0dfa90f34747eb857c2d09feff0bcf921254,2025-02-27T16:24:20.267000 +CVE-2024-3895,0,1,56e5b3cdddb7cb78de792a7373a9f80bc7388437e392e7a4fe674f706e1fd23d,2025-02-27T16:24:20.267000 CVE-2024-38950,0,0,3d1ce94030613da6a2ba7963efa6466f81addb4ed6cba912d4be8dce4e80b36d,2024-11-21T09:27:00.260000 CVE-2024-38951,0,0,17e6d72d6ddc33d1e74949cddb49cc4cea8c80a6d51eb19eb8f6f6dcf3bf4102,2024-11-21T09:27:00.490000 CVE-2024-38952,0,0,f38baf84d36c6a8308d09b2d27a0d4f36a3cd4be5595209fae6a993eda0806ec,2024-11-21T09:27:00.710000 @@ -263436,7 +263436,7 @@ CVE-2024-3925,0,0,cd8dfd6d51ac6cd690d67929a196f6da1ca4ca4430d5caf127ecc9ab5f16da CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb5511d,2024-11-21T09:27:22.363000 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,8cd34d13c493901e03ba357a998f6149b8adb8e84d3eff5da6a37e3e1c523bd4,2025-02-26T21:40:19.337000 -CVE-2024-3927,0,0,e8aeda4d09c03cf1e812c77d29e17ed3b35d28680f2ae48faa2fdf23744d8566,2025-02-26T21:40:19.337000 +CVE-2024-3927,0,1,2122c3b9770edf191424e6057722fba15b54cbb88a78af3041d184c4dae65876,2025-02-26T21:40:19.337000 CVE-2024-39271,0,0,de6bad36a0405baedaa373db158e208037712389cc21a066b8ef04d63320446e,2025-02-12T22:15:35.777000 CVE-2024-39272,0,0,ba3bebfcc345dc2a1c8001426741e93bbafdd11988fcbfaa2c8e5c9d028cc691,2025-02-06T19:15:19.357000 CVE-2024-39273,0,0,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 @@ -263479,9 +263479,9 @@ CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb38 CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000 CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000 CVE-2024-39312,0,0,091a032ff8260452715f5ea8758378766ae4690061f220fe04cb023c20b269cb,2025-03-05T14:53:25.190000 -CVE-2024-39313,0,0,bf1f38bc6d0108e622f942f1293f80672041643afd14eec60c286129bde9696d,2024-11-21T09:27:26.370000 +CVE-2024-39313,0,1,854287b4ec703d47589a00cc93a488e89534b3af8fa7556fc9cd7adf756368c7,2025-03-06T14:24:40.890000 CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000 -CVE-2024-39315,0,0,08689d38bae33a39d2ee0c6fd90987ee32dc4022e1a5589ea67c2b5cd59d8082,2024-11-21T09:27:26.610000 +CVE-2024-39315,0,1,b7f2d99cce87610f66b067075193f1de0a2cd840d221bf0e15ce4f00a5c62f13,2025-02-14T18:25:37.390000 CVE-2024-39316,0,0,45ccc4606c1ced74f32c315d82c11378f05d7721ddef5999e7262273275ce374,2024-11-21T09:27:26.727000 CVE-2024-39317,0,0,a0fc4d71b5cabdaeb3b999c76cc981eac10eecf8294b24aaf6ecf119a554904f,2024-11-21T09:27:26.850000 CVE-2024-39318,0,0,6764e76c817e87d695ea3993b86a3354d209bb056859b5c07dcb19565385d010,2024-08-01T12:42:36.933000 @@ -263516,7 +263516,7 @@ CVE-2024-39347,0,0,c33e3d2207c9e4923512f386e77a574814cecd46daea64fc6a6dda15f247c CVE-2024-39348,0,0,428b8c1972131c0ce55ff4a36c1ce6fb48467e1060389452ae0ca9873e8c2719,2024-11-21T09:27:31.367000 CVE-2024-39349,0,0,6cc28f01e75ad07577ae57b8b13229f5ac2b1b4f1365d1187a82a17870d98d5f,2025-03-04T18:43:40.097000 CVE-2024-3935,0,0,b2830fb3fb12bb5696cea398a4552351a820f246543e4f3686a33e6921d62735,2025-01-29T17:12:19.780000 -CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864ed1,2024-11-21T09:27:31.610000 +CVE-2024-39350,0,1,751d0e495789d7b393765d7a3050b63220564cff5f6620f9d24345a6b71bbf71,2024-11-21T09:27:31.610000 CVE-2024-39351,0,0,3c460c84531fe4ffce68d32d5a05041dee4bf0c1d2ca9c3f1c2524c1ad93c47d,2025-03-04T18:43:40.097000 CVE-2024-39352,0,0,99c37565d2c3d1d35be152c69633b37fec36b26e02123ba04b60c033f68359f4,2025-03-04T18:43:40.097000 CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 @@ -263613,8 +263613,8 @@ CVE-2024-39438,0,0,24206dc13e5c569ce4ed39f81926d8b7d31d87ead875693b60dd57a2673ab CVE-2024-39439,0,0,ce75ad981b5a0d9d1a3b44ff24f21db07abb0f10b7cc9c0104da458e8f884ead,2024-10-17T17:32:05.890000 CVE-2024-3944,0,0,b4ac3a6cc8bdc3d4562ec3251954cb7d98b5fdc3cd00cb185f6de2c2a7491615,2024-10-04T13:19:51.383000 CVE-2024-39440,0,0,4f2c0d9e1a449f4e7f0abbc3c14ac2d1b80f295000e70aed068814c8c26e6bdc,2024-10-17T17:33:48.143000 -CVE-2024-39441,0,0,0cf59ad561c0f3794d4ff7d47c24397dfc33b8032bf0f6faed7592ee6f6c19dc,2025-02-26T13:15:39.547000 -CVE-2024-3945,0,0,7093e87a0bcef232ea8887066fd83c1aa636503474edf23e55d40151afe0235f,2025-02-12T16:26:04.993000 +CVE-2024-39441,0,1,31b78eb7593bb4c99f8844f52e5ca5bdcdb288d42c36f4950290b47519157aee,2025-02-26T13:15:39.547000 +CVE-2024-3945,0,1,f6e2afa85a4bce0fddb1cf23ca41ff12439fc5fcc5256fe8898c59ddb22f9cd4,2025-02-12T16:26:04.993000 CVE-2024-39457,0,0,200f1d3fc23798fbfd97f204ad1c3a109ac863e4640147e347dba97a39f0518e,2024-11-21T09:27:42.080000 CVE-2024-39458,0,0,600f68b554d8ca33ceea3ca3c437286132be7e855f795cc4e4b3eacc73ca7029,2024-11-21T09:27:42.223000 CVE-2024-39459,0,0,84163e8ef3d49be1fafbc48a09c7ad9ff761c361af71174eb5e30edb12f717d2,2024-11-21T09:27:42.417000 @@ -263629,7 +263629,7 @@ CVE-2024-39466,0,0,b041eb19cb7e44352da4439cf5631bbcc6b6f6d07932571e0c1df313025df CVE-2024-39467,0,0,f8b096103a7cd9fe514c14ad1458a5fdab112d0b5fdc16ac5fe6e5cb7370b2fe,2024-11-21T09:27:43.647000 CVE-2024-39468,0,0,4edfe26ed53b093f2dc91c57e5c504c28886c5044e711e6c41099de3068057d5,2024-11-21T09:27:43.777000 CVE-2024-39469,0,0,90dbfbf82d07283b34da66b7ea54266f98951a2d29cc67a3bb60db8ee26522e1,2024-11-21T09:27:43.917000 -CVE-2024-3947,0,0,03aa080e705f6b309fe6cebe8580fb91e66a8f879c3cfd81d416886988994ab5,2025-02-12T16:23:45.067000 +CVE-2024-3947,0,1,50c6d7ee6b055d81cb65e45626a55058af13b6d4bf054c68d32c2bc546901981,2025-02-12T16:23:45.067000 CVE-2024-39470,0,0,8f39bbcefe24fbf68321b261e4ed65e0b7db56ef6c63fd1a3047b9b298e9fb06,2024-11-21T09:27:44.047000 CVE-2024-39471,0,0,d95568823aa8e4727b84a8b5644f02e786ca93cf25423e0833fe9b97687f0286,2024-11-21T09:27:44.163000 CVE-2024-39472,0,0,f8baf6ba41486258761861d10b0901d7b547b4ccfd023dd9252425ff6010d14c,2024-11-21T09:27:44.303000 @@ -263673,14 +263673,14 @@ CVE-2024-39508,0,0,b61527ede473f71ec957d7f063dfe9afc808de70d8a3a6ea55db87260a93d CVE-2024-39509,0,0,1d8d55009f9cf6a11df5a012ce860d80d98e7fff9e22285b239717e5da5825e4,2024-11-21T09:27:52.407000 CVE-2024-3951,0,0,fe866e4ae1f51945bb25f7c9b08a9604548e90afa543b0c28badacc4120fa05b,2024-11-21T09:30:45.817000 CVE-2024-39510,0,0,12e0c2ac33dc9d58905bca73a9732480e80c002c138ee2bceccca5353fceb8c9,2024-11-21T09:27:52.917000 -CVE-2024-39511,0,0,a583067fafcdf9c59e21c966b180d889fa5d2ec6c3c4c3e7cb3765b5183d3a28,2025-02-07T19:29:52.930000 -CVE-2024-39512,0,0,5831ff40d3873f0f55e05f0be7b6a77412b8d2be9223286d31aa6a8d679741b4,2025-02-07T19:36:39.607000 -CVE-2024-39513,0,0,f2f87a874d095c8fec90d77953e4e267bd40060872b295d3a8020aee833b46cc,2025-02-07T19:38:29.880000 -CVE-2024-39514,0,0,9137fa69aed6a034d2e01c7d5c9e83793b2e830e77b1ada21f6fb5edfd164e24,2025-02-07T19:57:23.167000 +CVE-2024-39511,0,1,935a1e8d8eadde7af6bb231f644728cf52a2563f6a76e1b2cefbdbb26b4a3b03,2025-02-07T19:29:52.930000 +CVE-2024-39512,0,1,13d1b784fc027fa2264a1a62fdf191f41154ca80aa0afe6148b84063a9c9aada,2025-02-07T19:36:39.607000 +CVE-2024-39513,0,1,e2e33d5e477de5ff1f4bc6e4aefe522fe8900701e7619edb990260a937786a29,2025-02-07T19:38:29.880000 +CVE-2024-39514,0,1,3cb3f294dee861b0d0af6b6d3a118dd2e82cd60bd6abb31cd314629b868e8e62,2025-02-07T19:57:23.167000 CVE-2024-39515,0,0,49463ea51e3a066a41d29e9a575cea84076d45fba3a0bcb376affd2f73eed1ec,2024-10-10T12:51:56.987000 CVE-2024-39516,0,0,ef4a02d81e6fb7d0ab0cc98088ad122a2d333560fd6040b24838b3db3af71f24,2024-10-16T22:15:02.943000 -CVE-2024-39517,0,0,681faa8a1402228aaf97fd89b22c640a5141339a85f46b93bcf7fcf9d390afd0,2025-02-07T19:59:34.660000 -CVE-2024-39518,0,0,1cf49306fb52e43f316c37e42f05ba970ca28be328aad6c3f89481c82d06d258,2024-11-21T09:27:54.567000 +CVE-2024-39517,0,1,3e05436b54cf8d8101d4d0c328e15c5e2f2416edd415e2de2c391b702f2aa2d9,2025-02-07T19:59:34.660000 +CVE-2024-39518,0,1,f031a4638ca45c8b782512569702dda52555925203a9940ad8a28b82d92ee991,2025-03-01T02:43:43.983000 CVE-2024-39519,0,0,1983fb909bafee079a4913ee2dd94a7232a7f03afe251a126060de78227aad2a,2024-11-21T09:27:54.717000 CVE-2024-3952,0,0,96f6f37f7eea2038c3e263873348f7ce855f5a4c9f63427ae2345ef8e8d037ec,2024-11-21T09:30:45.937000 CVE-2024-39520,0,0,0f2218d0c033d1326c4656a448bc8588739ff907575ed3819982c9eb69ce2f3b,2024-11-21T09:27:54.893000 @@ -263702,9 +263702,9 @@ CVE-2024-39535,0,0,2870ea5221386a771b1de3ada11820b787ac6291124da6cc0e7aeafce2f88 CVE-2024-39536,0,0,c6e85f8487836460d8cd38ea0ea2c5eb35dceec2b46d460fbb2645bee95cb5fc,2024-11-21T09:27:57.373000 CVE-2024-39537,0,0,94ed60040e93190799359da7d3be0b847c3016bf753a64dace90042c826d2603,2024-11-21T09:27:57.533000 CVE-2024-39538,0,0,e4e194763069365401c6ed4bc6438a5bf424090f705b37dfd98abb1ed3ff80a5,2024-11-21T09:27:57.707000 -CVE-2024-39539,0,0,c04fe4e7e0bfc9ba4fc23d8fcbff883af872407227902daa13d9c27f3ea66171,2024-11-21T09:27:57.843000 +CVE-2024-39539,0,1,4813679aefa8da57c6e207e92690a1815daa87eaca3f042f042bf710591f2cf5,2025-03-05T14:53:25.190000 CVE-2024-3954,0,0,81a57b3b12243c29f71dd87070c24e26c50f4db513af81e3652558e1ed14589d,2024-11-21T09:30:46.053000 -CVE-2024-39540,0,0,2a5680a01f801da80be410334e566a6d07a23c01b7a4469463dcf646746081c0,2024-11-21T09:27:57.980000 +CVE-2024-39540,0,1,e83f63446b1590fe34a63d531a383d07c26a4a054f78eebfb835fc39e328ce27,2025-03-05T14:53:57.827000 CVE-2024-39541,0,0,885156e07fbdba9fd94d6639bd3cc0a8a39197f30637240b7ce5b3f5387f31af,2024-11-21T09:27:58.117000 CVE-2024-39542,0,0,9a962ec08364be4b8a83395b2f7a1c5957148f49daa6c065bf6edfb8854ed442,2024-11-21T09:27:58.267000 CVE-2024-39543,0,0,4a30c6eec0a7fc621b387218a483d49f45e8004507cdcb7f09bd5ee54f7b667c,2024-11-21T09:27:58.410000 @@ -263715,20 +263715,20 @@ CVE-2024-39547,0,0,1d10e3a61c1942d1246b8943835594d407b269013a08e83b07e7f977bb36f CVE-2024-39548,0,0,acb2fa0ecabbc06cb729fbf18fb340c928102cf75d30b088fab11cdb8f684f39,2024-11-21T09:27:59.110000 CVE-2024-39549,0,0,a8bed9ead2fd74634982fe9b29d84aababc584b3d0223ebc1b6e09529679de35,2024-11-21T09:27:59.253000 CVE-2024-3955,0,0,9ccbfcdde1791dbaf6c66c27a286687ea2d0d3aae3cea4faaedb402b144ec8f4,2024-11-21T09:30:46.170000 -CVE-2024-39550,0,0,fd5431b8bc01f6837409c8a2f7406326417d0510155ea034efd98473076ba3d6,2024-11-21T09:27:59.427000 +CVE-2024-39550,0,1,9ca362ec099c2fc9becefe4d045443169895bd3ba5eb0aefe8dc8993095b7bf7,2025-03-05T14:53:57.827000 CVE-2024-39551,0,0,04d9c3645a908d1cf4dc2aa27ee6cfd0bde25540ed8db6e1a3bb1fbf57b3f252,2024-11-21T09:27:59.563000 CVE-2024-39552,0,0,d2414ec40a26000fa3c84a7c128450796da187a134f576f47839bf6cc200905d,2024-11-21T09:27:59.700000 CVE-2024-39553,0,0,329b891bb1715b7c8fa37e6441d02c73c6ca5de5df2b8b5920ed03d915e3d342,2024-11-21T09:27:59.850000 -CVE-2024-39554,0,0,2cce5c90728e6466b590e9b31f7f1df31b31242f973293715d7327fa777161fb,2025-02-07T20:01:23.347000 -CVE-2024-39555,0,0,364e7eed48c044dec6752278e3edef2e1c545cfcd874055294e71759dd1e19aa,2025-02-07T20:02:54.603000 +CVE-2024-39554,0,1,5567ec7cd1420aa05a0aa0fcb3dbfc2361b85d5a74d1727654446bc8841cce12,2025-02-07T20:01:23.347000 +CVE-2024-39555,0,1,51b35bc22f3627450f1f3f353139e3d37021de0ccba2a3050566378227412604,2025-02-07T20:02:54.603000 CVE-2024-39556,0,0,f178f27fb3f1cc19454090e81cd4de95a308003229438fe4eccd03f0679a879a,2025-02-07T20:09:15.413000 -CVE-2024-39557,0,0,20cb2425289ef03bd3c92d74b1b856f8049f5223cbaaca020d4912ad9cf2f01b,2025-02-07T20:07:26.403000 -CVE-2024-39558,0,0,014a93493d110b16a84c3dbaec2a2a760078dffa52c512be48fb26bf839e8330,2025-02-07T20:06:51.337000 -CVE-2024-39559,0,0,a33e6bd25373254ef6fa0f0557da31c365272746d38a9358647df997a740bc1b,2025-02-07T20:06:04.390000 +CVE-2024-39557,0,1,b389ff90d01aa7dafcfb78203f7c6256ac179329ff4335e8f0a69d5be4b38687,2025-02-07T20:07:26.403000 +CVE-2024-39558,0,1,a48b36c35102a43b25327aff60def75a94e5cfdb076cd7bbdbec99e7557824f7,2025-02-07T20:06:51.337000 +CVE-2024-39559,0,1,deb6cb6f25ab0c5639001ee73c4c359134273793d8a445fe3987dc8dc0de7952,2025-02-07T20:06:04.390000 CVE-2024-3956,0,0,5b541dd3dc9c98939a4ccba4319e69708e56247d2bd66fce94cd154d980fae8e,2024-11-21T09:30:46.370000 CVE-2024-39560,0,0,3bc16612bea0fbbf8ef805d205a47d60f140a1eb4521fe0bbcf525f78e793dbe,2024-11-21T09:28:00.970000 -CVE-2024-39561,0,0,dd2336510d7564a04cce4bd23ab6324ac679815ba8f93327a7138268b60df69b,2024-11-21T09:28:01.113000 -CVE-2024-39562,0,0,cc52f47aeeb54e0c2f36f5fea8b5266dec07f3656cdd9888ad91a7b36357233c,2025-02-07T20:05:34.960000 +CVE-2024-39561,0,1,82e20acab4fc4d5f27495f1226bb2ece19d4bfafc3823c4fa66525ee41f2e1d0,2025-03-05T14:53:57.827000 +CVE-2024-39562,0,1,48bb70f68213f903d0f32e0c4344de50fa90cf58255138491bb2389b40d77f9f,2025-02-07T20:05:34.960000 CVE-2024-39563,0,0,8b61ac53b5ecf775133912648a9c44c0d6ba65851a012a595beca732b240fa06,2024-10-15T12:58:51.050000 CVE-2024-39564,0,0,4955552e63f47161526a28f008c2689066ce871313dbb581efb66895c1e48be8,2025-02-05T16:15:40.270000 CVE-2024-39565,0,0,67a2614a191d00e344122cdacb1548b7c645b78d04170c1384256b3ce0d94137,2024-11-21T09:28:01.577000 @@ -263780,7 +263780,7 @@ CVE-2024-39612,0,0,33a99f9d5e7a84847570107d4ada7b5da5e937e8a3e280000a5cc5660179c CVE-2024-39613,0,0,7cafea60d2bb85cb27b66cde858f3744dc167d0cc43f0183fc2d18ab2b4fb18b,2024-09-20T13:59:01.117000 CVE-2024-39614,0,0,a5a933e95de694c75a6556100c6a86dcf4cacd510c11351aaac62e2e081dc47a,2024-11-21T09:28:06.720000 CVE-2024-39619,0,0,e53963e338735d16dd8daf36a708780a28c11cc606bc37661c8074691fcc291c,2025-03-07T11:54:06.967000 -CVE-2024-3962,0,0,02d50a8b0ad476102baf3a7dace0f624e1034f6562936e79a43b09bad9b4c171,2025-02-07T02:07:02.537000 +CVE-2024-3962,0,1,ac26c730ea7e98c5ae97bfda18ed5791ce686630787c902a3918c7f11fcc01ad,2025-02-07T02:07:02.537000 CVE-2024-39620,0,0,3103eb99384deca53db687a27b3e5caaa6689cbe4eb572f735afe1f0771046b8,2024-08-30T16:30:39.210000 CVE-2024-39621,0,0,e23a226d04bb01d8cd2e10378a5b92e75e7d267aa9359b62b8e0b87209206a67,2025-03-07T11:54:06.967000 CVE-2024-39622,0,0,96c23485620f3e81773744aee243cf0e7c37a5f3d8735fada97fe48ab111df1c,2024-08-30T16:30:11.797000 @@ -264046,12 +264046,12 @@ CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027d CVE-2024-39894,0,0,837fc8c618bfe9d6e461716736e26d7e181457ee03d982b2663ef36e61ce7eda,2025-01-29T22:15:29.073000 CVE-2024-39895,0,0,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed78d,2025-01-03T16:29:09.890000 CVE-2024-39896,0,0,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000 -CVE-2024-39897,0,0,d52d800e90706838a7df528fafb1c8f5f11a5a3ed07ef6c5138b05c0d9217097,2024-11-21T09:28:31.350000 +CVE-2024-39897,0,1,eb6fb8fc9cf953f578a92632ee02dae1a4673b6c609e8924619f1c2438911f02,2025-02-14T19:16:42.293000 CVE-2024-39899,0,0,297d432e5e8cf7a69d6c2d2c76a3c5e549155c2d6082762ac7bcc58bb5e4f590,2024-11-21T09:28:31.470000 CVE-2024-3990,0,0,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b48,2025-01-28T19:23:34.850000 CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000 CVE-2024-39901,0,0,dfe56b10f6e323b587500698e0833597c95fdbbfc63c2621d91311d6c3045504,2024-11-21T09:28:31.763000 -CVE-2024-39902,0,0,034e518f03ca153bdc0378a8d985edbd73e6d7771dd113c36f0eafb749f67384,2024-11-21T09:28:31.950000 +CVE-2024-39902,0,1,6f26ce6fe139531effd04fc99e296048b3652cb3cfb5c7c4f9989299c493bbf9,2025-02-14T19:07:33.747000 CVE-2024-39903,0,0,a69b7a29d317259f3f1f62823597f65c2403a31ed436103a3f5378280f0c74e5,2025-03-05T14:53:25.190000 CVE-2024-39904,0,0,c25a670401bfc26df8afcb7510809458f883fcd709af93a20a1029e5f5b91ccc,2024-11-21T09:28:32.210000 CVE-2024-39905,0,0,d79772b7ab69602842d543f2aa4b14bfae95db33b08992cb0b4a652162ac9ab0,2024-11-21T09:28:32.333000 @@ -264059,7 +264059,7 @@ CVE-2024-39906,0,0,8d84350de04535242f8eba72f437fedb14fc0f4312838c85d0cb07a5dd7ea CVE-2024-39907,0,0,edf57fcc33358c073aa915be7687ed4c74053eee07257c0ad5a7a4d29826ac2c,2024-11-21T09:28:32.600000 CVE-2024-39908,0,0,a6dcf6760b0b9fadd4df0a6808959b67696a98faed411226ac5f767e57357d30,2025-01-17T20:15:28.250000 CVE-2024-39909,0,0,9d88933c61918df2ab3a46b346780be6fb4993d20f3c89b1a28d0310c14f463f,2024-11-21T09:28:32.873000 -CVE-2024-3991,0,0,2b78496a623b694ebeedb80793d0ac4ed0b83e9ddfa1eeb0d495f019ddac56f4,2024-11-21T09:30:51.813000 +CVE-2024-3991,0,1,08484fa30be32cf1d03fb643f139be84ebb0c34a79eeb48a7dfe85b33cdb2bd0,2024-11-21T09:30:51.813000 CVE-2024-39910,0,0,dbf23b9bd5c1278ce3098904e5fab34d72b7a29e6eab68c3cb0b804733b304d4,2024-09-29T00:33:03.740000 CVE-2024-39911,0,0,1d318f57594c1257f9c9d7e2c98079deb4c34f15e17a9ce030aad9389b9a1eaf,2024-11-21T09:28:33.080000 CVE-2024-39912,0,0,d6d51dfb3aa65ec6690304ab8299e97b8c6203084bcee5ad8e6e5215e21ad82d,2024-11-21T09:28:33.220000 @@ -264147,7 +264147,7 @@ CVE-2024-4013,0,0,8556aeeea1e36569486b525769c885cb61d42521e2f43cf44889bf303d52aa CVE-2024-40130,0,0,5900a04ff1e4748611902a7db6eab7d22cf66d2e61a51fe706f327620bf2ffc4,2024-11-21T09:30:58.570000 CVE-2024-40137,0,0,a4fe87ceb3789c5206c87fe9295484b6c1e0b9695241b68e71ac76f00df4e8f9,2024-11-21T09:30:58.800000 CVE-2024-4014,0,0,d8dd467295cab371719c2ac00bec372a23c25ce5af28e8afcb8f0ac49be4dc72,2024-11-21T09:42:02.117000 -CVE-2024-4017,0,0,f783a50d5ec6473e72572840dca331e1122c5a318b2eddc5c5296323941583be,2024-11-21T09:42:02.240000 +CVE-2024-4017,0,1,fa329fe1cf163f26ca18895c4fb4ccd3be2c8579500c9f4c360d71b986a59931,2025-02-11T16:31:40.530000 CVE-2024-4018,0,0,e93d494ed70b12bf00fdfbf61d8137e8f4288becf4316d18479d4e42d5b1bc41,2024-11-21T09:42:02.410000 CVE-2024-4019,0,0,3aea9791ae6e9b7233884532fbd0a9983fbad081e331a0aa1b6a93ec2e0d9097,2024-11-21T09:42:02.523000 CVE-2024-4020,0,0,2cb4e57edc63794c4db7aa16de626df786cb786f8465a515b3e0fce24b221f5c,2025-03-06T15:00:11.560000 @@ -264379,7 +264379,7 @@ CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab40 CVE-2024-4069,0,0,2de2df4dca48bec66b6ef2aa65b4cf9273331d2edc091835c88959a56ebda036,2025-03-05T18:25:53.837000 CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000 CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000 -CVE-2024-40693,0,0,4c2fcccc4f84da1fd3dab504f015de786a85b237d58197aef3700f847f835001,2025-01-24T16:15:36.003000 +CVE-2024-40693,0,1,e6272babb907a3023f4c65d894d89d1ad45d75fec4777e171a80d0b0043cc03a,2025-03-04T16:58:06.783000 CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40696,0,0,cf4c544b4c00a3bb7fc7b85a81d387bd231922be37498a21af706aca6ff2815a,2025-03-05T18:17:37.953000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 @@ -264567,7 +264567,7 @@ CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000 CVE-2024-4090,0,0,c34c2e004c8df900b9681773f17eb639b851ef9028540c2f050185017679d9bd,2024-08-01T14:35:12.593000 CVE-2024-40900,0,0,2eef31d80f1ee0f80eb06d995c8bd5896501640278c957585e3a2ea9a3d37e66,2024-11-21T09:31:49.010000 -CVE-2024-40901,0,0,d6dabf7a4f6a639b3272dfa99951732f996a608f29ad8152e0d66b62320c2e4f,2024-11-21T09:31:49.137000 +CVE-2024-40901,0,1,f4600f67dfefa827be73f728c0fb90f5272cafae6413ff64b6b40df9fda66b53,2024-11-21T09:31:49.137000 CVE-2024-40902,0,0,31e499e82c88bfdbc05e678ce43a92fdaf145152d612e5d4fb61a2c9d2151728,2024-11-21T09:31:49.273000 CVE-2024-40903,0,0,4d483aae7a92b16abcc2bd61bd46681ff4177178359ecc7b304279ac1d080254,2024-11-21T09:31:49.493000 CVE-2024-40904,0,0,0f6cde693bb9d512633e88be646eea9062c67a7f552516b15184ca79bb263ff5,2024-11-21T09:31:49.620000 @@ -264690,7 +264690,7 @@ CVE-2024-41010,0,0,7d2daef6e7d0ee3e0487437fe1a45624bf889ddd16049d1a5a89a934f340e CVE-2024-41011,0,0,9f4ff30565fcca32f4ad6c1fcd8959c5c6e4a1ef7a7a74225d8f93f4f9f215c1,2024-11-21T09:32:03.737000 CVE-2024-41012,0,0,eb5eeba32dbc20c53f5d8ec529e31bdb298f6fa48fa5e0e88492ead04150e399,2024-11-21T09:32:03.867000 CVE-2024-41013,0,0,5d2d648bcd81be2d07c67cd7c293fb6286aeb556fc436fcb8cbc4e97f940239e,2024-12-27T14:15:23.343000 -CVE-2024-41014,0,0,25c0f0b9f6917171589bd3781b0983a83f9cd59ead3f4010814f52903e2aee94,2024-12-14T21:15:20.327000 +CVE-2024-41014,0,1,4196d1a847fd3b61b69c54556b6821fdce085326d86c140b65ab4d743d653648,2024-12-14T21:15:20.327000 CVE-2024-41015,0,0,9b3ae1f79342e0b13e2fef94889a75a92c8d75d0a17ab7cd43a433c966ccfd17,2024-11-21T09:32:04.217000 CVE-2024-41016,0,0,8df47623ea6d364b67b323c6874ead4a0fb1cdd6a839c86e81c3f8df2e89dd14,2024-11-21T09:32:04.357000 CVE-2024-41017,0,0,3fd60b423aa4c60ee66b8bf5eeacf56b9cd985844d17ae8be2e46577f1ee5370,2024-11-21T09:32:04.487000 @@ -264700,7 +264700,7 @@ CVE-2024-4102,0,0,ea088797f5a1f6024b4f86bf2b9bb7d0379b6038529d3a08c98b4f1f4cefdd CVE-2024-41020,0,0,388363ca783b8ff606e303aa949ebe0fe44c028a3ba3d2711ef057fb8b92f984,2024-11-21T09:32:04.857000 CVE-2024-41021,0,0,66764aba5cc0a5c5056e989ff515d25782a6a55671c8611b91ac5c440b5402b4,2024-11-21T09:32:04.980000 CVE-2024-41022,0,0,e5388dd233dedf6e0ea6968f1647488dbffbbbcd9bb61c2feac751c6fbb5d937,2024-11-21T09:32:05.103000 -CVE-2024-41023,0,0,e3872c9bc0ef380e0aefb5ce4a3cf9e7c96efbec83a506c4f4d672f3ebab7e9b,2024-11-21T09:32:05.223000 +CVE-2024-41023,0,1,aa325ace3d6a620dc328ecade670c1b97bbc637e550a06ec90d14a5a4b72a781,2024-11-21T09:32:05.223000 CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000 CVE-2024-41025,0,0,de776435d7227d8dd4a23ef7e5396bac477026279e493e401efa28a0e142b9b2,2025-02-03T15:43:55.150000 CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000 @@ -264924,12 +264924,12 @@ CVE-2024-41320,0,0,2a8260febdf4182236d26585f89ccb09d753292e86d39cca719b36642a7c5 CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e44251f,2024-11-21T09:42:15.257000 CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,5d0a608f5ba280f35dd905d53d7227fb5786301ea98916e97e2bbf00edad40a3,2024-08-07T20:54:44.060000 -CVE-2024-41334,0,0,19fc7d796046d537baaf3e290ebf897dd5658e944e3500f513adc9003711ac13,2025-02-28T16:15:37.587000 -CVE-2024-41335,0,0,ce2e3745a434dd0521337a8fe5ad5e7d8b718f458abe869ebc391fe747602e06,2025-02-28T22:15:38.717000 -CVE-2024-41336,0,0,0289591a27083f80844303d12e6062dbeb6930b7c126a8aedcd5c4d3ca62df78,2025-02-28T17:15:15.283000 -CVE-2024-41338,0,0,e56ba6eccb1f913832538e27e67769c5e8bccd2807f995ee0dbd29477021d2da,2025-02-28T15:15:11.727000 -CVE-2024-41339,0,0,95fa126ce7ca6eb431bde7c3eaf6536eeaddf344a24f0d3796abf61ab7720cf0,2025-02-28T16:15:37.737000 -CVE-2024-41340,0,0,0e29cd0bba1c9f8a593a230b147bbfb936af102ffc90506421364100a8903871,2025-02-28T22:15:38.880000 +CVE-2024-41334,0,1,9472a89d8698131c181fb2ec1c469ddf44e7319c35523eed31cede1af92c6e35,2025-02-28T16:15:37.587000 +CVE-2024-41335,0,1,6c568564866794adb8bbe4d3e97a7f5aaeff2332d84cda37ed7b1063af173b71,2025-02-28T22:15:38.717000 +CVE-2024-41336,0,1,e91279e1cc30b83e4c1ffc881ccc9c941ba02590610e967a1bcea2e30eff13aa,2025-02-28T17:15:15.283000 +CVE-2024-41338,0,1,57989ce7823ae966080cf90dcecdb95f4f3b969d9daf88c3533efed96842c281,2025-02-28T15:15:11.727000 +CVE-2024-41339,0,1,170a2cc7dade68749d516d36ac6c6f16eaf015f8db48183f52952e258f7d9b03,2025-02-28T16:15:37.737000 +CVE-2024-41340,0,1,41feac15e7630d080ab3a12ac030c29c4c9e38d9212db4b135837157b2675041,2025-02-28T22:15:38.880000 CVE-2024-41344,0,0,c38269b43014f5cca22fcf4afc82639c77f2b3bf5d57b1fd1305828277d7aa4f,2024-10-16T16:38:43.170000 CVE-2024-41345,0,0,8a6a87dfa4080752a61cdb78a92bacc8a547bb5d8e3779dd7c2648fc92fcbe83,2024-09-04T14:17:57.747000 CVE-2024-41346,0,0,0540832c689d17af41de8a3343c268de3942f748213352372f3709587645288c,2024-09-04T16:05:09.933000 @@ -265067,7 +265067,7 @@ CVE-2024-4163,0,0,01e9eef2796c4bf4207e50e55c7617f0f191cefd37947097266714d836ddc5 CVE-2024-41630,0,0,7ae60820bce5e36bd01a36de75b4387e45987a0cf0a9dc241e7379eb8644b559,2024-08-21T21:35:09.060000 CVE-2024-41631,0,0,e278a91445ca4816c91b9aa34d7370faa63e0e5b60deeecaf4b2a059f33e5426,2024-11-21T09:32:54.023000 CVE-2024-41637,0,0,28972c6397acbabcec47f213f18f82e184d10611fcf08d0185f09bb7cad2b4b2,2024-11-21T09:32:54.230000 -CVE-2024-4164,0,0,f4a6c0f6eb2421dc4c37c6aacfeedf468b83b5fac4e8723b3b702be95193ccd6,2024-11-21T09:42:18.713000 +CVE-2024-4164,0,1,0874cb04b1a818921efb64172d17d53705ece9b9bd457307c65de33a29636063,2024-11-21T09:42:18.713000 CVE-2024-41640,0,0,ba8bef123899a8d2e35a01aa3d6b2feeb9e067e64107f808fc47650371754c76,2024-11-21T09:32:54.450000 CVE-2024-41644,0,0,085f5caba2c7fc7ce0a4062214747b30f102fbf614325333bc02a53cc1a9c965,2024-12-13T20:28:12.427000 CVE-2024-41645,0,0,ac149ad67946914e3850b85bd4bff29151c5734444c94a67f2b2c4611a254089,2024-12-13T20:27:56.507000 @@ -265075,7 +265075,7 @@ CVE-2024-41646,0,0,3a8f5a110975a0f9d382db2e7f163270c9b8f70ab55554f6af56381ec5cc8 CVE-2024-41647,0,0,92b9ce1a1a20e294f8ff75689c23b3fb591b7208dd05cdfd29cbace0f57c6fc4,2024-12-13T20:26:56.900000 CVE-2024-41648,0,0,a37d42d22a88c21324101083f6a99734b23a0d454a616884bffa2b96bd43c43a,2024-12-13T20:26:07.560000 CVE-2024-41649,0,0,4466ea814ef75debf50792c931c80a096aa01d9d37c6e03582870c39cadd5763,2024-12-13T20:13:04.943000 -CVE-2024-4165,0,0,6f737a5c817af62848ed802ef00187a628deb7d68bc0e959e970cc8c16d92692,2024-11-21T09:42:18.840000 +CVE-2024-4165,0,1,16991c9ebdb110246d7a7bad2ab093e0aacd92c30a801845feef743d14443ccd,2024-11-21T09:42:18.840000 CVE-2024-41650,0,0,3c7b9caf6d6c82a9a8f0ddf8d8daaab91877aa493ffc714652d3e770180bd5ca,2024-12-13T20:12:34.187000 CVE-2024-41651,0,0,46fd364c2b81103e8aca493b5c6ea9f4cbb51180583e345c6a457371aa290a9b,2024-10-09T18:15:05.387000 CVE-2024-41655,0,0,23e6f3d4441efb5cc3a6364cda7ed78e83bcf8961fa61de9bf11f75b976ab14a,2024-11-21T09:32:54.903000 @@ -265194,13 +265194,13 @@ CVE-2024-41774,0,0,db82f7998f610ab2c3c2ae4d9e33bcab8463b004f8921670f73f55120becf CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1bbd9,2024-12-11T03:25:45.430000 CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000 CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000 -CVE-2024-41778,0,0,91eaf397004280a46bcc2e3ba347d43c06f62a2ea8703ef0659d90586a31f246,2025-03-01T15:15:10.450000 +CVE-2024-41778,0,1,0557d10506a695181dc55721e6d6b8525a313737caa44cb7b00ddddbe814fd95,2025-03-01T15:15:10.450000 CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000 CVE-2024-41780,0,0,f0bdb2eca8ebee85877f13f35a81fb91d5ea99c267cf6b461805356adb0fe55e,2025-01-03T15:15:10.367000 CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000 CVE-2024-41783,0,0,ae1c0de72e5dfe79735ebfb7f8ec730c4db19a9e6ca5a3f003214d7fa45e7024,2025-01-19T15:15:21.020000 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 -CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000 +CVE-2024-41785,0,1,e989892fce04ad8504341ab2a8897cc9793dba8ce5b5d8efd885c4a76ebd8688,2024-11-18T17:11:56.587000 CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 CVE-2024-41798,0,0,5fea74d6ad8cd06d69b9494512651a1267ba07a833ce4e1ec1687234e2029539,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 @@ -266187,7 +266187,7 @@ CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c01 CVE-2024-43051,0,0,a32eb75159144fc0400f4a3fd843070d06a761b09ec2ffb1df7f4ea71fd6c6a8,2025-03-06T15:21:24.387000 CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000 CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 -CVE-2024-43055,0,0,f1e527a3020db36b83a4085bce3603ba4821d3466fea47fcc96aa727049dc57a,2025-03-03T11:15:11.637000 +CVE-2024-43055,0,1,cb70e4931ecc9a7ac03537de382d39f5b702529c859323d3c5d1bc8348b805cd,2025-03-03T11:15:11.637000 CVE-2024-43056,0,0,105c5ae07dbf24a96965557708fab371c04681c71723e190b979a744755c3f53,2025-03-06T16:36:34.470000 CVE-2024-43057,0,0,61adf70e579a5da8c905801d8f413a4e3c5876cc97bcf21d6faca34c1c10eda3,2025-03-06T16:36:34.470000 CVE-2024-43059,0,0,6795c629bedf24aa03163f66f78d4bf9d586d690d508cb9463c00a7a1799cff4,2025-03-06T16:36:34.470000 @@ -266268,7 +266268,7 @@ CVE-2024-43147,0,0,eadc9e2b4acd8f577687feadcf352cfbff49d4453d7c7931c608fdd800186 CVE-2024-43148,0,0,4ce681d7b182fd29ac5b7945286ecbb2efaa7bfc5b0057f359c3ec296e8ce66d,2024-08-13T12:58:25.437000 CVE-2024-43149,0,0,9790e35ed9ebc22ce7591793bf69738eec4fa49c273f5891df1dd077ffada5f1,2024-08-13T12:58:25.437000 CVE-2024-4315,0,0,e763108c78dad72bebf08ec43afce7d1a9cefe46d407df73d71b5a11ed56b345,2024-11-21T09:42:36.577000 -CVE-2024-43150,0,0,ce5e318f42570113094f77afe38504814afe3158c0604237ad810d4363c1e576,2024-08-13T12:58:25.437000 +CVE-2024-43150,0,1,30ace5c141d03717177f7741d6285915f5de385922b0ebb420b8042d64e1f9e3,2025-03-07T11:54:06.967000 CVE-2024-43151,0,0,e4709912198de31cab516a307442fc8a4171eaeea915ddcde86ddff97c798dfa,2024-08-13T12:58:25.437000 CVE-2024-43152,0,0,42d75f64764e45d522bba78e9506bea17e7b6d97cbcf143d83714888439b9313,2025-01-29T16:19:05.707000 CVE-2024-43153,0,0,edb2b54323393ef5505dbf5adb1f3b1e8d839c6a276ae467a33311c1cc3db344,2024-08-13T12:58:25.437000 @@ -266296,7 +266296,7 @@ CVE-2024-4318,0,0,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b99423 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 CVE-2024-43187,0,0,027b184f54ed6e57a4ade4830d3c1fbabe0bdf3c1bf35d43dcc0bd27e581a9dc,2025-02-04T21:15:26.537000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 -CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 +CVE-2024-43189,0,1,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000 CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000 CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000 CVE-2024-43196,0,0,8b2a836cbbe6658eba7cefd495a0d5c3f6f241a2ada1aa215976ab8247b3a542,2025-02-20T04:15:09.630000 @@ -266319,7 +266319,7 @@ CVE-2024-43217,0,0,91683d3d11d11cd740425ea271e0c5c427caf56aa2f4c99c9681c49e1f394 CVE-2024-43218,0,0,60da8557d97217818a5be371ccd1968a9a629a5b5933e98c96cbd4efb736051d,2024-08-13T12:58:25.437000 CVE-2024-43219,0,0,bc89c1a1e6ce307adcf92ae27635e024a9ced0b5d750954b55bcd81d6e935295,2024-11-05T22:15:21.147000 CVE-2024-4322,0,0,6f535e4301c4177292e8b193dfad1e892d877195cdd8805de5a65bc48139f7d7,2024-11-21T09:42:37.400000 -CVE-2024-43220,0,0,a5e6bc2b73e869859a6306037ab4ac04781878e232202a6168b0e4a37cb70884,2024-08-13T12:58:25.437000 +CVE-2024-43220,0,1,e576778918fcdae6dbba6870f28076dc627046eb6ed5511c62a7354c8f2c8ecb,2024-08-13T12:58:25.437000 CVE-2024-43221,0,0,52bf4703a192c3b5d3768eaf3c73879eb2cdcf3e5ce777a1d149ec7c0bd8a2ed,2024-08-19T18:36:20.123000 CVE-2024-43222,0,0,1f6e84d11f305b7faaa7491a90db1bdda20110120892020a706a65b2aae73939,2024-12-20T13:15:20.887000 CVE-2024-43223,0,0,10b1f46ac57b6e18c1724b971411da9b7b101822770632c9686f7c2694bf43fb,2024-11-01T20:24:53.730000 @@ -266396,7 +266396,7 @@ CVE-2024-43288,0,0,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1 CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000 CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000 CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000 -CVE-2024-43291,0,0,c0b0d0c2dc076163a61951abd6a856fc48e1c45878c51057318ede8714ab7cda,2024-08-19T12:59:59.177000 +CVE-2024-43291,0,1,16e792141814bc2b30dbac010a7ffa9fcc94baf83485a36efd694007e214fc95,2024-08-19T12:59:59.177000 CVE-2024-43292,0,0,208c4e73174d2dc26e0fbf34675f80707682261eb7a822ba10ee65b232b3bbbc,2024-08-19T12:59:59.177000 CVE-2024-43293,0,0,b1892d2fa392ffe2bd09211d2c26fcff7c9529e98d127336d6156a0f08946def,2024-11-13T01:19:49.207000 CVE-2024-43294,0,0,dbbb329e4dfb5feb56f3872fc122b72b3275c63adcbfbf2ee4e0eaebdd0aa048,2024-08-19T12:59:59.177000 @@ -266692,7 +266692,7 @@ CVE-2024-4358,0,0,409cafbbaa902ccef0d763f12541e08bdba5aeb06adebc180dc745d6fd21f0 CVE-2024-43580,0,0,578dcd1b350b9fd81334110f26d5d064d5661f87134eea1071e0f880d33affe0,2024-10-18T16:49:06 CVE-2024-43581,0,0,e471bdd15e05b3241201f54b0718a529108553b0288a0e4866f06e32c21e9156,2024-10-16T21:54:44.573000 CVE-2024-43582,0,0,3f04436d6ed862645c77171eec9a4a02b53fbb787665d30bb278de96210d8406,2024-10-16T21:35:49.927000 -CVE-2024-43583,0,0,82d8979ae57c8707716b96292ec3de420f759f134158cedb361e0491542ac87e,2025-02-25T21:15:15.327000 +CVE-2024-43583,0,1,78b45c53e13d544b3725793562969d1d0d97d0a350ea563cf829c5ec2d8f35df,2025-02-25T21:15:15.327000 CVE-2024-43584,0,0,48e627cfea6a9647e06f5895df87f7de5808f3364c6c538ecf02965881aa5325,2024-10-16T21:38:33.867000 CVE-2024-43585,0,0,d5b51daae74e528bee5e49484ec714a235a78329b8dc0a81e0003a06ed04afc6,2024-10-16T21:38:57.467000 CVE-2024-43587,0,0,9de9e4aae1c926feb9c254fb5c9841a525dc7e95ddee4987c94a6de807a75369,2024-10-18T16:54:36.267000 @@ -267155,7 +267155,7 @@ CVE-2024-4404,0,0,9b5efeaa7a431a271ce98955a661c1133eae643e8f59e37243cf043edf2fab CVE-2024-44040,0,0,74b42965e6e3986525fc77deeb0ef094e32ece4aff2cecb84f707822891abd80,2024-10-07T17:47:48.410000 CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000 CVE-2024-44042,0,0,bb3534ce2711063106982e1dce9a420a854d7d7eb6757eb988534ebba6ada5fe,2025-02-27T19:30:33.180000 -CVE-2024-44043,0,0,5a54ccce540366e3100b03336264da52bbe72223a1a384e61c57b8debae86b18,2024-10-07T17:47:48.410000 +CVE-2024-44043,0,1,ad74e14724ae13f5e51a2178d4f07f0a5e7d103bd7ac784cdc3c63a61fbe959c,2024-10-07T17:47:48.410000 CVE-2024-44044,0,0,c9ab4359808a41c0a3b073ee503b39c309e24652c8964f96db8bf96d23e28d46,2025-02-16T23:15:08.907000 CVE-2024-44045,0,0,8fadb3a84c1b408a489bbff2c8016efebace55fa9f3ca1ebb63ae422ceeb7b67,2025-02-27T19:30:33.180000 CVE-2024-44046,0,0,8cb28132dcb52c0f855cf896fc0277479d6e2fdc4d9679affa04a96ae7375ecf,2024-10-07T17:47:48.410000 @@ -267234,7 +267234,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,a1a7565b3d1d747868a47cfe0b90ac2757ca3fe3528c74bc3c5562541c409893,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000 -CVE-2024-44136,0,0,fbbc1212d00c86b2f93077c3c81afb2825492aed9453c8566acb5c29b4a31f6a,2025-02-18T21:15:22.080000 +CVE-2024-44136,0,1,15ac28f41f51c63c0ae2579032e68f3b93b176e579ff3633575f87fb61ba468b,2025-03-03T22:45:38.540000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 @@ -267356,7 +267356,7 @@ CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09 CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000 CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000 CVE-2024-44269,0,0,cd94b5c2b28bd00f6bd3c5bd35107676552800aeee1f867a6d0535ed56a9aee1,2024-12-09T15:15:15.947000 -CVE-2024-4427,0,0,9c2223af452db947a19fc0ab8b1b401893e6caa4222bada6a0e47c2734b08c2b,2025-02-12T16:28:31.400000 +CVE-2024-4427,0,1,1174552ab17d9ca864845e5dea5d0cf389cb2345f0ec8cbd6dbaccd07826d98d,2025-02-12T16:28:31.400000 CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000 CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000 CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000 @@ -268054,10 +268054,10 @@ CVE-2024-45418,0,0,43279b4e2e5239a64db6bb286f07dabc5b88ad7e8260a3ef24f65bad6e91c CVE-2024-45419,0,0,e29987400dc7a70a46eaa15282ddd07daa810db0126cea2d64216241ae00d0c5,2024-11-19T21:56:45.533000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45420,0,0,03f4264734f64936227955b0cd7295bf6ba9995138d84e0a2d97323a06156f95,2024-11-19T21:56:45.533000 -CVE-2024-45421,0,0,b71c44d8233793d60baaa2910b35613747d6bdecc2b9f60906a3406edc38d7f2,2025-02-25T20:15:35.400000 +CVE-2024-45421,0,1,d6ba159de8fc1162f9ea05aa4d331b967ff622ebd457697c6412c01f7e37456c,2025-03-04T20:42:55.570000 CVE-2024-45422,0,0,852733e0a4a28635312204f04762ccb7170e0a34bd9b9b76b76475e8b074cc76,2024-11-19T21:56:45.533000 -CVE-2024-45424,0,0,73b37c04e0e6176b52b3857a0ea15264132a1aac6e0190535b955d4e369170f2,2025-02-25T20:15:35.570000 -CVE-2024-45425,0,0,6df3a853980c91f9b85f63bed74a9f5f0999718133ed38c82f2ef7ebdcead281,2025-02-25T20:15:35.753000 +CVE-2024-45424,0,1,4310539de3e0398f4e7ab031832ef30327b25541ff5ab813503a6517f2e4cfd1,2025-03-04T20:42:55.570000 +CVE-2024-45425,0,1,58b70aa184aa851c75e944b5e1c36849b6e87b4fbd78248b9c65148bdbea092e,2025-03-04T20:42:55.570000 CVE-2024-45426,0,0,608533929bad9a9fc0c50fabf9bdc8dc68202d6474456aa729268902afc736c5,2025-03-04T20:42:55.570000 CVE-2024-45429,0,0,b23bb94fab5b564541d550cee389f2e1055de24c768b6da2dee7d47222a5cd9a,2024-09-13T20:48:05.387000 CVE-2024-4543,0,0,9bce683dcafed21194de784f36310cf5dc5033963875cc73daa2b50b23cbbe10,2024-11-21T09:43:04.340000 @@ -268226,7 +268226,7 @@ CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254 CVE-2024-45657,0,0,7a5eef9b925442dc8d84e1f516344c5c80c75658a7c519c6cc81634b57ca69fa,2025-02-04T21:15:26.687000 CVE-2024-45658,0,0,8932f3a8cf0f70fa04aa4437185397d20fc6ebf566ce62ce8b08260d14a6ce74,2025-02-04T21:15:26.833000 CVE-2024-45659,0,0,0895159fe44731498b416385a0a001615f3ff6fe1f25bbc34c263b64f34b8934,2025-02-04T18:15:34.723000 -CVE-2024-4566,0,0,d494e45a53a8e47118af0fafdf366e579bd9cf286c29f4fbe89fd1dabc02ce0b,2024-11-21T09:43:07.400000 +CVE-2024-4566,0,1,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000 CVE-2024-45662,0,0,42e3213cdd9e0313fa4ca25aac2349a283b3056fe3b2b35deed0feef55505b61,2025-01-18T17:15:07.343000 CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000 CVE-2024-4567,0,0,a879787bfeff1d45d20a178f7bea3b5c285b97cc8db193a6618ded1035a3c295,2025-03-07T12:36:39.820000 @@ -268311,9 +268311,9 @@ CVE-2024-45775,0,0,5e285262d1706cab5ca05a7725649dadf6185a7492d72f859f11f2cece394 CVE-2024-45776,0,0,6ff331300b63b0445c4a33993b39c621dc4140ea58408c74e411ebee541079c0,2025-02-18T20:15:19.313000 CVE-2024-45777,0,0,381f048bca6c71d068d001bd4e22e7b202a5aa1ffd4c67366bc2225f24d010f7,2025-02-19T18:15:23.210000 CVE-2024-45778,0,0,2356e34027d55ed5490009b293bca8b12553a8c108a0b2abd3c3d95b683f7a72,2025-03-07T19:45:52.873000 -CVE-2024-45779,0,0,ef9c7579abe7cc86ad6d3bbf7c0d85a638308ff189f521d9ba5bde61fb1d8868,2025-03-05T21:15:19.043000 +CVE-2024-45779,0,1,3ba1515f4f71a469b1da95acbe8387d1c6826a895beee1cb670ebbf1c65ad9bb,2025-03-07T19:37:23.273000 CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000 -CVE-2024-45780,0,0,cf48978da48bec73dddc393fa912333a5f584e7103712d9a48b5fcac961a7f62,2025-03-05T21:15:19.167000 +CVE-2024-45780,0,1,91892a608cc8843e724b493b8a080d76b8bce560c844129714650819668d5fbf,2025-03-07T19:37:23.273000 CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000 CVE-2024-45782,0,0,ae25bf80a3296709e33c8e004e91958575a3182332fb275eab5681af5c15ba3d,2025-03-07T19:45:52.873000 CVE-2024-45783,0,0,26ae80ac76949a820b287a710d857e419cd80f84fb3ed37275ecee208bfb63de,2025-02-18T20:15:19.560000 @@ -268506,7 +268506,7 @@ CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43 CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000 CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41964,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,ab5c8ee1ef837a095338c8af83b127b722cb05f9ed35d7ae0d1c83cc058266b9,2024-11-21T09:43:14.267000 -CVE-2024-46226,0,0,2a59c01b93166bee42d63348f42cad762a94e45ad1a893ec0540083be1cebd9f,2025-02-26T16:15:15.947000 +CVE-2024-46226,0,1,67c41f9a9dcfd9783eec2178b645fa5bbaaa23082a1b4cef66a33925f573b0a7,2025-02-26T16:15:15.947000 CVE-2024-4623,0,0,961703e940078e4a6bf4b9531b20914846a73a30d4778efd87e6c1011cdacab8,2024-11-21T09:43:14.387000 CVE-2024-46236,0,0,7b5402efa8af8d36f034a678c339a134167dfcac00261c63f07ca8461d45c760,2024-10-23T15:13:25.583000 CVE-2024-46237,0,0,edf91e19e8040a7af51513872bc3be6ebdceb66177f9157d729c7b8ec5e1e843,2024-10-22T18:35:05.180000 @@ -269101,8 +269101,8 @@ CVE-2024-47048,0,0,425cce79ac1ff694ab4c7cef97a6df0f5610cb2bf223796f917dc53ac24ed CVE-2024-47049,0,0,9435c3feeabad953f768be0dab3a8c5de1fda327c2cd4383c7019bbd8d92ff47,2024-09-27T17:09:46.980000 CVE-2024-4705,0,0,70c389ca67ab3379e01e7be3997ee96e6665f685a382d4b4294d25153d98d41e,2024-11-21T09:43:24.977000 CVE-2024-47050,0,0,0ecdbbebc96569da8fe90045f207bda8eb6f3c0a2e057e37f2da498fe1d2b9d9,2024-09-27T15:29:21.450000 -CVE-2024-47051,0,0,75e312f8347a289dc5f4bccb36dc0de3bc40d96cc517f14e806bbb3259e23063,2025-02-26T13:15:39.957000 -CVE-2024-47053,0,0,3a2bad05e3fbda87cca39f6858e03f4faf57b0d16492ebbf4ab3ab63688a98f0,2025-02-26T13:15:40.090000 +CVE-2024-47051,0,1,8e2ce411fe0cf3a75b1eda25b4436060c8087d697bbc3dd5da89d378f203c539,2025-02-26T13:15:39.957000 +CVE-2024-47053,0,1,a32def2d37bb468790f3ffd9880552eba5b0f30ede7b570cacb12c45c24e14ad,2025-02-26T13:15:40.090000 CVE-2024-47058,0,0,edde224a6d4e66b56d994d6f32d48711ac34b74b7c4338e5ce4a876e2e9cffc1,2024-09-27T15:31:30.917000 CVE-2024-47059,0,0,cce8af7becadd047e01302f00356768b3ff9b2376c0abd09c500bcb1a617ca38,2025-02-27T19:30:33.180000 CVE-2024-4706,0,0,3149e088dc20e2874012557f7a93cad12bf94c4bd0ac600fc84f4786a2c39491,2024-11-21T09:43:25.110000 @@ -269137,7 +269137,7 @@ CVE-2024-47087,0,0,b56dbb7c29bf52cbde017cc3db3cfe1afcda59c660f79d99f3a4e37b4a7b3 CVE-2024-47088,0,0,07268936431637d0cc30d006ce4270ab2145b17403b263088993818b0addb1fb,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,8e17a57c1e6618cdf1258c205b02223609ecc9bebe997d19f4b92abe7a24c13b,2024-09-26T19:09:44.377000 CVE-2024-4709,0,0,fb8e04b1891ec411dac50f73dd21b9dddab9f77110643379d3cb27db5c3b5a21,2025-02-06T18:37:12.683000 -CVE-2024-47092,0,0,393b3daa90951bd64b041a3ee8ee705c4e6ed6dddcae0007d888c3165d3c306a,2025-03-03T14:15:33.473000 +CVE-2024-47092,0,1,ae70c564236ef53869e365e7dc7a064c613860b98f4f92c2828211b6aa729060,2025-03-03T14:15:33.473000 CVE-2024-47093,0,0,254373901b8fc660464b2e2de4e7fbfe56fe2ef0b4d8cc4ab6e7d7491a830b6b,2024-12-19T15:15:07.250000 CVE-2024-47094,0,0,ee2465816890ce3f2363bf329af267df040aa5a70262d0dafb8ba55c98d9f579,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,3cad230087e8d967e8998024ec473bf552b2e99f02c3b0ebbe36d9dcd1959318,2024-10-10T12:56:30.817000 @@ -269263,10 +269263,10 @@ CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004e CVE-2024-47256,0,0,4301094a6476a5380c4c5aae0b9d93aa83f68d1387f6e04d900365697aaa867a,2025-02-21T13:15:11.207000 CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000 CVE-2024-47258,0,0,9a4a5c7393716979191d8b2658cfc20c67a5be5e7a582de99084d292c7b321b8,2025-02-21T13:15:11.300000 -CVE-2024-47259,0,0,0c24dadc9acbe950b47a2a966d90c2b961a7689f983ad36b33d4cf1393b2caa6,2025-03-04T06:15:29.190000 +CVE-2024-47259,0,1,96188ceb8a1444b367115b0072184fa3d1d29c538e52a4d93d0e09ad178490c1,2025-03-04T06:15:29.190000 CVE-2024-4726,0,0,1c18580068aa06c19f8d582895fda7543593a552999763ed068e65be081d2ec9,2025-02-19T18:33:05.473000 -CVE-2024-47260,0,0,58c9b143a3491f881b27c75a0cebe3e5648a11b2fb790b0f69647ca922161b3e,2025-03-04T06:15:29.710000 -CVE-2024-47262,0,0,12e60decbe92c983d0bd4efbd2ac4f87b2841434d278283df9d1079d5044e488,2025-03-04T06:15:29.867000 +CVE-2024-47260,0,1,5b27c98e99ae4ad671e69cbfcf95d8f33ff9e3ae5e7b5b451c53923f7fad5127,2025-03-04T06:15:29.710000 +CVE-2024-47262,0,1,f5b41f79a65d45ee654aaae851aa1366b58e5f035dc01ee0ca87108ff5e14c82,2025-03-04T06:15:29.867000 CVE-2024-47264,0,0,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000 CVE-2024-47265,0,0,8efdd4318786503cf0f39cc0c8ad040b17c802a2f969a2910ba793ae4b4f6dc6,2025-02-13T15:15:19.600000 CVE-2024-47266,0,0,90cb14c9aceeed35d9c240ff0c2975561e1a5559a7d8f6e46559ec80407f7fd4,2025-02-13T07:15:10.383000 @@ -269314,7 +269314,7 @@ CVE-2024-47325,0,0,e6c7e63bb7455d0da5ad59caeef2f58710927c01a0cafc711671261e30d2f CVE-2024-47326,0,0,a9b662a20af3572bd78f5a5e40ecb528e00c0181935d32d5d1f93e2043a80eed,2024-10-07T17:47:48.410000 CVE-2024-47327,0,0,d371d8faefa236e06cfc30131a25212c81c8df00a4d5ed2bc51b14fcf08966d9,2024-10-07T17:47:48.410000 CVE-2024-47328,0,0,f97e8466603d090f3495014bf36eb39e813b6856c70fbe846197ff8e8b509ef7,2024-10-24T13:45:07.193000 -CVE-2024-47329,0,0,7c82c94fc0cbf67ad286f0d127d4144c4f505a3b5ee76bce299e6a5750b40991,2024-10-07T17:47:48.410000 +CVE-2024-47329,0,1,87149f4a7093d6ec91fa022c84f8cc814538953940058129e917e053894c3667,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,a22ad5c0363ad64a153b9f76d9c7da12172516c803b4c4f57d3aaaeaf11634a2,2024-11-21T09:43:28.800000 CVE-2024-47330,0,0,33e8507348259e6c09afffe788badd3fc34b3d966f44d1158ee9fac5462e1209,2024-10-02T17:26:49.470000 CVE-2024-47331,0,0,01a559735a8bf24e08b704345b27e0c4070a854136f65f26b172757e3030ac30,2024-11-14T19:22:49.760000 @@ -269341,7 +269341,7 @@ CVE-2024-4735,0,0,b35c434d36696a916530fc2b8996c66232c8555633a35cdaa75d3ebd8f4caf CVE-2024-47350,0,0,907f1fc024d172e98940078839614a2d0899bb7aa5451d5ca67dc6fe479dca48,2024-10-07T17:47:48.410000 CVE-2024-47351,0,0,75765f49227b29c651bed3c83e8eec856e3485713ab6a8c1580303091bdecb1a,2024-10-16T16:38:14.557000 CVE-2024-47352,0,0,bd5c22b9ba580a0261089b77925129e154f3bd1337a2847b9f505b6467d54e92,2024-10-07T17:47:48.410000 -CVE-2024-47353,0,0,694352a570bceb3ad9bde3a11b7dcb205a5f5b8bb314faf95c62f226faf3489b,2024-10-15T12:57:46.880000 +CVE-2024-47353,0,1,4ecacbf4c12e4492e4b8754659923fa4138373ac5f28c6850098fb6879dc4cc8,2024-10-15T12:57:46.880000 CVE-2024-47354,0,0,ed1b0a07d44aa984f50fbe9f60fee94e2887ec20e62ecc1f65c28b4d86d96841,2024-10-15T12:58:51.050000 CVE-2024-47355,0,0,9aa352dfb3149fa170e524c2ce4549d0b7511773ff7e6ea96bd9a44f3463b903,2024-10-07T17:47:48.410000 CVE-2024-47356,0,0,4d9ec6479b0bd110a2089be0f68eca6b04b642b868f871756195f7d4c1248802,2024-10-07T17:47:48.410000 @@ -269363,8 +269363,8 @@ CVE-2024-4737,0,0,05fb18e9faa99d8d0c98bf4b680cb68ec8e6b32df362645db22bfea3d60617 CVE-2024-47370,0,0,714b450856f5265341abd9fae7add1c9f9d916fbbe9e9ec7b8c0efff5766f370,2024-10-07T17:47:48.410000 CVE-2024-47371,0,0,12efa54c32876287f7aadc3cf27fd880f14b8f3e2a5566348d5b415b184dae06,2024-10-07T17:47:48.410000 CVE-2024-47372,0,0,16a712879f374bea067ca096c3d45cdb10c2cf455ecef122e07fdbd1e703d171,2024-10-07T17:47:48.410000 -CVE-2024-47373,0,0,dcd40a1031671d4797f4d3239e80bbe4ac293dd7b6a97aeb3e4263d2d66cbc26,2024-10-07T17:47:48.410000 -CVE-2024-47374,0,0,544acb2101c6dd54c906e701a7d3d83f914cdc5fd1f47f1d691130c2e24bf871,2024-10-07T17:47:48.410000 +CVE-2024-47373,0,1,3a650a9c9735dd0dc82854fe2b47572c5a1eff60c5f0a18949cec0a5e50d71c6,2024-10-07T17:47:48.410000 +CVE-2024-47374,0,1,490f079fe16089254d4398c55711cd056afc06d5cf0dc1218054247c05b19c1c,2024-10-07T17:47:48.410000 CVE-2024-47375,0,0,ace60daf63d5bf8f8cf318809fb44e1ccb775f86199b2ee8d25f4320f2f7d768,2024-10-07T17:47:48.410000 CVE-2024-47376,0,0,a2261f883a087c1b3a8695224c5472160fa3bc64b8c093bacb0becf01d489337,2024-10-07T17:47:48.410000 CVE-2024-47377,0,0,77af127b215a2294cc2afeec7c197da4b3ec87df9d5312657071e7621ffd39ba,2024-10-07T17:47:48.410000 @@ -269606,7 +269606,7 @@ CVE-2024-47633,0,0,b0928e299bfedbee2cda8ee029fcd82fb0924d77e9ef1fe1ac6c1b7e2fc89 CVE-2024-47634,0,0,b61556545ab84650e2870ca5131fad100a4fe9b67943b1c6941edc98650ec0e4,2024-10-22T18:46:02.253000 CVE-2024-47635,0,0,d54c370db7265206a7d9a8df0e35dbbb27b34b14251f69c290e5f949cf7a087d,2024-10-07T17:47:48.410000 CVE-2024-47636,0,0,a56ed8342ff185869918bdcddfe3b27c6c03f440ff0143c09f23b1c897ae7ca9,2024-11-12T20:52:49.130000 -CVE-2024-47637,0,0,d597aab2b6213966bbffddfa31e9da4cd05b18e16f102453ff160514673528b0,2024-10-16T16:38:14.557000 +CVE-2024-47637,0,1,2ff41165c9c6036c3919dbc7e0f30f0bed91e68478bb4c4db6e5cfca00a8a3de,2024-10-16T16:38:14.557000 CVE-2024-47638,0,0,6a00361c268362a6b15e6dc12e15f709c847bcb963ea8bda945f32cda223b7d3,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4a1fad9736bd8080fa495471841aef428e51e4a49a8ddc4022a626ba6f779771,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,ba97298c728d5b161450d426f13b6f163bc6eb85a72784d5913d3e3dc202b1f9,2024-11-21T09:43:33.287000 @@ -269800,7 +269800,7 @@ CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c0 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 CVE-2024-47821,0,0,548ec07ef1ce23fda935039365fb1338b7d2cbebaa0f5fad0ac50306a140b074,2025-03-05T14:53:25.190000 CVE-2024-47822,0,0,92c6f57c3e90f75d3fc504f166ddbbe4b9ecd9f20fa8edf7413164d0cd32832b,2025-01-03T16:31:38.163000 -CVE-2024-47823,0,0,4967341ad081596ff093637a780ca486831b3e2d97a0e50755edaa6faf32b4ac,2024-10-10T12:56:30.817000 +CVE-2024-47823,0,1,cfe4401e6dd27e3f259b19e2d072484879a84978e16f1ed65e8a601938cbad20,2025-03-06T14:24:40.890000 CVE-2024-47824,0,0,a6ed6f23ae40be69a679bf0b38da4a6a4364f56979ee1f794b9647e1e4c37eff,2024-11-21T17:15:17.650000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 CVE-2024-47826,0,0,c4f33e7bebd2379ead32307d8a6391982ffd919a32cfb4a5d9b964741d396101,2024-11-08T15:41:00.787000 @@ -269809,7 +269809,7 @@ CVE-2024-47828,0,0,f2c2241d50091646d8dc52a9b7faf3ab7da7e5424685ad1326bd33f9486f8 CVE-2024-4783,0,0,05210fcf6766abfe9da77d691eaf27c7cb32d23d5c537f0a16a8aef37faa0dac,2024-11-21T09:43:36.243000 CVE-2024-47830,0,0,743064bf130fdd14a137794859b60609448751c54b54b84343bbf33a11303c27,2024-11-12T19:55:58.010000 CVE-2024-47831,0,0,2da9380408ec987b38c3ce4a1241b2ce84ade82e57460ab76452d64f3cf66aa7,2024-11-08T15:39:21.823000 -CVE-2024-47832,0,0,2094d7befb221ddc11234bf90a706f9031e3970a0595297792c480a91def5ae5,2024-10-10T12:51:56.987000 +CVE-2024-47832,0,1,87e62e81d6e7ecf4caf69431ad5d892228a419e29218a48f1bfccadb9b0751da,2025-03-06T14:24:40.890000 CVE-2024-47833,0,0,cedf8a7f49cdbdfc4954e19b64aca1f0f431cd6f3397df1c55a4eade72fc7a64,2024-10-16T16:33:34.493000 CVE-2024-47834,0,0,4cba8af3821e728bf9be87b2cebd02718392a54164383033c634eedac352ea45,2024-12-18T19:43:02.923000 CVE-2024-47835,0,0,01f83380a6b7f032e95ad1e4070463e59ceb3517fbe77413d53b634726b76aa4,2024-12-18T19:45:03.047000 @@ -270071,7 +270071,7 @@ CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688ed CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 CVE-2024-48246,0,0,06e74a25fc7dc4e82f663349598aa6890dc105ce6250318dd386fe2bcf87e56a,2025-03-06T15:15:15.917000 -CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 +CVE-2024-48248,0,1,d95739d2ed45256b52f214f936d2636b7c85eb88f7181392e616e53ac2a9fb0c,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -270320,7 +270320,7 @@ CVE-2024-48845,0,0,857f78a832caa017ef878dfef403b14f26fbf7efc5e1c67ee960aa7d3092b CVE-2024-48846,0,0,51afde21886e5f56a9a3629698778341606628c345447801ea3ddeaf37e91512,2025-02-27T15:45:57.977000 CVE-2024-48847,0,0,a822b137fef1fff60ee1d27dd2eb6fdc75846a7dc5d0d2021e0e3c401ab49e18,2025-02-27T15:45:57.977000 CVE-2024-48849,0,0,fd3e8ed6978571ad86ae5ba997c11a31bbd23eae3890b14e5c287c90b96b0482,2025-01-29T19:15:18.547000 -CVE-2024-4885,0,0,083ce9f2919cc372a0578f39f82941498b9e8bc423ea572415c0c39e80d034f9,2025-03-04T02:00:01.987000 +CVE-2024-4885,0,1,21797cc64aedc93b02b5b229eaf54af1f7c9fa1facc1df7e5a032ec2a77520b9,2025-03-04T02:00:01.987000 CVE-2024-48852,0,0,30427ab7c643976d46e60ad759beb23222df1040ecb326b48277a708fdeb234f,2025-01-29T19:15:18.720000 CVE-2024-48854,0,0,84036c75cd3838b5b292f21cf5425d491da03d6238f78579c542dad27dcd7589,2025-01-21T18:07:08.960000 CVE-2024-48855,0,0,5bf8afe0e102f23f010396835dba19dff569ccf97c0fb49542dce44c445f45ae,2025-01-21T18:07:12.777000 @@ -270611,7 +270611,7 @@ CVE-2024-49226,0,0,8b039bf61f792f56c90706720d258255d8df3f4f240d45c648d9f0747fff0 CVE-2024-49227,0,0,98cab12bd6c66ae41da2bcc8629f4f7f29bc4be754ec100983ce3733879dd1e2,2024-10-16T16:38:14.557000 CVE-2024-49228,0,0,acba4297b757460f4568b626bea11344afc987a3267d44de870e94adf9e4ec7d,2024-10-21T16:34:41.267000 CVE-2024-49229,0,0,0353058f3f83fca46abe27d492b5b63a6531a6fa0d267a03ef7aa4b6ab176597,2024-11-06T20:40:30.740000 -CVE-2024-4923,0,0,decf035cf863ba4945c1aa13098b000aa6146ca5dc7dc8bec8c67a0f3535de4b,2024-11-21T09:43:52.737000 +CVE-2024-4923,0,1,55d9cd479baef4c85628926db7178dd966892049c20dbdd90f163a9518c975f9,2025-02-21T22:03:20.887000 CVE-2024-49230,0,0,bd9844b65817f448403444ba81d1c98e57386b7d336e51dd55277128cf3212fe,2024-10-21T16:37:15.807000 CVE-2024-49231,0,0,7e52e9fed38ee4e1078fd49029dc147b433ea5d5e66affa1aa88bfbaab9de2dd,2024-10-21T16:37:46.010000 CVE-2024-49232,0,0,98e24597b823abe77600cce3537bf6c60d7503153cb5f3dda0e30102525f2e57,2024-12-05T00:15:19.063000 @@ -270667,7 +270667,7 @@ CVE-2024-49278,0,0,0dd8cc10bd56876b7ee7ed6bcec68079ec2c49ad19687231e6f5648d7de2e CVE-2024-49279,0,0,8f41922d51c3c4a8b109eee18fdf9c34f89d06145641e421bc0ea55b455bab9c,2024-10-18T12:52:33.507000 CVE-2024-4928,0,0,ed7e945a54481af08d73830e084a748102ec0ee82721536fcd25b5d604ec6422,2024-12-09T22:45:35.050000 CVE-2024-49280,0,0,bb81bac00b921d3399c1799e890dc4e07bec7ac0c3ee7892b44216d9924ea20a,2024-10-18T12:52:33.507000 -CVE-2024-49281,0,0,0e87674fbce12e20abe49aaf63e55184207c1378bdb1ba23270103fe0b109d35,2024-10-18T12:52:33.507000 +CVE-2024-49281,0,1,6be7ac2c4d3d8b7a54b735c05f89c587d918ce072edf3bf4f2a842bb2ff04e0a,2024-10-18T12:52:33.507000 CVE-2024-49282,0,0,358126e846a2d67f83feaaee630d8f728927c331352abaa3840691ed529b0855,2024-10-18T12:52:33.507000 CVE-2024-49283,0,0,b76fcaf4941a43eca8ac218695c9ff920cc1b4d57755b09dc6ae9e43b860912e,2024-10-18T12:52:33.507000 CVE-2024-49284,0,0,fdc9d47e56d33c2c1b39cc8c3bcf68eee2a92cb69ca6c7b63a1823bf85ccd8c5,2024-10-18T12:52:33.507000 @@ -270699,7 +270699,7 @@ CVE-2024-49307,0,0,cde1ea6a7045e43ef27aed7a08d2ad4e48608b1421685c8cd1de3636aa4d1 CVE-2024-49308,0,0,1eda7279771831c05f4388d7b8e284717dc9533c6517a93f9884604accdd8790,2024-10-18T12:52:33.507000 CVE-2024-49309,0,0,24d9afae682abf49c12df9ceff1cd63fc5d9e4a9627fc584b227af938d4d7d9a,2024-10-18T12:52:33.507000 CVE-2024-4931,0,0,8a180305ffc63882f3330b7bb7fbab29451ba1837a2df2106cdcfe9ccc0f5361,2024-12-09T22:50:24.617000 -CVE-2024-49310,0,0,9ad4cf7746f3aee9f61d6f1f0ff16a7cfeeeaad80aeb8b7f1b58297020d31848,2024-10-18T12:52:33.507000 +CVE-2024-49310,0,1,62eacdf84a29c3794e0368ce819be288a9e19c01b3efbce65452820852c88def,2024-10-18T12:52:33.507000 CVE-2024-49311,0,0,b72a3c25fa0ba4a02b76dd4e49d19266dbf9989a11a7d984f3fbf6da997af981,2025-02-11T19:36:08.167000 CVE-2024-49312,0,0,2f31c5b02c9cf050fc36c8b59715e514e71c035767f81b9967bec82990168bb5,2025-02-11T19:35:40.277000 CVE-2024-49313,0,0,84bba196dd8a989c51f52c02747857d3d515e64a07cb5b04a79e9d344c6d57ec,2024-10-18T12:52:33.507000 @@ -270875,7 +270875,7 @@ CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab2 CVE-2024-49568,0,0,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000 CVE-2024-49569,0,0,b1379fd025e32fab88c21975ab9b6f766098726076e1ee1ddc484d172b3d093a,2025-01-11T13:15:23.840000 CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000 -CVE-2024-49570,0,0,7ebf18c7c1e55c5b1cdb2aacbfa70029582cf89a431005e2d934a095c745e158,2025-02-27T18:15:27.083000 +CVE-2024-49570,0,1,58790cbbab3e96b62222e8cb958e09ebb9b0c66c0f49dfa5c87f95b3dc4671ea,2025-02-27T18:15:27.083000 CVE-2024-49571,0,0,48d41a1ed34da6a8d207508416dbadcc69c521f2274992ee3d4ce336a0c1087e,2025-01-11T13:15:24.027000 CVE-2024-49573,0,0,bd822bfcb04a1a23a0356060b4b02e8952dd69548a8ed6c8619ad13c8392c259,2025-01-11T13:15:24.223000 CVE-2024-49574,0,0,285edf65c7736387bb1f5e69a3d9da68a65cb104e57ac1234838e33c6baad7dd,2024-11-20T16:32:37.770000 @@ -271063,13 +271063,13 @@ CVE-2024-49781,0,0,bd6cb8ef4203ad5b05c7f45eb9fc358902fba622f544c93da6a5c26c2f399 CVE-2024-49782,0,0,7ebf6eadab5e8506e34106adeb5616ef7773ec0635152435a2ffcd54d1329cf8,2025-02-20T04:15:10.973000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000 -CVE-2024-49792,0,0,693a2fd39c8dfd598958fdb8bad16f8a352d92afe1bc976e175f50b0beb082a2,2025-02-12T19:00:51.357000 -CVE-2024-49793,0,0,93505ab1a713c7f5e371ae5e84a5f8ba33b73ca8c053c22164062bf223376375,2025-02-12T19:00:57.080000 -CVE-2024-49794,0,0,f335485e54ef503df1d52c1ff49fdf84b4c59d93bc03f13aa59831bbde26a151,2025-02-12T19:01:05.303000 +CVE-2024-49792,0,1,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 +CVE-2024-49793,0,1,fac1c55a65b5d3da27c6a329f82e430166d0b74adda812e4b78984a75cfb0d3a,2025-02-12T19:00:57.080000 +CVE-2024-49794,0,1,4188151a12ec309aa3d9591939eb9ec6161f375faaefbf12f00e48d0dbf555f6,2025-02-12T19:01:05.303000 CVE-2024-49795,0,0,5dfdc1bf8e7cc7385a271f0d7f72f61ca066096724a019b04ee78775686a5968,2025-02-12T19:01:17.880000 -CVE-2024-49796,0,0,8b1fb9fc18ca83c7dc6d418193c691afe0fe4eae32e93620f8d87f25bf32f789,2025-02-13T09:15:10.020000 -CVE-2024-49797,0,0,42604ebbdaf644f378effc3597fc837138ef12e316a87aa17727d1fb2083c728,2025-02-12T19:17:11.273000 -CVE-2024-49798,0,0,1aec0907b4fd732315be69d41519055181cb89ba95f62d72251da2aca1ab6651,2025-02-12T19:19:30.360000 +CVE-2024-49796,0,1,2df51bf8e8c88d82ffb2d48bea029ac606b2411cf9971a480bfd79dc1badb450,2025-02-13T09:15:10.020000 +CVE-2024-49797,0,1,142e3c077cfb816fdf02e00e49040600ef6f61c85dd208b6f4e3dbd964c7d2f1,2025-02-12T19:17:11.273000 +CVE-2024-49798,0,1,586cc47b4ff15ea0e4cd830539c74d083debaf1034853fb6111b395ff5596189,2025-02-12T19:19:30.360000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49800,0,0,c2e08020b86a0127deb4cad0f0d72546a923f7dec86c67481406e56d8f0cb7c3,2025-02-12T17:58:29.817000 CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1b60,2025-01-29T21:23:51.343000 @@ -271593,7 +271593,7 @@ CVE-2024-50306,0,0,36f7f15ac3ae08b343967b7d5c928ca662bb204683930d546d92959a7101f CVE-2024-50307,0,0,effd6ec5b86bf22e86b034cf0d56aa80ef1054d58eddf4f4569fd5216a21181b,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,c2122d739677bd0d04b7d795c26d96ab35b035940f3233702cc95bfab80b9911,2025-01-31T14:18:23.003000 CVE-2024-50310,0,0,359e8b18cb113fa4328da423011f6e1f1c28adffd9fc00c7505c3bf27e6f2aa3,2024-11-13T23:15:38.657000 -CVE-2024-50311,0,0,b7188ed9eecc74ae8ec3e62d73a366272bbacf98c612ad23392109deaf590735,2025-02-25T08:15:29.530000 +CVE-2024-50311,0,1,3eace2ea66789d1c9a6b5f19c25484fc05c8728bc7b322e4ad49da128c451a43,2025-02-25T08:15:29.530000 CVE-2024-50312,0,0,cb8552638bbf6ba6c0c7c722a701136cfb9eb421cd36f8c4ee78283539ae1dca,2025-01-15T02:15:26.067000 CVE-2024-50313,0,0,2847d4f83ba1fc494ba3e2a870acd68e4a3bc82c7632cbc7a108dcd28f8ad59a,2025-01-27T18:15:39.980000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 @@ -271777,7 +271777,7 @@ CVE-2024-50486,0,0,09ac0f4d9332c90a2449f6036c90602c1a8465c0a25adadb963699fa6d356 CVE-2024-50487,0,0,2c1dc0d5641824f0b613b12739318856bcf27621fcec5364c518d84f73c3d871,2024-10-31T00:17:48.153000 CVE-2024-50488,0,0,a66f5dcc5616fe86c11ebf506fc4f272680f0e1294b584fa5c94d9d7e7408837,2024-10-31T13:19:42.087000 CVE-2024-50489,0,0,71c7e9d3312f01c8f8fc6cafb114d171b038fb98af6aae873110a7d2af32e829,2024-10-31T00:16:07.977000 -CVE-2024-5049,0,0,7047cea82f06448359d079f3b7ed31ed806079298bf3110a7a13520f016bb9f4,2024-11-21T09:46:51.530000 +CVE-2024-5049,0,1,0a454f5c1ee78b38877cddd08ef156b9aadcf6767ffd9749457db4977acfcb0c,2025-02-21T22:16:19.133000 CVE-2024-50490,0,0,231b39aafa3d500a7c028ca66b380481016bcf6e3ab21ac90f84076fa925f479,2024-10-29T14:34:04.427000 CVE-2024-50491,0,0,ffb8b923dd93f7c74c358c4139bef967636291541d659875ebd8ff3441352eec,2024-11-13T14:00:03.247000 CVE-2024-50492,0,0,ae81b2440fe0bf97f36da5ad0b3ecfbc7666d424011fb9be50f1b7aecd13b782,2024-10-31T01:12:02.283000 @@ -271841,7 +271841,7 @@ CVE-2024-50547,0,0,0e030664e7ea19cd482e62bf6455d50f95309f02a4e741c6efa2cdb66b3a8 CVE-2024-50548,0,0,06ba6bf66339def016f3d83fedb35b1c678e5a46ebfa4063607f9fc120a40a9b,2024-11-19T21:57:32.967000 CVE-2024-50549,0,0,2af9c8eb16d0d5df3a3924db0116bca1414336a86292abc2d9b9cc4c747506ed,2024-11-19T21:57:32.967000 CVE-2024-5055,0,0,f8ae470ae2dde69ddf2b332b37b71aadb0d703cc77eecd2fd207eb070c9be191,2024-11-21T09:46:52.153000 -CVE-2024-50550,0,0,8dbba3d726d42436b9836d1fb9d7dc3fbc2fc63338befd82bbdc27bb17c04702,2024-10-29T14:34:04.427000 +CVE-2024-50550,0,1,9ace15214ef2833a6d103e72a2e2a6a3a4ffc3c1f2b2e11e38c1a6fa01f48661,2024-10-29T14:34:04.427000 CVE-2024-50551,0,0,1f0cf864a7c2dc1b01f7c91830f6ced5779c910b53a04cac29b437c90a02ab6a,2024-11-19T21:57:32.967000 CVE-2024-50552,0,0,a6492eaa77ced6a17258a9d59478664bb6083d645af18ff120e9c62eb97f1d33,2024-11-19T21:57:32.967000 CVE-2024-50553,0,0,1ba91210a552eff70ddddeae13610dd3fb795c35c5ec6a668280d45ec56bfe59,2024-11-19T21:57:32.967000 @@ -271860,7 +271860,7 @@ CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce CVE-2024-50569,0,0,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 CVE-2024-5057,0,0,24284bac69b4c25212e4a35daa692adcac74ee6bf20853c9d795eba1dce69ef7,2025-02-07T19:44:53.660000 CVE-2024-50570,0,0,2d9dc66724750d347def0458b21203e33f8d848938408b5276fa284db7ba2a64,2024-12-18T15:15:12.660000 -CVE-2024-50572,0,0,25bb7df423298544245c461a86c9acabe7513c713503dff8879410321b191694,2025-02-11T11:15:14.237000 +CVE-2024-50572,0,1,8be663f21923f9c5796c23ec57db20f8cbce83a25604634f7b42c6b1d07e1a91,2025-02-11T11:15:14.237000 CVE-2024-50573,0,0,5e3f4c1fdb2489361c9b59a48c617ae9eab2b22b74a42b1c1ca13ebdc04a62f4,2024-10-29T17:12:14.760000 CVE-2024-50574,0,0,19a8794809392a79fd68e4eae98e9cf9304f94ab7b7bbefdac60fad919a3e7be,2024-10-29T17:16:11.277000 CVE-2024-50575,0,0,62b99a314392ecbe3f9e3dc6e6356ec2f79bb8528d7abeba15066c508f5a1aff,2024-10-29T17:18:26.957000 @@ -271899,13 +271899,13 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000 CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000 CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000 -CVE-2024-50623,0,0,a42b8474b720b20703db546b945276a382320df10b0eef38229afd3da2f40c09,2024-12-23T06:15:06.357000 +CVE-2024-50623,0,1,27494f1797b7bdeb5bac1184b037f385fc45a092b1f9da578da83ae1c13ad739,2024-12-23T06:15:06.357000 CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000 CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000 CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000 CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000 CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000 -CVE-2024-5063,0,0,9eb5abc31e9999b47c40da105900950e6086e6826ed7d6d84f0e5bb44bdde573,2024-11-21T09:46:53.250000 +CVE-2024-5063,0,1,f23729e8846bc383b3f22d55571644328cffe54603490da4aad8cbc3d562030a,2025-02-18T14:47:18.417000 CVE-2024-50633,0,0,8447ae8fa0b4e5a5b6295a68bdf62cfe1ea1f8940cf2403607b397d2eabaa3a5,2025-02-18T21:15:22.343000 CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000 @@ -271954,10 +271954,10 @@ CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e0265 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000 CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000 -CVE-2024-50704,0,0,33de55037448a6030b29028b7c032e00bcd17665a8884aeb1bb01713ccfcdcbc,2025-03-04T17:15:12.323000 -CVE-2024-50705,0,0,5fba789015dc4730dfd900eb12ed13b5d6925a0038226a440b770e2b421e3a62,2025-03-04T17:15:12.523000 -CVE-2024-50706,0,0,16ec6377302e1ac2758312752b9c9339ce67b853de406aa22e5e048065820580,2025-03-04T22:15:38.420000 -CVE-2024-50707,0,0,b4c98511e68eadc38c0eaad86845af9d03870972465b2ad348462d5ec825f76d,2025-03-04T17:15:12.700000 +CVE-2024-50704,0,1,69bd64f4adfcda3517b4882cc6a25c8ed3e3f6d03f3c577ed0761012c682d58a,2025-03-04T17:15:12.323000 +CVE-2024-50705,0,1,65cf15f1f985feb17bc9a4c655ba1eb006eb25236510798293bf591c2d12e921,2025-03-04T17:15:12.523000 +CVE-2024-50706,0,1,d69596f837b60310a2b2bab1c6b0b6e01254400e4491b7210a72c46fe61b1eeb,2025-03-04T22:15:38.420000 +CVE-2024-50707,0,1,7d0629d0c64951ef25bb953f992a079077bd1096557e39908b4002f3af0c2d5b,2025-03-04T17:15:12.700000 CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000 CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000 CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5076,2024-12-28T18:15:08.193000 @@ -272004,7 +272004,7 @@ CVE-2024-50836,0,0,2b207118e0a8a4ce500ad2ad82cbd68c1c17f6445a35919a8ad8d19d94e8a CVE-2024-50837,0,0,e4f50cb608a9502c76a99235bbbc28b472f4d4fa633e2640771600ede0bee6df,2024-11-15T13:58:08.913000 CVE-2024-50838,0,0,7b54b2e271a063a818d0bf4dff1ca05c047467f8817d2c7f31bf268cb99e8d34,2024-11-15T13:58:08.913000 CVE-2024-50839,0,0,fb7575ee1c3ee269ac106b6dd0ebe8c613257013972de7a3961ad74520bdcf56,2024-11-15T13:58:08.913000 -CVE-2024-5084,0,0,03c6027f11a8a05a61aeb37221e721820960f6c5aca582f8538c6c13f3a6433a,2025-02-27T13:30:57.937000 +CVE-2024-5084,0,1,65d6be0f29387fca481ee0a731159f91d661edc0a10463907cde44360339f48a,2025-02-27T13:30:57.937000 CVE-2024-50840,0,0,7f2672a897fefdffc52751836cb370e512db5cd32670b90dac2503d33dbff2c2,2024-11-15T13:58:08.913000 CVE-2024-50841,0,0,1b7ead830a48947d153ded94e12295c6952d0a7046aa507547ebb0fc4f177b31,2024-11-15T13:58:08.913000 CVE-2024-50842,0,0,f7b07a1b2b830ed92801fa7f1b54eb1abc0607cca9e6a36c8e0f57711c48f153,2024-11-15T13:58:08.913000 @@ -272144,8 +272144,8 @@ CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 CVE-2024-51135,0,0,fa01774bb08aee4b59b435101290c14a61aa2f8f92024c4c2f5242ac306ee6d1,2024-11-12T17:35:13.127000 CVE-2024-51136,0,0,ff2010b659e2be86e13e5cd548b885bcf03f33f7fea87be000ead8442d377536,2024-11-06T19:31:15.230000 -CVE-2024-51138,0,0,37240e8f1a0bcd9e28820870016a6fd4fb31a037ed0a4b0f8755d84e6063527d,2025-02-28T22:15:39.037000 -CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c3865554b,2025-02-28T18:15:28.047000 +CVE-2024-51138,0,1,6cd002f04da912e731d8237a40128b0efd14a75673c7f56040bbc5376cf95fba,2025-02-28T22:15:39.037000 +CVE-2024-51139,0,1,e0bd7ea22de8c935a43ebfba89686bd34522cc204b10d16016739466265995d4,2025-02-28T18:15:28.047000 CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000 CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000 CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000 @@ -272235,7 +272235,7 @@ CVE-2024-51364,0,0,14b2dee82d01d7389bab3881eda1c802d61b28380989b485af4049ffc6cb6 CVE-2024-51365,0,0,d837cc1586c1d4910b5dfde0140d794651911e802de0b0b7889dd342124292bb,2024-12-04T16:15:25.717000 CVE-2024-51366,0,0,8cb37b642efd94f1ef2cb009c97c3b6b6785b34318fa56f7821210d8849df437,2024-12-04T16:15:25.903000 CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000 -CVE-2024-5137,0,0,3fd7a49d8af86047a6ad6b3ac92bdd98d6aa55d94a0c2b53e103bca88e7e3f20,2024-11-21T09:47:03.080000 +CVE-2024-5137,0,1,b12a800f4ff86e9e23c697ed8946cdeb5481893a43fd1ee849f726622021a1d3,2025-02-18T15:28:59.457000 CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000 CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000 CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000 @@ -272253,7 +272253,7 @@ CVE-2024-51409,0,0,084b944bc571cbe682a95858718ef89eef5aff4f21cc9a356c9712b68f4a5 CVE-2024-5141,0,0,ef1fc3a8abb2248dc1075aaa92c468f9b71ed2a6f95f513df5e167bd1a7726ac,2024-11-21T09:47:03.473000 CVE-2024-51417,0,0,24b3b814afe084ed71e339ba2341ee7732881cb0faa4316aa437c8928628803f,2025-02-04T16:15:38.033000 CVE-2024-51419,0,0,98a28979982a6ebbf942e483f64a66dcbb5943a8a4d7c3ddbfd245760ff332d6,2024-11-01T12:57:03.417000 -CVE-2024-5142,0,0,19033b0a08969c5298ed457b0955133384806682a71d0c581cc736f151245bda,2024-11-21T09:47:03.607000 +CVE-2024-5142,0,1,99c64f9a9380691bf751a3e602c7fe3aa4ef0ed66518e0e844d04016cb1c1cbc,2024-11-21T09:47:03.607000 CVE-2024-51424,0,0,1f71d6224f9befbfc3f88ae1ebc8a838b12024ea8e79eff1bdf093cb107029be,2024-11-04T06:15:03.767000 CVE-2024-51425,0,0,4ce3f4757897fe8b12cee70bbd11414152d8bb59d86daf8081e050d1f340930b,2024-11-04T06:15:04.053000 CVE-2024-51426,0,0,3fa74adcab5127a3248acf90d9a43a17a348d90986dfa77989fffa61c22b2779,2024-11-04T06:15:04.200000 @@ -272279,11 +272279,11 @@ CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce CVE-2024-51464,0,0,1b2031370218977af474f39ea7b9c6eb15448100f9427860fc8d10cdd981ce8b,2024-12-31T07:15:11.307000 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 CVE-2024-51466,0,0,1b90c245992e2f466d154423146cea90d99df5f3b80547b5f6626d10019e0238,2024-12-20T14:15:24.250000 -CVE-2024-5147,0,0,8fbafca2fdd8f848d9909cb6aba93924ff1b404381295f27635bce00c52eaab9,2025-02-05T14:52:39.890000 +CVE-2024-5147,0,1,ab91f72de430745aa06435c0b83e5065e058ec932697e33cc7f6207ac6142bf9,2025-02-05T14:52:39.890000 CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000 CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000 CVE-2024-51472,0,0,f3c11cd77c7846a44169144fd921c2c0e0db8174944eee5fd716f8b0395e6de7,2025-01-06T17:15:38.517000 -CVE-2024-51476,0,0,38ce9c6359aee1035e09906170ed0e5c54174e877be664b5033f8187be6372ff,2025-03-06T17:15:19.763000 +CVE-2024-51476,0,1,d1fca3e0b3287871dd682d6a1225575e070559ee899ff855181136a9ccbde753,2025-03-06T17:15:19.763000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 @@ -272349,11 +272349,11 @@ CVE-2024-51539,0,0,b1af50f63ad59511e4a92be40db02a7d120fd35939f783b0ad1dc1ad8e6b0 CVE-2024-5154,0,0,2b204ac4cfe5700aeb8fd234238f6495b194bb11d4ab3c09549ae293c9be6a35,2024-12-11T04:15:04.990000 CVE-2024-51540,0,0,96d82dbba2ebe404a1a2ea6174b3264f3b486447b0ab540d34ad70a82a5fc066,2025-01-21T21:30:52.310000 CVE-2024-51541,0,0,c9fa65f0db41cbd195b6fe3f85d91a248d9eef8cf0c9d64a113c4c127df72368,2025-02-27T15:45:57.977000 -CVE-2024-51542,0,0,4752df21304495a011cd4eed3d9fd24c61eea558b0f5236669c58c33294907f4,2025-02-27T15:45:57.977000 +CVE-2024-51542,0,1,745ff9903bc801ad9d496954a9d75e5c31d38c8639dcd34afa4ed94770357294,2025-02-27T15:45:57.977000 CVE-2024-51543,0,0,dda5e3757c6ec0bc940604f7bc37b8ef00bb95c4a7402526351f0553f6d96574,2025-02-27T15:45:57.977000 -CVE-2024-51544,0,0,325e9b9391cc3ba8745f1325330592e15e067d71644b6841530f8debb9165804,2025-02-27T15:45:57.977000 +CVE-2024-51544,0,1,5c3ab9b5a1f77958dd8c7b26c8684749cb72723010e48848e1809926bf62a200,2025-02-27T15:45:57.977000 CVE-2024-51545,0,0,4fe47ab0c80bb49608fefaedbe41e87b893d725fa74da5c14f06aa496702b751,2025-02-27T15:45:57.977000 -CVE-2024-51546,0,0,eaf6780e74826ae42d9385f074fdf8b350a54aa5689cbed95bf4e8085ca156f8,2025-02-27T15:45:57.977000 +CVE-2024-51546,0,1,c608525a875262de84ceecfc983425e7020214913465915f504efdad4e38406f,2025-02-27T15:45:57.977000 CVE-2024-51547,0,0,284798ca23842160af51b2dcbfce3942370a38f03be14096eb93d043c31b4a69,2025-02-27T15:45:57.977000 CVE-2024-51548,0,0,09ee3b86691d3e602599555aa0975d5ed11a5c62d09343de3dc449a084772010,2025-02-27T15:45:57.977000 CVE-2024-51549,0,0,9ab18de99c2a8d5918788d977ea073d5c694867797533e7ae9f0a77411f98038,2025-02-27T15:45:57.977000 @@ -272599,7 +272599,7 @@ CVE-2024-51783,0,0,f277c0a48369b842a57f1c7df2c163da85fb1974f6239539db21e2b6bb6b7 CVE-2024-51784,0,0,19bf7a1ffeea442fd8bd4998e05f3ea4a2a1f0a24cb0a53e7604624620de528e,2024-11-12T13:56:24.513000 CVE-2024-51785,0,0,dc2dbae91b8652f69bca83bfc639b88ebc57f788ed6f503450c265ae2973ed2d,2024-11-12T13:56:24.513000 CVE-2024-51786,0,0,68ef470a167d633bef9a606c3c97ac3ad3eaebf206eb694969042d0da879b95c,2024-11-12T13:56:24.513000 -CVE-2024-51787,0,0,e16691dfac5cbb251995dc5852a6bb7c1e8aa72315d38401add7ec9a4d2a1973,2024-11-12T13:56:24.513000 +CVE-2024-51787,0,1,8574cae02d38efacb2d7c5458f657ad7863b64f4315798bad67b40e836b13f01,2024-11-12T13:56:24.513000 CVE-2024-51788,0,0,53ea64b8fae27a2a9a9b47f7602fbb19d9b96327f8351101e307289397cafa27,2024-11-12T13:55:21.227000 CVE-2024-51789,0,0,478507d3eb955736f0335dab88e6af8493ac05634e8331436206084a3e52d834,2024-11-12T13:55:21.227000 CVE-2024-5179,0,0,80c65dae9616178fba20fbf6d6bf73f1bcf31b9b1bf40e4effd14f2d8a966036,2024-11-21T09:47:08.330000 @@ -272768,7 +272768,7 @@ CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e3 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 CVE-2024-51942,0,0,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000 -CVE-2024-51944,0,0,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000 +CVE-2024-51944,0,1,1393aa4d7c14fce9c7be7c47b43311cdcced5c53e0705662ff2d6b3d141d094f,2025-03-06T12:29:08.017000 CVE-2024-51945,0,0,38f5a32d001f0190ef98670af553cf8909de1cdbe13a8644d47acb1a89844580,2025-03-06T14:23:26.167000 CVE-2024-51946,0,0,374690e9df38794b94ca4b4d59d90dab7831490073d30a4221e31c258c9b8934,2025-03-06T14:23:26.167000 CVE-2024-51947,0,0,e86d80d8ac1ca36d9cfee6310112fc4344a741f349117c7760dbe0154aa86ed5,2025-03-06T14:23:26.167000 @@ -272849,10 +272849,10 @@ CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c15760 CVE-2024-52050,0,0,a125e535af130d2fd1b3ef043255a982025942f8bb7617619bc6741a1327c411,2024-12-31T16:15:26.313000 CVE-2024-52051,0,0,656266c3e17fda1568434d2f818078c8b57e08b84d09e2ab4567a20e5395f0c2,2024-12-10T14:30:44.957000 CVE-2024-52052,0,0,8c649926317f2eec408b2ed226146683dbfb46ef688193535140e6a68f4f0135,2025-02-26T19:54:38.100000 -CVE-2024-52053,0,0,0c3dcafa6a1c71b7a5080d21d1dcb3e5bb882a5daca705cfd7d34813d2d226a0,2024-11-21T23:15:05.387000 -CVE-2024-52054,0,0,522b3551166af4b285ff04a0d937e93efeef9224494513d33116bbd2529472c2,2024-11-21T23:15:05.627000 -CVE-2024-52055,0,0,daf79cdf1987beaa6b99b0d3278c8802369629f29d872eb784783a3a3e3de00f,2024-11-21T23:15:05.890000 -CVE-2024-52056,0,0,486b28f5588f5968e551d71b3a2341fd13cb9e2f38dda7b062a777a128ee90b1,2024-11-21T23:15:06.147000 +CVE-2024-52053,0,1,badc073ee5e652247523ad67edc4fdae91ac14ab4d78982ae66d17a886f72edf,2025-02-26T19:54:38.100000 +CVE-2024-52054,0,1,1e58f3461e4495a1fa27c3b4795eb87648f008b1819fc37fcb3a7b4a6a63f298,2025-02-26T19:54:38.100000 +CVE-2024-52055,0,1,d75153c4b02500bd628cdd2554c58bb9e9354006fcfdbc0b2e341509b5a0b21d,2025-02-26T19:54:38.100000 +CVE-2024-52056,0,1,3cecde3204470a1bf633e6628b5768fbc91037de8ef60c0207cc8a3caf5143f4,2025-02-26T19:54:38.100000 CVE-2024-52057,0,0,922e5baa0db89d0b3ef1414acbf1f76b8743d0bc8c56b8ddc64653f05761d067,2024-12-13T10:15:07.320000 CVE-2024-52058,0,0,a40c35190bc59cadf1786a052e6cb2bfe56ef21cddce10f130ad038177c4b357,2024-12-13T11:15:07.900000 CVE-2024-52059,0,0,f17f383c0e0243861f53fd6a568f9c80dc4fa6b10e841344c88e4b79de4bb7ec,2024-12-13T11:15:08.080000 @@ -272973,9 +272973,9 @@ CVE-2024-52355,0,0,9d70dfb3f59ec24dc26d4ce32597b3e2c48a61d18563c278d9ffaa5125600 CVE-2024-52356,0,0,7cf8001c320273879f56eaf157968e706a7a9f2c3af1425536aaac6c97dad28f,2024-11-15T16:05:12.367000 CVE-2024-52357,0,0,3977790b309869c00dec2591481cdd9f644f99a92d9d38370ff66511a1a3150e,2024-11-15T16:04:45.767000 CVE-2024-52358,0,0,eff777e3be5ddb169c3548cec44602bbe2f0db010fa6395da9f6055a387befcc,2024-11-15T16:17:40.127000 -CVE-2024-52359,0,0,509efcb95ef880ccde43fccb440c416e0525cc864ec20eeb05761e61ccf2af92,2024-11-19T21:56:45.533000 +CVE-2024-52359,0,1,369d7e884d604d2eb0066df48107e087ee920c6d8b4747eda22757a28e2abadf,2025-03-04T18:19:12.327000 CVE-2024-5236,0,0,72033f225b8e0f124fc18b2ff12bb6275fc9f43982b89fe31becf9dbada4218d,2025-02-26T21:40:19.337000 -CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 +CVE-2024-52360,0,1,c4fe414474e842e8d63dc12dceaaf2879cc1099be8df01a296711ea8cd0807c0,2025-03-04T18:19:12.327000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000 CVE-2024-52364,0,0,82606ab35773dfde3fb3002f292688c503168f9c71015cb6232e593a409c127a,2025-02-05T12:15:28.743000 @@ -273185,7 +273185,7 @@ CVE-2024-52557,0,0,92e937cf8e7fb332f2446faa7310d3f16bf91d20c8333673249d3dacf580d CVE-2024-52558,0,0,862aa816f99d7d175aef88936bc531a11569a19b5f814c5d7b923875345c7e2f,2024-12-06T18:15:26.007000 CVE-2024-52559,0,0,f28ec42df706374b35efb9dc849e0cf610fab4ab3b25c10646734073a5ac0574,2025-03-07T12:30:28.963000 CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000 -CVE-2024-52560,0,0,a157928947741ad65d7b728c7067e441cd79f0d93587c14ee6f6659fb8bd471d,2025-02-27T03:15:10.573000 +CVE-2024-52560,0,1,17f5696064cc8a54449a3e1cfd601a790042146971352f114ead14ce71af8bb4,2025-02-27T03:15:10.573000 CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000 CVE-2024-52565,0,0,02d8cf9601a79a81a90ae9c5bdc3d5a4c9c0865f4264720b000e5fe215f3cc2e,2024-12-10T14:30:45.133000 CVE-2024-52566,0,0,ad9914b2c2d53afe57085e24afde6d252d9adbd5430cfab4bef8a3994295e334,2024-12-10T14:30:45.280000 @@ -273397,7 +273397,7 @@ CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afc CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000 CVE-2024-52923,0,0,7af24c399d2e082313dcc8b190c9f6b3a11f01ef4d18d0577e4aaf5cfdf114a6,2025-03-07T20:15:37.073000 CVE-2024-52924,0,0,9f25b8093a98fe41a44f89a1ddecf4d6d7ce96f4348fbbc4e3aff390830ed617,2025-03-07T20:15:37.240000 -CVE-2024-52925,0,0,94495667e9e08fa1d0d119d4faf0b9b5f1ca27514fe32d58631c29811775f341,2025-02-26T15:15:23.867000 +CVE-2024-52925,0,1,4d21065ff66a1748231e5c3543316979502c5f13302562a708f4fc89ea5a4eb2,2025-02-26T15:15:23.867000 CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000 CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000 CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c479,2025-01-13T19:15:10.993000 @@ -273459,8 +273459,8 @@ CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a53824 CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000 CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 -CVE-2024-53011,0,0,6541fabf7a5e7d0669e1f4c44e5c4716c7ec9d8cf2120ac219f149b9e79ccc2a,2025-03-03T13:15:10.853000 -CVE-2024-53012,0,0,f829f2be2897b05770fba117015cdc095129f5aca857f32e3d3e206b67416909,2025-03-03T11:15:13.280000 +CVE-2024-53011,0,1,059930342a36ef37b555ef0bf61b78539bde6e509c8ecece3b0e9921d15fbf4a,2025-03-03T13:15:10.853000 +CVE-2024-53012,0,1,3c5aba55ac99bf2bd591a4b83cc794eaf27122485b8c678d6a81750e4f472fa7,2025-03-03T11:15:13.280000 CVE-2024-53014,0,0,9c1edb228a5b8cc996160851a8b343e3ab0752f1faf2a9a0b97b21596a7476c1,2025-03-06T17:52:55.370000 CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000 CVE-2024-53022,0,0,bf37234b3029621977db8a6eb910eaacbdefe222a51ee4b1dd0e6bc99734b38b,2025-03-06T17:52:55.370000 @@ -273468,8 +273468,8 @@ CVE-2024-53023,0,0,bf23b73400f9851a9b41a5eb548982848a1f1634ce7614e9cb1e60cb065a9 CVE-2024-53024,0,0,dee384a56a392bb5c68af003e0565435d517937d0c855508efc39ab47a26479c,2025-03-06T17:52:41.783000 CVE-2024-53025,0,0,16c1f10a9e32146258f0298653aa7c8d9aa99a8093c702b0136a087cb12cc311,2025-03-06T17:52:41.783000 CVE-2024-53027,0,0,7e26db2b11e78988a639ecdb6205eabd88644f64d5e4e6ee02565356b8b93b25,2025-03-06T17:52:41.783000 -CVE-2024-53028,0,0,1adb2bc3a9fffb0f3270ec1a52d1282da84ff633e0579fcb5f081c5602eab4bf,2025-03-03T11:15:14.460000 -CVE-2024-53029,0,0,6b15739cda1fd16dc50d37e7b0bac1f5ddb8ebcde19352cac213a642e632c56b,2025-03-03T11:15:14.617000 +CVE-2024-53028,0,1,0f8c7cb333f9efd15606c31933a6b0cf71dcaeb24d151c3e98766306abfb6aee,2025-03-03T11:15:14.460000 +CVE-2024-53029,0,1,0ecb64bf56adb1e50b1c5c29c1952e2be5b8c0ae25e453f049f2d48f07a07393,2025-03-03T11:15:14.617000 CVE-2024-5303,0,0,3ed489db17064b2aff86e9a31b51d53d757813a529fdb6ed7379a772174cd7ec,2024-11-21T09:47:23.590000 CVE-2024-53030,0,0,8f1e71ce351192807ebf7de74565270bf7963168d089d39635d48e74a1224dc1,2025-03-07T11:47:34.540000 CVE-2024-53031,0,0,9e1b06892c743f5d9a147a812f1f0993fe3776c2cb58fa0dcd9c100b3449f7cb,2025-03-07T11:47:34.540000 @@ -273698,7 +273698,7 @@ CVE-2024-53242,0,0,951ddb4b6f620a267d348f005ad18e193ee858461e708335d3d7b94c2b54c CVE-2024-53243,0,0,0055f373ee76668c96d6bfcf8a6f00835a4bd98d186934410e0656653ee7c808,2024-12-10T18:15:41.093000 CVE-2024-53244,0,0,8ab64fc6c408ab75c7fcd2976b2f913eac512d7587dc319e310d3559937ce101,2025-03-06T19:54:57.093000 CVE-2024-53245,0,0,3240ff05e80470ad0909b77b8789a110c0339586cd0134fd740f67ea1b43e760,2025-03-06T19:54:57.093000 -CVE-2024-53246,0,0,f508ff57ce46569426027f607ebd345d92cd707d202551709cada6e889f553d4,2024-12-10T18:15:41.553000 +CVE-2024-53246,0,1,198d43d996209dbd0de5c43f4d885850e48a10abcc73d2700f84ef62e7e3e689,2024-12-10T18:15:41.553000 CVE-2024-53247,0,0,bc83b9af87256557839cb9887ebc94d8027f3118f62d49387889799a0e85c9ce,2025-01-02T18:15:19.887000 CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000 CVE-2024-53253,0,0,e465b741e355f1ce9ba45867c01a177432bba9be4e62dbf601e6676bd13fe6f1,2024-11-22T20:15:09.210000 @@ -273771,20 +273771,20 @@ CVE-2024-53375,0,0,03acfc3ce1465046824ce662fbf44dee8291f967ecd696fbbf82e7a2b1461 CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065ad0,2024-12-17T20:15:22.380000 CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000 CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000 -CVE-2024-53382,0,0,2488076516d1ebcfd2ad12e680a94caed7283ef6a09ea27a43a166505c7166e8,2025-03-03T22:15:35.637000 +CVE-2024-53382,0,1,c5104468b3ad78fd7953a09f821d9dffee4c25f17107a068d2d078b1d4aeab93,2025-03-03T22:15:35.637000 CVE-2024-53384,0,0,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000 -CVE-2024-53386,0,0,7f05252fb8b0d166f1c2ba66ecc4b7344953d98b8f75dafbb0948fe4c267094e,2025-03-03T22:15:36.583000 +CVE-2024-53386,0,1,4f740f73a87c193e520100cc93e13e2176358015da32a9b1618be2b00c67ed2e,2025-03-03T22:15:36.583000 CVE-2024-53387,0,0,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d896,2025-03-04T17:15:13.043000 -CVE-2024-53388,0,0,8b8dacfab9439ff4969bd847d9389950511a224c15ee4c724e3aaa2186354ee1,2025-03-04T17:15:13.217000 +CVE-2024-53388,0,1,74c76ad7bc6f5ea963364a19f441da609f31d2dad038836a2072f637e7a0b0a6,2025-03-04T17:15:13.217000 CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000 CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000 -CVE-2024-53408,0,0,bca41a6c9a00b3326c58a5e4ef803bf4bc97e2a577bf3cf6dac35f1dfb354578,2025-02-28T15:15:12.317000 +CVE-2024-53408,0,1,1aab9be4aaf2573b8ac1b0fb3d37a28e2e7437d63a980cdaed7de900ff3950a1,2025-02-28T15:15:12.317000 CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 -CVE-2024-53427,0,0,d28e0711d9d026b87f40679d7c994c75df092e375a9048b3c2c8e1debe434a7b,2025-03-02T02:15:35.860000 +CVE-2024-53427,0,1,5e821b042543ee82d33c34720304409034d0bf41a56200df2ff2594b425b9fb9,2025-03-02T02:15:35.860000 CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000 CVE-2024-5343,0,0,a520df0d2c87c5fe35335a1b343c956cc8dcf1b7b7959b5acc51996bdc11fd0c,2024-11-21T09:47:27.647000 CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d645ce,2024-12-04T16:15:26.240000 @@ -273795,7 +273795,7 @@ CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db166141872 CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000 CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000 CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000 -CVE-2024-53458,0,0,641859a5600bbf3f0e54a9968e7e6b822daf3d47438a24462013c8b12042fd66,2025-03-05T21:15:19.270000 +CVE-2024-53458,0,1,558f36cb5d79d81b7eb93bd7f6d9cd792e2c460543c042a49b153010185b962b,2025-03-05T21:15:19.270000 CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28 CVE-2024-5347,0,0,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000 @@ -274077,16 +274077,16 @@ CVE-2024-53866,0,0,7c26df18b8eefa13ad0ad0c6ecd46053a064a42903d2aa3ee2848acf96dac CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b2b1,2024-12-03T17:15:12.787000 CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 -CVE-2024-53870,0,0,10c3a240834f6b5ddb1de499f5fd81947aa0cbf663b37ac11cdc83ca86e969d5,2025-02-25T21:15:15.943000 -CVE-2024-53871,0,0,758edde4448c4c996ab710ab8039c510181efd3b124d7538dfebf950e158ac44,2025-02-25T21:15:16.100000 -CVE-2024-53872,0,0,b551d04637dd02da41aa653799c669d5e2d51981ab30182518646794705457a0,2025-02-25T21:15:16.240000 -CVE-2024-53873,0,0,3a9fcd10dafa603aa12b0fcdd92e039e7edf0f2c852e8d69f344549c303b32d5,2025-02-25T21:15:16.387000 -CVE-2024-53874,0,0,67b9049f6c05d20d263b0a571ede77fda396744d3846e81f81c5fb6b4e04f559,2025-02-25T21:15:16.527000 -CVE-2024-53875,0,0,429223ae4ccb076df6bb82252f4caf75e76920ae31975320093a688514f37ba8,2025-02-25T21:15:16.677000 -CVE-2024-53876,0,0,d6deac8d2ab7abc96b9e8c848e0eb6575fc028cb0d457836c5efeb18c570922e,2025-02-25T21:15:16.827000 -CVE-2024-53877,0,0,c17adc09fc4ad219b7fa0e55d98bb7dc538dd59cc1e58599ad199c95d477d1b5,2025-02-25T21:15:16.980000 -CVE-2024-53878,0,0,7d4b2f29ff120c235ca0a2b08dc883e6bea2b12cac1897b5a31c3f3ae1448e4f,2025-02-25T21:15:17.127000 -CVE-2024-53879,0,0,e55f2fc3f0974944aaf43eb8c74476ec2130420d21e1ff307fd73cf1444cbdce,2025-02-25T21:15:17.280000 +CVE-2024-53870,0,1,2c7303e4c47509b62c1bd8938d6254e945f1f0fcb6b744c9ceb7775a7bf75591,2025-02-25T21:15:15.943000 +CVE-2024-53871,0,1,958340c42f0599c32806742a0a6c064e0ff15feda6eba2a15c6d0c36a8497028,2025-02-25T21:15:16.100000 +CVE-2024-53872,0,1,66a03eefd53de85a89236352286a7e2dee9e4700477289c0f018b3319a5ad50c,2025-02-25T21:15:16.240000 +CVE-2024-53873,0,1,527803c323979ec9d1a37e703b4322496fc9dbb9a681cd97b1d3ed3c8271eac9,2025-02-25T21:15:16.387000 +CVE-2024-53874,0,1,d79fd3f18d1b8fe98d9c7a99197dc07b2bcd3039b59f6a9ec5cf169231a50c3f,2025-02-25T21:15:16.527000 +CVE-2024-53875,0,1,e101b07ee6804f592380d35a516cde161bab40e659fad541ae7a89b95bcc18d7,2025-02-25T21:15:16.677000 +CVE-2024-53876,0,1,1a3922b7239137c25bc954c39a2f792aab283261b78aee7abbbb37487167baad,2025-02-25T21:15:16.827000 +CVE-2024-53877,0,1,34061501f5328c438472352a17a56af45047b4211a4e199bc6e7a6d48fd13323,2025-02-25T21:15:16.980000 +CVE-2024-53878,0,1,ae94318fd8476f201c392f2fe4b0bc2e9fc7917960ad24a915ddb654cb804c97,2025-02-25T21:15:17.127000 +CVE-2024-53879,0,1,ea08a206ad5f156491c8a7bf70e02d48d285a41d140556f8092e0f09b5d29d60,2025-02-25T21:15:17.280000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 CVE-2024-53880,0,0,8dcea8918e1ffca5996c89b6398d03de8dcf18de3593db049951713706669fc4,2025-02-12T01:15:08.940000 CVE-2024-53881,0,0,9961109f8d29619e875e57c963e9962bf41cbd2a63df9c973c97fd1f736a0a6c,2025-01-28T04:15:10.170000 @@ -274150,7 +274150,7 @@ CVE-2024-53964,0,0,8b957f9c6ca1dec43d35dad3b6547f3c315ba420617d586a20a9f871b1db4 CVE-2024-53965,0,0,fe5265ed578fcf02d9c7551665c4d02d94d57b5c2a197155d2f383c80e4623ad,2025-02-11T16:05:25.927000 CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85133,2025-02-11T16:05:33.017000 CVE-2024-5397,0,0,89774c511a239a1ed95cd17067521dedc3be39934156206fe435c9bb8361b89b,2025-02-10T16:20:41.830000 -CVE-2024-53974,0,0,a0d313c272f4c46853bcdb0ce3fa680485b549335ae4c3fe397ac26b74420242,2025-02-19T18:15:23.543000 +CVE-2024-53974,0,1,d9f8007a4f042740de8d60dd5ddbbaaddc58385d2ce66c0f75723d4b9c7b13c9,2025-02-19T18:15:23.543000 CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 CVE-2024-53977,0,0,379c288a87ade1ce92aed60d080a9706136a00417615f6a0b567d55784aea895,2025-02-11T11:15:15.063000 @@ -274222,7 +274222,7 @@ CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42a CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 CVE-2024-54091,0,0,c74ca88b9c9f1f179fcfa192e0d2590f76bd392ddd6ead18a993fbadb250f86b,2024-12-12T14:15:22.953000 -CVE-2024-54093,0,0,90cfd514a71d6aff56ccf462952cf23d9786fa3e801cbeadbbd1eb38e63e92b6,2024-12-10T14:30:47.350000 +CVE-2024-54093,0,1,5e3f2460f6978d96d50929b5e848464a811985231c72ddc70e07440fba0a6be9,2025-03-04T18:19:12.327000 CVE-2024-54094,0,0,7e40ab3942715aa9bec4bb94fbfea6c6abd1a5baf96aa364a533672091025692,2025-03-04T18:19:12.327000 CVE-2024-54095,0,0,0027211cfec45475cc40eeaeef135f682a04eedc757a2d4b406c768677ab825f,2025-03-04T18:19:12.327000 CVE-2024-54096,0,0,107e3e1e9fce43db7d66d8992c64f13742c7ff6e28d2e11adc856e52e2f1a3e9,2025-01-10T18:36:31.427000 @@ -274296,14 +274296,14 @@ CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e015 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 CVE-2024-54160,0,0,4df1c13c84c21e9aa7050ae9319fa9577473b95f44c8e77953e28575fc0cc4c7,2025-02-12T15:15:15.050000 -CVE-2024-54169,0,0,0939359d4b9a817e49f2bbf9bd749de425c7d292b4cefe522d7046d0baeab533,2025-02-27T15:15:39.100000 +CVE-2024-54169,0,1,4b2f57e18e78c986eaeb4f9842a99f38473f01b36e304c909e816683b15c79ba,2025-02-27T15:15:39.100000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 -CVE-2024-54170,0,0,bd9944fe2c2174febafa60e812ae36970578b31970fc59f9e911192b4cb4909e,2025-02-27T15:15:39.240000 +CVE-2024-54170,0,1,42dce6648e1132820da06b0e9c69e1655ebe361e65ea7d3b232a8af6a5ebbee4,2025-02-27T15:15:39.240000 CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000 -CVE-2024-54173,0,0,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000 -CVE-2024-54175,0,0,c1e7728d62bcc6a90f42056250e43b1315e91328a6c3f1d3dfd9c3fe31c3d839,2025-02-28T17:15:15.487000 +CVE-2024-54173,0,1,9626ebf00dbcb8d683d602e32e68262d1ef27b7e0ae499ee14c2f9df981917bf,2025-02-28T03:15:09.357000 +CVE-2024-54175,0,1,dcd933980c8625eff6e40ba07fd50066fd2a312acc8a700bdd0d7e81cd78e351,2025-02-28T17:15:15.487000 CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 -CVE-2024-54179,0,0,106483972fb2922e31461a6225a30434b369effc09cdffc6d0f668a1291894c2,2025-03-03T14:15:33.960000 +CVE-2024-54179,0,1,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000 CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 @@ -274332,7 +274332,7 @@ CVE-2024-5422,0,0,2db6272ad43a6dfdfb4a2f799e76ec3dc4554fa61406e305deb4c904ad98c2 CVE-2024-54220,0,0,f15ec16a2d22f6768097c5dc489b126ac6e60f1050d3f8bfde5ed360a23f26b2,2024-12-09T13:15:42.257000 CVE-2024-54221,0,0,0f9ca09bbe377e313036602186d5805db6d063f2e59034ff8ec239279f0d7ded,2024-12-05T00:15:19.200000 CVE-2024-54223,0,0,477c85b9fcffd9d6610fcc8be66c0949cbcfff6b5cbdb3b55518a1676af7ebed,2024-12-09T13:15:42.397000 -CVE-2024-54224,0,0,2c385a499ac3a347c53140592c0e5b1b6a2f8c5b3123d9aacf33c14a9d806f27,2024-12-09T13:15:42.530000 +CVE-2024-54224,0,1,32552c46a2c6f7e8896f85ee736c76a4edacb06ac3f50dcba451a5817276ca7b,2024-12-09T13:15:42.530000 CVE-2024-54225,0,0,718637207634ce393328c74b719f6195ce980edfa43845f62d44bb51a571bfe3,2024-12-09T13:15:42.660000 CVE-2024-54226,0,0,96db7c741f0175e61ef18acd2b8374057aea5d1c8bb19c9b0568d7c49ff45ed5,2024-12-09T13:15:42.787000 CVE-2024-54227,0,0,4593859a9f1e1945e9c644d6e0c78fb64e4629e76e799479c9b09ceaf5cb45d6,2024-12-09T13:15:42.910000 @@ -274575,23 +274575,23 @@ CVE-2024-54452,0,0,30db43977a4bb0060f4301184eef5e7e4316f5a66e91aba57b8474d2cdaf0 CVE-2024-54453,0,0,4b38818ec57830d6d15331deb8fc6306f0e91d48c89fb133c6569d5b7d3ea04e,2024-12-31T19:15:47.147000 CVE-2024-54454,0,0,d67e1bf29a3aaa483b825ac163d62022e2785b5de9b64863f3bc27235cd67fc7,2024-12-31T19:15:47.310000 CVE-2024-54455,0,0,20565313a23365c4c17140fe19943535439cfbd982b6e19cd3463b943b5d9db9,2025-01-11T13:15:26.970000 -CVE-2024-54456,0,0,87bc8583905446304c1ed25f35a657d1dd77150d7753437329c229cfedfaee7e,2025-02-27T03:15:10.667000 +CVE-2024-54456,0,1,3fd3ebd2b4a02998a1bd7b1d47d1b9851b4563efaf8111417b0111d4c2f11a6d,2025-02-27T03:15:10.667000 CVE-2024-54457,0,0,da0353a7ec7d859fd477580e7c54e31a24aeea86ab2c2ac2e00b7a1eda59c2cf,2024-12-18T07:15:08.377000 -CVE-2024-54458,0,0,4976c226e9d4946f8f9bcc2d54aadad926ee01df903299385e8e2b1b09dbfd23,2025-02-27T18:15:27.273000 +CVE-2024-54458,0,1,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be6aa,2025-02-27T18:15:27.273000 CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000 CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 -CVE-2024-54468,0,0,715104ca0b6c1a1cad02c22a38b15a1a796da9c8d70b62dbfe623e7e0b6020f5,2025-02-18T20:15:21.303000 +CVE-2024-54468,0,1,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 -CVE-2024-54475,0,0,99e7b6a967cb548a8f7d59189b48f76bd4577901da5a0dcc281ac5f5fe256bb3,2025-02-18T20:15:21.400000 +CVE-2024-54475,0,1,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 -CVE-2024-54478,0,0,64adda4be80abdb32693c9503e7b72ac9aaf47acf5a9fcb0524cd7cd786fe722,2025-02-18T20:15:21.487000 +CVE-2024-54478,0,1,6e01d1244c3395d099fe732bd4e775fb585a1d7434d5755b382581c7759ee480,2025-03-03T22:45:38.540000 CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 @@ -274617,7 +274617,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000 -CVE-2024-54507,0,0,b512b9579ff733d4241b49a0f3c31467b05c9fd1440a42020a7d5d18df985164,2025-02-18T20:15:21.580000 +CVE-2024-54507,0,1,bd33a71966b0ab6983ded5446d7eb71bba801b37a1147b84f0b13bcb99e4ef45,2025-03-03T22:45:38.540000 CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 CVE-2024-54509,0,0,8e0d74bab4890394dac3b45f0c7481e7baedb2f043562156e960dc6338a793e4,2025-02-04T22:15:41.013000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 @@ -274629,33 +274629,33 @@ CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0 CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000 CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000 CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 -CVE-2024-54519,0,0,c6020a6a0e5f686e4b12ce357196d7d51635d44f792264d9e46f7b948a12e6dd,2025-02-18T19:15:18.610000 +CVE-2024-54519,0,1,ac20715adcd677814b78acbfc807a40b03ca00709ed2017ed1dee8e9d24e2ba5,2025-03-03T22:45:38.540000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 -CVE-2024-54520,0,0,7e525b2d74e89de579f7efdfa9f34a5f54e391066d27297a912aed9c124d3891,2025-02-18T20:15:21.663000 +CVE-2024-54520,0,1,7c9de11c44fff1c811e179df844df8d513ee8b6c64588ba95a8090a4b113d6eb,2025-03-03T22:45:38.540000 CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000 -CVE-2024-54523,0,0,349c6c214a5c59c0ff2f5f239163d2f3b62ca2366b11b2cd254cbe71c5701c74,2025-02-18T19:15:18.747000 +CVE-2024-54523,0,1,674ac1917bf4eaf109e9c426ee5ce234772d64728eff3ac32a79cec50f432d27,2025-03-03T22:45:38.540000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 -CVE-2024-54530,0,0,705464c9a0a756d5c3e91032dae158dcee837d411e10044a0c471a2df4158577,2025-02-18T20:15:21.750000 +CVE-2024-54530,0,1,fddfd2e1ffbe3ff558ba0c6dca90cad99887fcf8c484b5a1ee05b786024ea3fd,2025-02-18T20:15:21.750000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 -CVE-2024-54537,0,0,96ccf27683e70b11f9c35c043de4a2ff663863a95cffb5e578506e8b93b1a170,2025-02-18T20:15:21.837000 +CVE-2024-54537,0,1,92274b4a35a01c681a2e141f1b2fa912ce7ea07aaf022cdd8fa316730011ff67,2025-03-03T22:45:38.540000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54539,0,0,a70f1b6dab3a2a1f819fe4ef368081251c246e8aa1f1744326e56dda393e19aa,2025-02-18T20:15:21.923000 -CVE-2024-54540,0,0,441e89d495ee62293a2a52ef17a4f82bfbb3f28dba109186d6bbcaba77fe0794,2025-02-18T21:15:22.697000 +CVE-2024-54539,0,1,01a7d44c10c6c32e638c545d288dcc2e4fdebabd02bc742815f2f95b4b761502,2025-02-18T20:15:21.923000 +CVE-2024-54540,0,1,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc3165a,2025-03-03T22:45:38.540000 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 -CVE-2024-54542,0,0,90a1ad24737601b52ddbec65ada846abf337c776b5e75172c267ee66c7f2a1dc,2025-02-18T20:15:22.007000 +CVE-2024-54542,0,1,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 -CVE-2024-54547,0,0,37f2e22a1f0d3ed68cb30ca6ba9a145b8010ce6e67b084a642b2f01d214b285d,2025-02-18T20:15:22.093000 +CVE-2024-54547,0,1,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 -CVE-2024-54550,0,0,d4c89cfcbd99ead222635e40d41916c726eeff52ae1d804ee84b0577cbc3708e,2025-02-18T20:15:22.183000 +CVE-2024-54550,0,1,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -274664,7 +274664,7 @@ CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d73 CVE-2024-5460,0,0,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000 CVE-2024-5461,0,0,0e5c35015ef9c17a01014ad8587e8a058a39ac46cc767abd7817343a80dc0b2e,2025-02-15T00:15:13.513000 CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f68b,2025-02-15T00:15:13.650000 -CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000 +CVE-2024-5463,0,1,df16222292b4c6a749d76b114eeb9aa6de93935f075e7e4a865c7f25eb65bba5,2024-11-21T09:47:43.833000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 CVE-2024-54658,0,0,c51d7b235a06e000d006cb570ad201153e6a0063880f45bf4be65fb7411135b5,2025-03-03T16:52:20.953000 @@ -274777,7 +274777,7 @@ CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cf CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000 CVE-2024-54954,0,0,c5f7bba0f482724c8baeb34ff731ef8127c621f5f601d09231830cf72a39e47f,2025-02-26T19:15:22.440000 -CVE-2024-54957,0,0,d0c111cc2d7d3d0df4e7a6c0b95859d88d8d979df525778250dc512805cb8aed,2025-03-03T16:15:38.450000 +CVE-2024-54957,0,1,e4e8d12c7fc7d58c0714df01efc15cd62969d1708fd6892bccb61bf01ac33284,2025-03-03T16:15:38.450000 CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000 CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 @@ -274808,7 +274808,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-55062,0,0,3123150d46b761ada11b83c374a54e9242d8e139ac058a4ffae965af3a17f30c,2025-02-11T22:15:28.900000 -CVE-2024-55064,0,0,b0b34f0c868ee7b5cfd21e0c4e754219f5b5a28eed1f4b98f4ec5b14166073a2,2025-03-04T17:15:13.390000 +CVE-2024-55064,0,1,70f98222c4c92f0be7ff2c6564317e89c4319e9fd63c54dfe64d11168bd08ba5,2025-03-04T17:15:13.390000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-55074,0,0,1bb56c00ce7b87cd6028403786c83c9593cbcc8954e072dc461304855924628a,2025-01-06T21:15:14.803000 CVE-2024-55075,0,0,4928182cae41a13ce4b894fa02b7ed8267f67e5fe7ff39725507907b9004a7ab,2025-01-06T21:15:14.970000 @@ -274835,7 +274835,7 @@ CVE-2024-5515,0,0,55e8a346ed4b5156add8d5d4764b4fcbbcd3f128ffe8273b81d6c93a5192c8 CVE-2024-55156,0,0,047a3c5a6f209e8eb9fb8475b27346fa1fbc5a9a2b9777c641dd68bdd26e4778,2025-02-21T18:15:18.540000 CVE-2024-55159,0,0,4a0a9cc5fc22fa8488e14d07795095f6dbe86f6d6a4bb90e1244dfeccc3a07d6,2025-02-21T18:15:18.707000 CVE-2024-5516,0,0,e06cf16e59a4c312854169722f307c5b1c3df8696d5f2dcd2a942cae721ba3e7,2025-02-11T15:12:30.713000 -CVE-2024-55160,0,0,11a0bf9e53badcc10e04b61dc64f019be635a5fab9b8ca8d85bb5bc4a7d74844,2025-03-03T16:15:38.617000 +CVE-2024-55160,0,1,ac2eef26ef9235f9e158312395fadaaa73a3ce198c34044ad5e9a2af973642a7,2025-03-03T16:15:38.617000 CVE-2024-5517,0,0,aeac710ef90dc4db283f0d86d7fc3c11ec410a5f07233ec58c2840a5440c4d3f,2025-02-11T15:11:46.037000 CVE-2024-5518,0,0,592daa13d5f40c4bec892c0e751c69d9592d967bcef9d52a8eeab5abfab02e78,2025-02-11T15:10:47.877000 CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000 @@ -274871,7 +274871,7 @@ CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc CVE-2024-55272,0,0,ef14617a4d3ce8cc1845d65711aa8945a1805f56297ecc9637c93eb386dd09a6,2025-02-18T19:15:19.123000 CVE-2024-5528,0,0,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000 CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000 -CVE-2024-5530,0,0,20acb6c1987c6161257ddf672e36cea2be82a3e83819695c501903d5599ba0e6,2024-11-21T09:47:52.657000 +CVE-2024-5530,0,1,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 CVE-2024-5532,0,0,23c4978c8c684edaa8b0b6827b3bbdb5dca4d9ba0bc473042cb29ea594ed00d8,2024-10-29T14:34:50.257000 CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1b2,2024-11-21T09:47:52.963000 @@ -274937,10 +274937,10 @@ CVE-2024-55532,0,0,ccd28e4c4b4945e7683ec8a94d7043e8fbdd4bfcc022d5a0d308010d67cc1 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 -CVE-2024-55540,0,0,e9fcafaf626e3108ce7269d7162c73323bd0e2095d3b5a8e2e744fb24dc1880b,2025-01-02T16:15:07.847000 -CVE-2024-55541,0,0,7fe795cc9115c3dfe4190336f2e39befe4b574111c291f72dc0ca926cc132b7b,2025-01-02T16:15:07.970000 +CVE-2024-55540,0,1,854f0fe60efd94fa8284a29a71973d7f96e063a61aca1be3fb09bf953cc69d22,2025-02-26T18:25:29.120000 +CVE-2024-55541,0,1,3c9a5a77587736cc09dd8def474447c53b9e8e51064235b4204272bdc3fe0261,2025-02-26T18:25:29.120000 CVE-2024-55542,0,0,0c5aacc3c58a58d39435dfb11b1d740d07e3375675a4c55cdb07626c287bf056,2025-01-02T16:15:08.110000 -CVE-2024-55543,0,0,3c1c8c69b9a4dd1943a5973532c12adec4f38c81f0a5b80a83e2589810968ad7,2025-01-02T16:15:08.237000 +CVE-2024-55543,0,1,09855721b1f8a1b0c8bf67901cb20f475a3e9295269848a67011d80e2dec7de3,2025-02-26T18:25:29.120000 CVE-2024-55544,0,0,0753324cd87dfd6c5d45bd9cae5d04d3d980dd5b650f6895bd8f2ee2d772c4fe,2024-12-10T20:15:21.147000 CVE-2024-55545,0,0,825c2ab4e009b2ca6d1e35e32787bf134b3c4c8367ebe2fdc76558e37ce64c19,2024-12-10T20:15:21.280000 CVE-2024-55546,0,0,1ae9bd2d99a18c0457a67b1f4de18f7ebd517c2417794178423edb78d9168dc4,2024-12-10T20:15:21.403000 @@ -275054,7 +275054,7 @@ CVE-2024-55897,0,0,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f991 CVE-2024-55898,0,0,adcc5d516d89a41277ae34a6de418cf17da58482170efe79dea1e265741329cc,2025-02-24T02:15:31.940000 CVE-2024-5590,0,0,1e127169a6d11120a9395f2effaf6ec6531c09b92460b351c9b795dacfe5c5ec,2025-02-07T15:10:57.540000 CVE-2024-55904,0,0,985e264a3f8f59b658a98ed276a5675a14d822dac410c29893607d517450a9ef,2025-02-14T04:15:08.753000 -CVE-2024-55907,0,0,0751a7e8342da583a1aa00e0d3217f178737262107bfe8f2640e91cf1edc9019,2025-03-02T16:15:34.577000 +CVE-2024-55907,0,1,4c1e415bdf8f7641a1b178418bde0f344146cbdd158b634787f9c31634de79bd,2025-03-02T16:15:34.577000 CVE-2024-5591,0,0,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73ee7,2025-01-03T15:15:10.813000 CVE-2024-55916,0,0,bb2f39fb2dbe90e6c07ae14f8caf688273b3c9276641493fe6ca8dc8b8b6b9eb,2025-01-16T15:18:39.293000 CVE-2024-55917,0,0,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000 @@ -275191,7 +275191,7 @@ CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39f CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 CVE-2024-56060,0,0,d52c48295d0dbb3abfdc5dccd1daa1a43773049add0bc86c3cdd22c212f008f3,2025-01-02T10:15:08.643000 CVE-2024-56061,0,0,a028e486e70270644a1996649c2c3b8450478b85bb5ddc1825cc066d2525f2f5,2024-12-31T14:15:24.970000 -CVE-2024-56062,0,0,0710d5a9eeb90721a35932b9d93096a40330ad3819456d48d0db54e95031a5c0,2024-12-31T23:15:41.237000 +CVE-2024-56062,0,1,263e0863ad3bb72be2363858c2d7089a90ee0d7b0b4dbe0230169bc0091fc092,2024-12-31T23:15:41.237000 CVE-2024-56063,0,0,81a7b7a2d78bc29a5f5fcce3a74b9d8a0b1c655402262c170b63dcca2ef85513,2025-03-06T14:25:09.843000 CVE-2024-56064,0,0,0d85e693a6ee180923e3bd9bf5f6c4beff2647e62cc73ae1ee472d7fcb52494b,2024-12-31T13:15:08.157000 CVE-2024-56065,0,0,1e7e79ad901a249cf3b84fdd4f95f74b4dc3e18729cca8dceb16fa0af04fe16f,2025-01-13T14:15:09.117000 @@ -275283,8 +275283,8 @@ CVE-2024-56222,0,0,8810dd9c4275622264198a551b3e10116409c38a6d308f62b5625200c1c0e CVE-2024-56223,0,0,cf7b20f3d20067df73affdcf9ec9590890a2805e825d483671787f5cda604665,2024-12-31T11:15:08.090000 CVE-2024-56224,0,0,c33122241f6fdaccb34e9d12df45ea9fac34e8317b626d4fa6f4c067498b02a2,2024-12-31T11:15:08.240000 CVE-2024-56225,0,0,eae3aef797232b3b73a3d6f99d8fc026550db6704e5d9b7b4ec7184e2104cf2f,2025-03-06T19:02:47.083000 -CVE-2024-56226,0,0,be0cff3d76ccab7393103003fcbb33465bd822472c65e7087b1b885c2004c952,2024-12-31T11:15:08.527000 -CVE-2024-56227,0,0,04288e9fe2a6c2ced8521fb46ff45aff570f37c311884cc4a84d7592bf6ea025,2024-12-31T11:15:08.670000 +CVE-2024-56226,0,1,bf7c29aa56caecf71cbc7e69fc4cd246e5f141f219fed502b159c5e727c7eef0,2024-12-31T11:15:08.527000 +CVE-2024-56227,0,1,9dd86afb0a164f2e92af02a563bf4fe2f5031043cabdcec9df0240d6fa4fc870,2024-12-31T11:15:08.670000 CVE-2024-56228,0,0,2340e357d84ddd1c8be1bb37a5630061a8f59b945e2b529ff168994ed8fa3747,2024-12-31T11:15:08.817000 CVE-2024-56229,0,0,b07a212de16f56c890aad7d769be3f2d664b11b4384c479d68d0ec83aae66e7f,2024-12-31T10:15:10.760000 CVE-2024-5623,0,0,b40711f931dec9dc621be7d1d55d7930cea9e7fe3ab4315263140ea65d566acf,2024-09-13T20:19:53.477000 @@ -275335,7 +275335,7 @@ CVE-2024-56270,0,0,56f354a93121f63339f7a3dbcd942751a0062c6136e226db3b9702bd66049 CVE-2024-56271,0,0,be6980e11d9de76669d3bbd1d2196bf26d8b1427a176ca9aaa1451ab35bfdb65,2025-01-07T11:15:08.633000 CVE-2024-56272,0,0,db9fe9c284d5fc60397511dcd1fecc4169ae0d17d69eb24e757a047eacf30a80,2025-01-07T17:15:31.287000 CVE-2024-56273,0,0,84b55891ed60e4ff86ae43c44a2443de7db36087ebf82ccd07103435f58ca7d8,2025-02-25T22:50:34.553000 -CVE-2024-56274,0,0,46dfc2899337e1c799d2cccc8e16e1704e1f7d8e3aa091b747fa7acd8e7f8465,2025-01-07T11:15:08.960000 +CVE-2024-56274,0,1,d2c095420f4e4e3244b413a1e71f79d4aea810bc6e08dc27019ee77738e695f0,2025-01-07T11:15:08.960000 CVE-2024-56275,0,0,9300415b3d7dfdb21e4bcf98e6b049d2270278d0318cd78cd0580d5bb4fa3aff,2025-01-07T11:15:09.130000 CVE-2024-56276,0,0,00f6b9e0227c33f5e8b70946c15e191837645d3c728e7697707e4b3163250bbd,2025-01-07T11:15:09.293000 CVE-2024-56277,0,0,8c7a23d612b7b2aab83c4f798f0d670e6b97dbf3e2fd7e133652a5597cc22702,2025-01-21T14:15:09.593000 @@ -275396,7 +275396,7 @@ CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 CVE-2024-56337,0,0,53003cbffc45df9623db82452361ba8a0a459ad2bf417245b4c8041b16113fd7,2025-01-03T12:15:26.787000 CVE-2024-5634,0,0,a3b1c7a96781d36c1038c26ab5a2d267e349913830cb93adfed7285bdb2a684b,2024-11-21T09:48:03.610000 -CVE-2024-56340,0,0,4e6c15ca79e36e58b0c53eec0eb67f5474f4a8d00d54fe682d9d2126ea8b1ef7,2025-02-28T03:15:10.363000 +CVE-2024-56340,0,1,9b453f173d43e3f7b37887ea91bdbb36629dfe55ccdad720659cf38188277eaa,2025-02-28T03:15:10.363000 CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 CVE-2024-56349,0,0,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000 CVE-2024-5635,0,0,3e593b36944d3daa10635d485b6255328e5b9c2075909640e67f1b2c84107c4a,2024-11-21T09:48:03.733000 @@ -275468,7 +275468,7 @@ CVE-2024-56454,0,0,9fe32f3b9015db86e1a4a24c1fea9536d34d315a1d0f17a6f977857204a2b CVE-2024-56455,0,0,db2c9c4d4290b1bfc3ae388650ee55637dbba19ea1aad42dbe4095f066ac1885,2025-01-13T21:49:20.337000 CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d499,2025-01-13T21:49:26.503000 CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 -CVE-2024-56463,0,0,0ff624f00bb596f7a2db553ca22dbfcf346af7343c25522bc9471cefda53708e,2025-02-14T17:15:16.420000 +CVE-2024-56463,0,1,a1bd01967f5b41cea9e702b5b6756b1ee5fc15ee293bc223c2184a04dad7bf6d,2025-02-14T17:15:16.420000 CVE-2024-56467,0,0,4abd380d633d7d20b2a027f678c099ef3316a3d7b109e9e37281d916573a7b07,2025-02-06T21:15:21.600000 CVE-2024-56470,0,0,6e57340ea6749ea654c73cce94b7c891fca90abc6001d551e434a49f8af96c77,2025-03-07T19:37:23.273000 CVE-2024-56471,0,0,674d0609457d73ebe5d9dd4a2d105d94148fe9887c9f44eb281c47c5198adbdc,2025-03-07T19:37:23.273000 @@ -275477,10 +275477,10 @@ CVE-2024-56473,0,0,1add36edffbcb9f2fc1cbb667b996a70e07d4658230bcba585e397f935e1f CVE-2024-56477,0,0,01acc8689c67291d4dc9ea5237433eb589f8dca0ceea7c8c256f48d6d90809cf,2025-02-14T15:15:11.887000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 -CVE-2024-56493,0,0,1bb6afec47cab55cd29d922a5dc4013dd051a5530edb95db737f143b449dae3d,2025-02-27T15:15:39.377000 -CVE-2024-56494,0,0,6f1367fcb36afb923fb78227cd0f35cf701fed36230ba4a3b8b453cd38f5a69e,2025-02-27T15:15:39.517000 -CVE-2024-56495,0,0,757b942272a62f84c7af73c5b9d1d61a8d53931e6f39f2ba003bb04bfb704f12,2025-02-27T15:15:39.657000 -CVE-2024-56496,0,0,ab5864938be088fd6e34a0256ab50f87179bc12c224c58ed01b4ac57c5f43baf,2025-02-27T15:15:39.793000 +CVE-2024-56493,0,1,d0ed02a1339bd55ab8d824b0892c4189e0760d3d8f95c6781094aa6fe1691353,2025-02-27T15:15:39.377000 +CVE-2024-56494,0,1,fd83a21ec8915d2bd51ad0ded37e68db945a87cdba360454014f02d787d34d9e,2025-02-27T15:15:39.517000 +CVE-2024-56495,0,1,f5d185287d47ee80880453bd31962eab9d9e0fc424e79233f8dcb78a37dc7932,2025-02-27T15:15:39.657000 +CVE-2024-56496,0,1,999db650c9da4043d2156d0f3f716df1c4250ff31d6bc74abae55435a74fb427,2025-02-27T15:15:39.793000 CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000 CVE-2024-5650,0,0,e326c3216630004af5368334e17751b93c2144fc6e95ba439673319f24c5efbd,2024-11-21T09:48:05.557000 CVE-2024-56507,0,0,2fcd6aea186081b10138c7efdbe4c6828fb4bc2d016266039f2e51dacfa7b54c,2024-12-27T21:15:08.287000 @@ -275568,7 +275568,7 @@ CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979 CVE-2024-56587,0,0,ebd24414141a6331d79514f7e45c789a676abdc5374959e8a3f404efa31874e0,2025-01-31T15:27:30.777000 CVE-2024-56588,0,0,c5e78c53e10590ee4aa67de98f1e9d7f44e9a534f4ba3ac877ccdc434bc6e47b,2025-01-09T16:16:22.040000 CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000 -CVE-2024-5659,0,0,742977915ff4967ba8dc492fafff144c1713a106d22d0f4cac2a037c98c38e9a,2024-11-21T09:48:06.543000 +CVE-2024-5659,0,1,844dfd4d41f3525c1882e0aae8af5d69aef0538713c84453b1d11e44c7d3d01b,2025-02-27T15:15:08.350000 CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000 CVE-2024-56591,0,0,4ba918238e3f95ae969f7fc6eb9deb7c2f61d316c31ff9b582499d3d15ae9fc6,2024-12-27T15:15:18.383000 CVE-2024-56592,0,0,da483575f709d66f59d5bd6be0ac7fdbfa2fd5f2d9c42677ad036c85af63cd52,2024-12-27T15:15:18.500000 @@ -275656,7 +275656,7 @@ CVE-2024-56666,0,0,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d CVE-2024-56667,0,0,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000 CVE-2024-56668,0,0,bb0b1b28b41959171a614b3f974621ac0d2ac6eb7e9f87ec2a3ef420c316bb90,2025-01-06T18:20:19.580000 CVE-2024-56669,0,0,76b9a886334184c642413928921758334a8bfa8c2d41db9984b5b251de81dfa7,2025-02-11T16:15:47.333000 -CVE-2024-5667,0,0,29f4f8a3f893c802c08b765dee7f22b2665101f41127421981899c33d6ca7588,2025-03-05T10:15:18.910000 +CVE-2024-5667,0,1,c3a68066c44cf1ca0c7e065900547b0e8ca86c1dce4060b3e8b3cb8a16192c28,2025-03-05T10:15:18.910000 CVE-2024-56670,0,0,09dfad71a0a648bb5acf88bdf9f65707f93ff084785c319fcc16bdd4e85df5fb,2025-01-06T18:13:02.807000 CVE-2024-56671,0,0,965424f9a0cbe2a465372879236df9fbdb2bda68b251d088efe5ee351e22168f,2025-01-06T16:56:36.777000 CVE-2024-56672,0,0,8417cd992fb4acd954e058be26fcceec7435ffb29efc02edc31fe1a61610bfcc,2025-02-10T18:15:31.643000 @@ -275684,7 +275684,7 @@ CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a069 CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000 CVE-2024-56693,0,0,665d9521a25bad5429e86cb7322d7dc7a7b201181dbbc069b556d77c13030252,2025-02-10T18:15:32.100000 CVE-2024-56694,0,0,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000 -CVE-2024-56695,0,0,21609a7eb6732b63e043760349f06137f44db5f091ea71039f1f34adf48d0cc6,2024-12-28T10:15:15.533000 +CVE-2024-56695,0,1,0aa323acf9e586e2520d77172461cba91afc86105e108aceeade917a2fec0e99,2024-12-28T10:15:15.533000 CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 CVE-2024-56698,0,0,b0822b2dbf0bb8e0372888c50d8faa8376455bb3613d6c81c96710bf547eb6ec,2025-01-31T15:57:29.440000 @@ -275792,9 +275792,9 @@ CVE-2024-56801,0,0,6cef8dddf864e165aa4a99ecadbdf0b87f7bd86d5c6e0ade6e7a30e3abe18 CVE-2024-56802,0,0,ca8c864df520606afd51db2524a82ddab30d22123f6eef6cec3ac696eba93af5,2024-12-31T16:15:28.240000 CVE-2024-56803,0,0,1584d41fd9d3e6beb3be7c57bb8ba96341667bc6ec41b946b6138146b4297f8b,2024-12-31T23:15:41.553000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 -CVE-2024-56810,0,0,9b28a43bfc1f0d665ed6d6c9a1d6258554db29def4c9a9daa5bc71940da524d7,2025-02-27T15:15:39.930000 -CVE-2024-56811,0,0,f7130ca5e1433d7792fb4e01e434b533f50e3eba422dcf67a2b229f023ebc86f,2025-02-27T15:15:40.067000 -CVE-2024-56812,0,0,ddd21acdcea69a641238c4bcfe1f74f4f3d4e9fd907a66769e661735ca5142cc,2025-02-27T15:15:40.200000 +CVE-2024-56810,0,1,194a35bc92d3f9958aea6b769fb050479e40c23a506bee57531c36053803ff2a,2025-02-27T15:15:39.930000 +CVE-2024-56811,0,1,a175c74dc672ed974260adb2523ba1d1cc36b446afb4b300e1f0c115c8f66a38,2025-02-27T15:15:40.067000 +CVE-2024-56812,0,1,32291b45b50464bf55ad84042acee5786e419c1622179fefaee6007739d57fe0,2025-02-27T15:15:40.200000 CVE-2024-5682,0,0,ec19db4c87275ffbb4fc8cd346d356eb2076f8c9ec5a66d24b5aead9b0de8a19,2024-09-20T12:30:51.220000 CVE-2024-56826,0,0,ec68978dbfde8fef0ce0777a1db20b08edcfd57501134820891a9283a7b02eac,2025-01-09T04:15:12.660000 CVE-2024-56827,0,0,45e65a3f7a940f5d088604960cd3497fe1850c47a3f74bab0994003ce1109732,2025-01-09T04:15:12.840000 @@ -275866,19 +275866,19 @@ CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329 CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000 CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 -CVE-2024-57011,0,0,cb6f3a22bf4f0a95c21727f887aa7ebe75e40992b291c8ba4b17b0d8e7699b13,2025-02-18T22:15:13.390000 -CVE-2024-57012,0,0,f1ec9607c960ef59969e13c491cb6914fa0436c24df29acbd1fe72db669fbce5,2025-02-18T22:15:13.507000 -CVE-2024-57013,0,0,dd6d0ee9dfce32410a3bd2b37036ee269a833dd617133f288a4e19543b03b6ad,2025-02-18T22:15:13.610000 -CVE-2024-57014,0,0,88633683e54828e79ab7fa67a15c35700f82f2bf64ce13047a11f24fcdf82d02,2025-02-18T22:15:13.713000 -CVE-2024-57015,0,0,e26216ac7175795ee87b15f77bef081eeb407089eac10d24e57ca4285e70e445,2025-02-18T22:15:13.827000 -CVE-2024-57016,0,0,81ca70905d26f73b877062fdb3e7c5514a827fad85e7daec4b673964744200ed,2025-02-18T22:15:13.920000 -CVE-2024-57017,0,0,fff10b686a06641be5c5d94117e5ae4e8fd702db693232af3d1888ff0260bf43,2025-02-18T22:15:14.033000 -CVE-2024-57018,0,0,9d22020ad03717615845e9c2939b0a27ebbb2fce24894713c306fe3c5f4916d1,2025-02-18T22:15:14.133000 -CVE-2024-57019,0,0,7690cbe656946355158afea206c04d7159ea6bc8fb4718fc4420ae896a7ff0dd,2025-02-18T22:15:14.240000 +CVE-2024-57011,0,1,5813b7f7dd0b820edc75bc57a578d0c58ffc21ac8186efaa075821019fd40dd9,2025-02-18T22:15:13.390000 +CVE-2024-57012,0,1,995ca91f362d0da082fd277fb181b8c4ed8ea16028c567b9b11764d47025749c,2025-02-18T22:15:13.507000 +CVE-2024-57013,0,1,fddd919bf848e1a0947f1e7359056240e921a65a9ece624801731d1b2aa05f9f,2025-02-18T22:15:13.610000 +CVE-2024-57014,0,1,75727a1468623acc03677481e7a0efb3e097eb1d9344ba7642dfc91aa7e7d3e9,2025-02-18T22:15:13.713000 +CVE-2024-57015,0,1,c6f6209e14679d85e87ad01d546f5fb5793b4c0d5b7e71ed12ce3c94795f202a,2025-02-18T22:15:13.827000 +CVE-2024-57016,0,1,e074954c9b913f70a07079af64aab693bb01677b79e72d5fa0223f9e0a40008d,2025-02-18T22:15:13.920000 +CVE-2024-57017,0,1,7dc900a0a3d4972efb76fb62ae40a72000fbc98359b4cc2f9e04b8c64541d1d8,2025-02-18T22:15:14.033000 +CVE-2024-57018,0,1,96d5e05fea7bbc74ac7b805f069825285e385d7429201cdd08a0d366f2d5c121,2025-02-18T22:15:14.133000 +CVE-2024-57019,0,1,87c0692ff3dc43d576706fa002c5c9f354a79b1d67b6a8b8d96c834e9e64e3ba,2025-02-18T22:15:14.240000 CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000 -CVE-2024-57020,0,0,94635cd49fbaffd32e83adaeb98f60fda213bb6959b5b50b5b4753635601824c,2025-02-18T22:15:14.347000 -CVE-2024-57021,0,0,91e030db57d52f1ae936969817d6783ec1950f336faf5390b4988f5d9f0d5542,2025-02-18T22:15:14.447000 -CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f9ec,2025-02-18T22:15:14.553000 +CVE-2024-57020,0,1,655c6df79d90bf631b374654ce3876bdca582537f6bb2072434c01f2334bea40,2025-02-18T22:15:14.347000 +CVE-2024-57021,0,1,496edead49a69c6d6174d9f4c1ee4c0b610105f871005b505c568e1bacdd7acf,2025-02-18T22:15:14.447000 +CVE-2024-57022,0,1,239f3de5aa83ef5aca32a13df90cf895673ba751feb17647e84b105edd622630,2025-02-18T22:15:14.553000 CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000 CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000 @@ -275940,7 +275940,7 @@ CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000 CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000 -CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000 +CVE-2024-57162,0,1,7fa4944d786739b9e2b1740660ffcfb8d81993ff4948c38a26eccd5772f923c7,2025-02-22T01:18:33.693000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-57174,0,0,5b7a68297a738491085b3386371e8c92304d4dbb387f5d48037bef6909c1019a,2025-03-06T22:15:34.977000 CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000 @@ -276266,7 +276266,7 @@ CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20 CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 CVE-2024-57850,0,0,2124fa4258eb8c3a063b5b749880114208033ff71b7e7d5f4ee7e623334505c3,2025-03-03T17:42:59.740000 -CVE-2024-57852,0,0,cbbd46a7ddf6f86a683d1d4e04a80ddf6950679f6a40ec3d30c4ce0030834f86,2025-02-27T03:15:10.977000 +CVE-2024-57852,0,1,f19b9256fed1d0413199f2e2d33e34b963c2188b7176ee982e4664000d9cf117,2025-02-27T03:15:10.977000 CVE-2024-57857,0,0,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 @@ -276331,7 +276331,7 @@ CVE-2024-57925,0,0,76029a53ff626eb7fa3dc0152dd21abf9d05f26fb51dc89ac3559df105723 CVE-2024-57926,0,0,acde42d99502e9437f1eb72cc2ed9d32a6e107e7ebb4c18782507cb6244b42cb,2025-02-11T16:15:49.340000 CVE-2024-57927,0,0,e981258a896af5b5f2115dd0b6b8324ff06b2655c23229e6cd3e29f8fb5fb076,2025-01-31T15:29:09.497000 CVE-2024-57928,0,0,c958344925b23189b5084226c6eebf997feb724091f51913b4610fc8bba5819f,2025-01-19T12:15:26.903000 -CVE-2024-57929,0,0,ae75c34b878e3d1c0684386611355f0f02a50a0fe4631d385985c9a3b35ae457,2025-02-02T11:15:14.227000 +CVE-2024-57929,0,1,fe53da991964ec1a3024bc3f0ead3068b215dcb52e8ce5a9f1337f960220ea55,2025-02-02T11:15:14.227000 CVE-2024-5793,0,0,0b18df4d2dde9f10f63097b806cad3cc9d51ae7c2ac550a36fec1a23c0e391bb,2024-11-21T09:48:20.673000 CVE-2024-57930,0,0,94a6cd36a388f60e55b904e5c2967fc93fc62a2c24f551093d7bc1fc6ebce43d,2025-01-21T12:15:26.600000 CVE-2024-57931,0,0,850feebef8f5e99716b8aee53bc54bf61303831fdecae3825f24d2fe16e517cd,2025-01-21T12:15:26.713000 @@ -276379,56 +276379,56 @@ CVE-2024-57970,0,0,4db4cc3cdc42f255941d980da801a4e2e9f8b4ba6d1c25a10de778120606a CVE-2024-57971,0,0,19f9693c2a947ecc81adc9515f9451f49c9c0497b8a17c88b011da939c705fcc,2025-02-16T04:15:23.077000 CVE-2024-57972,0,0,4fe45914cef442f475f299b5b8dde7bf05a99c90291481d796e9b55718630ff7,2025-03-07T18:15:45.673000 CVE-2024-57973,0,0,5dc86344b2afbed1217c83780c08a575467700abce0740390119e518b1bb22bc,2025-03-07T20:44:17.993000 -CVE-2024-57974,0,0,35099278a5a75222c052ac350d30ddc1388b2b90ab57d03eeba4eb4784ea8412,2025-02-27T02:15:10.590000 -CVE-2024-57975,0,0,5b33132c3e0a596aa8c2f854f16c6756b27eb4a5de963161bb245dbc424d5acc,2025-02-27T02:15:10.687000 -CVE-2024-57976,0,0,cd393dc40b8d12423e582db8f884621515bbb75c49217217a9b24bb6bbc79be5,2025-02-27T02:15:10.790000 +CVE-2024-57974,0,1,eb8a3b6fa11927bb3e0371943c3faa833a669912505fa05109de24057f062dba,2025-02-27T02:15:10.590000 +CVE-2024-57975,0,1,5596f4b8b32094b84eba002b36c61b7cbf7ce0336482cd133332f71bcda21e43,2025-02-27T02:15:10.687000 +CVE-2024-57976,0,1,e2941d4a5cd8d0058039b51d826de281cec23f38ba2da0a0b14e66748d7d80d8,2025-02-27T02:15:10.790000 CVE-2024-57977,0,0,d8bf04bb672cf6fa127c7566bbdc6108644735b07e23a0c48f23fb9cc3f021b3,2025-03-07T20:44:17.993000 CVE-2024-57978,0,0,86948b73f22d130435482d1c296f165cffa1cca4fd440b1699da302242843982,2025-03-07T20:44:17.993000 -CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b65646c3,2025-02-27T19:15:49.077000 +CVE-2024-57979,0,1,01ea997ead36f99284b4b2a197e9ec87bc8b2645a26eaa3a7cd18440b2bad724,2025-02-27T19:15:49.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-57980,0,0,4f41b8bcc273e356dc5adac623a8ae452046c20cb7faa10fafdd1cd5bf8ca28d,2025-03-07T20:44:17.993000 -CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000 +CVE-2024-57981,0,1,df3e21edadad587f302be64ddced85c0c0d9f36a64429b3fadd65d8c4eb5b0a6,2025-02-27T02:15:11.293000 CVE-2024-57982,0,0,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000 CVE-2024-57983,0,0,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000 -CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000 -CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000 -CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000 -CVE-2024-57987,0,0,b5fd17ac6b253d476785bf034ecd8901a29c4f19d4ab2e55a7b1f3df5833768a,2025-02-27T02:15:12.700000 -CVE-2024-57988,0,0,8f6aa3c7a50556f7fc78f83578c6644b16e3f3c09050e5f656442285d2befbfd,2025-02-27T02:15:12.800000 -CVE-2024-57989,0,0,510d96328f06e0d368e7f4e80e663dfd4123b8ea1821f67a792712206fa419f7,2025-02-27T02:15:12.907000 +CVE-2024-57984,0,1,af4e9ed9edd89f84c08826bce0d0110be3cb4f5e05c0d23746f29e11f57483aa,2025-02-27T18:15:27.460000 +CVE-2024-57985,0,1,3c79f686f7fdd31985f81f631dd51fc60d2624e89a169ece6cd5d12af0a226b9,2025-02-27T02:15:11.703000 +CVE-2024-57986,0,1,fe5f74934ee46c70a98c8985aa0cabf065ee09146183467ab22f9da5f492070e,2025-02-27T02:15:12.597000 +CVE-2024-57987,0,1,929bb1508678f1559e106cc25162cdba1ed7c058adf3c2d3ba9af499ccc05f9f,2025-03-07T11:54:06.967000 +CVE-2024-57988,0,1,07251b9bde58941d419924ec2a29424cb0b32ffbb375addbccc276da4f799539,2025-03-07T11:54:06.967000 +CVE-2024-57989,0,1,f99b5a408ab49aee0cd72d087df8cb46d97df610525231de8d66b2f895db0e4d,2025-03-07T11:54:06.967000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 -CVE-2024-57990,0,0,f25410849121eb165410abf2cdcc0807ad6b948f4cf241036ceec3c9f1eae9d7,2025-02-27T02:15:13.010000 -CVE-2024-57991,0,0,79a48fb36d64ae06ee69d1861f0bf67678b7d6c7ef11a6d697c4ebbb07914248,2025-02-27T02:15:13.110000 -CVE-2024-57992,0,0,7fdb0870bca16b6071f8ee0ffe37f6af8fdead84152974bfae22dc04081f0daa,2025-02-27T02:15:13.210000 -CVE-2024-57993,0,0,a6740ba7c8f6d7d1f0b4fbe493bf1e5ac0d8340ef9524894342f049e61c47e09,2025-02-27T02:15:13.310000 -CVE-2024-57994,0,0,3802aff1526ed6e10bed39487834ed72b8bfd55ca7d70cd6e61e58ad25e75980,2025-02-27T02:15:13.417000 -CVE-2024-57995,0,0,c9aeedc9ba1f4ce988bccde9839b0f74e2a557129f4a34653f7fb4361999dd2c,2025-02-27T02:15:13.517000 -CVE-2024-57996,0,0,c2ae4017d75725a098a173745addb0c0b72065aaaee11665904d96827be73da6,2025-02-27T02:15:13.620000 -CVE-2024-57997,0,0,9ecb152571f6eeec358a2308aae3aced24675f7a82071c0ba008be6dd924afc4,2025-02-27T02:15:13.720000 -CVE-2024-57998,0,0,496fca4aa2fc5ff582e4944223381268b1d7015caccd1b2212896d64dbaccd03,2025-02-27T02:15:13.820000 -CVE-2024-57999,0,0,192cd62115ee0eebfc0e3194a10d118c6cde7d7dffe718c35de3e7f488afc609,2025-02-27T02:15:13.930000 +CVE-2024-57990,0,1,a08f0f0bcebabcf08cd3ee9a90b7e05341cefd1c01b43cccad28e864861a5fb1,2025-03-07T11:54:06.967000 +CVE-2024-57991,0,1,bf010e1d8d35c6f5b775ee11df5ac1cab1b0eaa2935b10c9d5e455cffd80291c,2025-03-07T11:54:06.967000 +CVE-2024-57992,0,1,b486ed157c0e9dc1e0f617cc27cb37e59627cf18b6c3ed0a677a0e520dbc7ba6,2025-02-27T02:15:13.210000 +CVE-2024-57993,0,1,d0bc8e0fb12400c3be039905539846f2055137bf1d0507e51299039c83fcf26f,2025-02-27T02:15:13.310000 +CVE-2024-57994,0,1,b57cefe8103f1cdb7487aafdaf48c9648c8339c2c86607ad68f59782e856f288,2025-02-27T02:15:13.417000 +CVE-2024-57995,0,1,a72494da73d68504eae3e4079e140be946e3815696fd87d760380a4cc2538d50,2025-03-07T11:54:06.967000 +CVE-2024-57996,0,1,81d6bc959b5f6ae16763618e34206cd8cb45fa75a019b18dacf72e8d1ddd4648,2025-03-07T11:54:06.967000 +CVE-2024-57997,0,1,db9af93da41231a16f901aa760e385463a5a478beeab8f7f17a74d6b88b24880,2025-03-07T11:54:06.967000 +CVE-2024-57998,0,1,9a2f5b234a45c1aa14534a8e802d2d77984aa61066a605cc84fb19e78f6004c2,2025-02-27T02:15:13.820000 +CVE-2024-57999,0,1,e7fa5ddca4736c27db0ad8d50f08fcd68766a710317c48d5881566d7ef301deb,2025-02-27T02:15:13.930000 CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000 -CVE-2024-58000,0,0,9bead4c6f4a6e6b0b3e4ccb9dcb95d8e89506cd6b149e93be860b24427528e09,2025-02-27T02:15:14.033000 -CVE-2024-58001,0,0,062b95b71d62b8392e7dec859d235ae0235da3e946e47b40e89a8df2d660fc6c,2025-02-27T03:15:11.080000 +CVE-2024-58000,0,1,5f105536bb56277a7d83d81335424f733d140e023891ee7eec23c4f28837b558,2025-02-27T02:15:14.033000 +CVE-2024-58001,0,1,8a3cc0c436a2bea82451f5ffd84db67c9e43ed527698fca7083fbb1de757d0e5,2025-02-27T03:15:11.080000 CVE-2024-58002,0,0,29cfe2a7ef092142b0779c922fa8565123f09a5865c52e691d5eb135f1e80a5c,2025-03-07T18:15:46.417000 -CVE-2024-58003,0,0,d63162215e1a5dbdf2f26a3a80f9f12faed3d9c520fa6be1ac27c057f67243cd,2025-02-27T03:15:11.277000 -CVE-2024-58004,0,0,68844712d1835a2f20b5302361ac491d98dd1a1f13907be2f39c078787a0c250,2025-02-27T03:15:11.380000 +CVE-2024-58003,0,1,a8ce4012883eb872902e7fcc6963e50daf950b3a6e45b1c9ea8a76973861a763,2025-02-27T03:15:11.277000 +CVE-2024-58004,0,1,0682d94a03d803f846c4d3ac83d38ab28866c7c5726895093f3c5a114f1ff8ae,2025-02-27T03:15:11.380000 CVE-2024-58005,0,0,dd8a054e5a1adae6fe62574360af2fd4fda6aa17a2196d019e7e8a84626e8220,2025-03-07T18:15:46.880000 -CVE-2024-58006,0,0,99bcd7c70bad6c86d4a686c41e032b597709b74aa5784099886d83704a9dc686,2025-02-27T03:15:11.583000 +CVE-2024-58006,0,1,202ad1289d3db423313e951a6d9d93c246934b3ab03b269061ae8d4fd97d183e,2025-02-27T03:15:11.583000 CVE-2024-58007,0,0,67d1a33387f15c92a6fa64adac47eabb908d372f8ed57c978a5e97a65ff756f2,2025-03-07T12:30:28.963000 -CVE-2024-58008,0,0,83bb44015382c711e9fe765b2c4558ae62041f53545addc939db33a1da1a9569,2025-02-27T03:15:11.780000 -CVE-2024-58009,0,0,6a6126ef4bf4110693d6a0d67f707884629b7a16a613596b22e7f8f6785b193e,2025-02-27T03:15:11.880000 +CVE-2024-58008,0,1,8201974c431159fce436624288a63096ce7993ce6d0a5e508b6ef70f5211a3b0,2025-02-27T03:15:11.780000 +CVE-2024-58009,0,1,aaf2c54fd86aedfc4342fad0f505ed9454c6f8287705f56f28ca2e6939ffd0e7,2025-02-27T03:15:11.880000 CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add0a,2024-08-12T13:41:36.517000 CVE-2024-58010,0,0,c1fd457cf19b62729c1f9b9b7bbb9293ec963169d1a004a0837507c00ece7219,2025-03-06T12:42:22.567000 CVE-2024-58011,0,0,fc794450673cbe9ad7f2b33dc371eab9dfbd1bfc29db3b7101769aa8d3911f9e,2025-03-06T12:42:22.567000 CVE-2024-58012,0,0,c8d740bec17d8fc7f5d246a577a3ca722860950bfe7cc6f3f55a1529388c0457,2025-03-06T12:21:35.360000 CVE-2024-58013,0,0,db720d7ccdda587cf86c812bf9a23ff3242ad2c6818001578519aa3e1096cd28,2025-03-05T22:15:35.690000 -CVE-2024-58014,0,0,c7b2aa63e8b7bec392f61441db5b82d30877f13fd011c4249345a8e6613810f5,2025-02-27T03:15:12.390000 -CVE-2024-58015,0,0,408dce73f62364b52ba252950975a281e1135fb7b4b23b2ccae7c773ad3c39ca,2025-02-27T03:15:12.493000 -CVE-2024-58016,0,0,4b26c1146b2a0dfbe10569fbb6f1cac4750ac1fe03a88c36d84acf78d6c876e6,2025-02-27T03:15:12.590000 +CVE-2024-58014,0,1,9249832925be3812ed90d4a2225c5172b9d23ed0ea5a9483d6a8aacccd6c12f6,2025-02-27T03:15:12.390000 +CVE-2024-58015,0,1,0f9f78f9c8fec78fae5dc506d060d95aec2ab2a22ea0b6cfcb54b63dd8a9da89,2025-02-27T03:15:12.493000 +CVE-2024-58016,0,1,e3d050982627e7bf86575b0480d8c206d52ffbec070639fc9d61ee6b24c9917a,2025-02-27T03:15:12.590000 CVE-2024-58017,0,0,18bd37de338911a20f5914e76e03d06f45cf2a45cb08188b214fd79e66278cc8,2025-03-06T12:21:35.360000 -CVE-2024-58018,0,0,2d45ea9e1b61e8eef6ac2402ad337a326ac66e5ce54a80719f057d18b1037900,2025-02-27T03:15:12.797000 -CVE-2024-58019,0,0,ebe852acb58145e0f515ee4e65d8d88d1691b0b856363c64f164142eb938ae30,2025-02-27T03:15:12.897000 +CVE-2024-58018,0,1,026824f649989c4abbe72aaa60ad858b1681ff1e34df3b7d0389187c7a5f9de0,2025-02-27T03:15:12.797000 +CVE-2024-58019,0,1,c7b0fc813a47c1985df395fc8df5ec81c10326f5c473ed9ebb6fc3923a6c3ae3,2025-02-27T03:15:12.897000 CVE-2024-5802,0,0,19fff604014c9cef9e0f8bc6a62b84f7523f1797653eafe6700c36b3d03bd7a8,2024-11-21T09:48:21.447000 CVE-2024-58020,0,0,5a8fbd0ea6230b3adf124651d3209ddd707b5ccdd2a1f6069d1ce1136d9e87ff,2025-03-06T12:21:35.360000 CVE-2024-58021,0,0,1a52cd1a00902ee421b6fe06d4bf4ed4d9ccb5fd0ebd997107ce026e3de83c83,2025-03-06T12:21:35.360000 @@ -276437,54 +276437,54 @@ CVE-2024-5803,0,0,9f82593b4c57457c96daef99978d68eaca19c8db6ce80dfb437501b3b95974 CVE-2024-58034,0,0,a58d20858f51668ab0e30ae7e40910f616321f1f89fdedf57b44aac4e3186045,2025-03-04T18:15:24.617000 CVE-2024-5804,0,0,2f00fd3e9947e9e26596c3d44370745abf63c8732a08c44c5ab0acfd9a8ea957,2024-11-21T09:48:21.677000 CVE-2024-58042,0,0,913d82d5746eaf56dcb73a81d4d4f1fa1f2df917e4048e31415852279ac58b5c,2025-03-05T14:05:15.387000 -CVE-2024-58043,0,0,6c9910f151efabab9fe50138adf0da55634410981bc17ef17a1c0db9e0e3064e,2025-03-04T08:15:34.480000 -CVE-2024-58044,0,0,8e00020c0a23f91d16935df02123388ecc92dafd7e3584b75e082f22487dd0da,2025-03-04T08:15:34.750000 -CVE-2024-58045,0,0,3f471ef259c7022a6a0a348332711cb0922f730d2612ffd76edbb88143589def,2025-03-04T08:15:34.973000 -CVE-2024-58046,0,0,dafccc897d8e4b3cd11ea95fe4077fc8aedb38756f046fe36814c1a042eb94f7,2025-03-04T08:15:35.117000 -CVE-2024-58047,0,0,3e22b3802d2341e58ff328e2d6fc3fa1c4dcb07e2b7a3994749a0e785b1d1705,2025-03-04T08:15:35.267000 -CVE-2024-58048,0,0,25e6d05d2f9c2c4ba042691b58c9f3e9065aaf46adac4143fd8a3d39edf19bd7,2025-03-04T08:15:35.417000 -CVE-2024-58049,0,0,531a2aeb3dcb148691f97d407abd92031eaaab2d4984c8e46b10cde9f4a78f8c,2025-03-04T08:15:35.593000 +CVE-2024-58043,0,1,e69b39136346860d6f40cdcb88b176d527c32105f0b078b51f74978999103639,2025-03-04T08:15:34.480000 +CVE-2024-58044,0,1,9ddddeaa65b802289cbc2d93e3bfd7967755de94d613f552fcd6441c168f3b97,2025-03-04T20:42:28.777000 +CVE-2024-58045,0,1,29e752528d5bb4a45a91a216ea039a9965899cde42093de6e8e5d947ce16feee,2025-03-04T20:42:28.777000 +CVE-2024-58046,0,1,a255876446800902ce81cc51f999f5875d0a15aac7fccf51e34b439c925cad28,2025-03-04T20:42:28.777000 +CVE-2024-58047,0,1,43e3ccdb2ab941f95d680554c89a69286bf9d3f80c96c9816c111a96d2c3172c,2025-03-04T20:42:28.777000 +CVE-2024-58048,0,1,471e1bd6662d60fbcf92da63191bf2ba18ec1b82e367606afeefd15662db7dec,2025-03-04T20:42:28.777000 +CVE-2024-58049,0,1,cdcb0a5432ff441a441a130bf4f5ac3f77325937ff2b92d00f129455fbd440a4,2025-03-04T20:42:28.777000 CVE-2024-5805,0,0,fce2cd9169116102e5375089f5975fe2795253d6c4b763ab35cc7d32ac26b7a6,2024-11-21T09:48:21.803000 -CVE-2024-58050,0,0,60d665e6d95162cbf269cc1b75f990da5ff91503a4492b952e5f609a234ef33e,2025-03-04T08:15:35.767000 -CVE-2024-58051,0,0,2cafa3538f5782d14f7a6c4c30044d26afd61b54039234039199c15f43d17921,2025-03-06T16:15:51.247000 -CVE-2024-58052,0,0,8a11e0d4b9d9c8bd5a90f8715a8d4a8e062e314e07d857c92a7cd7c02f80adc5,2025-03-06T16:15:51.367000 -CVE-2024-58053,0,0,1e6728899803d01331497875cf6ddbf3e95fc62f1d01597d611fcdf32c586a87,2025-03-06T16:15:51.490000 -CVE-2024-58054,0,0,22ab24f419023ba44f6ff97c84cbf401afb50a6b1598b274e44dcc7c356ef215,2025-03-06T16:15:51.600000 -CVE-2024-58055,0,0,e3a96e3ea7e4131281b56e3139a5d181bb664b1ba32bd80fec7368349ece3ee0,2025-03-06T16:15:51.730000 -CVE-2024-58056,0,0,86fb9d3ea1708b10267c022b9fa8df899fa4cc401f71403a759c2316424eceea,2025-03-06T16:15:51.837000 -CVE-2024-58057,0,0,cca7e05d64ab673ef86829ca3c15e2c9223dd80c3436e89f6cfe56cfa836f67c,2025-03-06T16:15:51.940000 -CVE-2024-58058,0,0,8e0ce81daf5893833bafcc9b8b09339f9532a057cc65cf9b31e2003e9944c78e,2025-03-06T16:15:52.037000 -CVE-2024-58059,0,0,40160e71985a337acefb34ce5c5702e0f63950ff0118dc40fa8161a328890384,2025-03-06T16:15:52.140000 +CVE-2024-58050,0,1,54cac36b03acf10b55e1e9941b64edb190938b7b7066d7857280135d60d19f29,2025-03-04T20:42:28.777000 +CVE-2024-58051,0,1,3235d87a9d448debda6cd0cd5a3ba4e4077f82abd13c7bfc1623435326c339ac,2025-03-06T16:15:51.247000 +CVE-2024-58052,0,1,a27847c74d5a0979169807e8f99ec820c04082a0b2eca78f153f7a45e8b59057,2025-03-06T16:15:51.367000 +CVE-2024-58053,0,1,398f638a8da2a0c9839060d1dbcb6612627221ac68ac1e22f65b6860bbe49b16,2025-03-06T16:15:51.490000 +CVE-2024-58054,0,1,73beccb8ac7dc93178f6190f359ca24c2843cebb3075c9545006d20b3828abc6,2025-03-06T16:15:51.600000 +CVE-2024-58055,0,1,e9fe9bad8b803eb381d8055b48dee18188cb7fb59e5889d279616e9c4cd7814e,2025-03-06T16:15:51.730000 +CVE-2024-58056,0,1,80a6cdb77f9deafd77f8d7e70576d067e71198e481a88792cac408823d2577c5,2025-03-06T16:15:51.837000 +CVE-2024-58057,0,1,8e30b39359c8bccedbe0090c58b8d67906b6db3f0f8c4b7a18b2fba33e4e342d,2025-03-06T16:15:51.940000 +CVE-2024-58058,0,1,6ad7eefdb4d7e53287acc743f882f359e32bbc90a0b624ae905a30acb3ad888f,2025-03-06T16:15:52.037000 +CVE-2024-58059,0,1,b8c569bfb250782383ad687b83378f3c313ef14e54d25f3f0354dffcd84842c3,2025-03-06T16:15:52.140000 CVE-2024-5806,0,0,5ac9637d8c764ba881b38672e3b3265f75ae0c44c191480b6554928fc9eb1283,2025-01-16T16:57:19.660000 -CVE-2024-58060,0,0,b6c2623ac2f1f69028a55e8bdffbf555ad1ff84f1780a805cdc81c9f0d84eec7,2025-03-06T16:15:52.230000 -CVE-2024-58061,0,0,168f37efb41f94c7bd3667ba879d8c3814558375cf700a08ca6b07aa9f32a13a,2025-03-06T16:15:52.390000 -CVE-2024-58062,0,0,01d9003a7d1b91faf0bd7090d4198f86dbdd96c5b2193d63d848996ca3a9ad42,2025-03-06T16:15:52.490000 -CVE-2024-58063,0,0,ba32b1beaf14f4724437d0a976de0bce2c42efeac678196663123a9f63a1028f,2025-03-06T16:15:52.583000 -CVE-2024-58064,0,0,72b8fa96a79b2382a3c37624697e92848ecb20a8956da290497772b8c4904b74,2025-03-06T16:15:52.733000 -CVE-2024-58065,0,0,66ced7b7adee37b8356e0226335230bd17e9d3878d7c1fe032451829bf324b6f,2025-03-06T16:15:52.830000 -CVE-2024-58066,0,0,27e9283377d7bad95517767530204bfb4b58b39aa1bbc6f576fe83352c152683,2025-03-06T16:15:52.997000 -CVE-2024-58067,0,0,4ca3b0f67931e81284dc1e243a4e189cc599b000ce83375fd7daa528fd5838d9,2025-03-06T16:15:53.150000 -CVE-2024-58068,0,0,8ea6ab314c3b17c7e4a14c9aad5d2e0082daad6a1ba7d268cad8c0d1a14f0f6a,2025-03-06T16:15:53.257000 -CVE-2024-58069,0,0,1d9a02b4d03e870fd2b8b9f894c9f2805c870ad01ccc12c490bff6faaf689da3,2025-03-06T16:15:53.373000 +CVE-2024-58060,0,1,427121df3718f3cc0ba284acaeb72a5c5263a621fdd8285233f07ed08e7a8efc,2025-03-06T16:15:52.230000 +CVE-2024-58061,0,1,09b0820011c82a2ee445c79d2d86b8e9d8af3b6dd6aa5c98cef0385fbd6e7c01,2025-03-06T16:15:52.390000 +CVE-2024-58062,0,1,d061e7671f6ade67daf8450f1cfc7726d1848994271f0d6183ea7e2f68e040a0,2025-03-06T16:15:52.490000 +CVE-2024-58063,0,1,e4cc4b1c96f2aca6cf88b843217f6d7030667283d6afdf3cbffdacd4dbdf029e,2025-03-06T16:15:52.583000 +CVE-2024-58064,0,1,567260eb324ed856d8d5ef6dafc8802cdf31a4b4255c4a381b6e16e8d4836c88,2025-03-06T16:15:52.733000 +CVE-2024-58065,0,1,10437ca21336bf7ed62018981f1c437f28fbb0082750db083ad06eeec574699b,2025-03-06T16:15:52.830000 +CVE-2024-58066,0,1,97135b72002753347fd7630e4cc71b506bdcfbbfc707536cffd3040ccbd4ace5,2025-03-06T16:15:52.997000 +CVE-2024-58067,0,1,840f92d785b8b8bb2e6a4129b1419d30b4755ed695d0718b6c862c6fe440bc93,2025-03-06T16:15:53.150000 +CVE-2024-58068,0,1,5d3fd47b06688641d74e194c59c4ac4e942a38727c0c8fa8d1e7aea08b4eaf85,2025-03-06T16:15:53.257000 +CVE-2024-58069,0,1,3990b877dd91224111ee19ebd011939605b2b80432e638ea6bf0a8d7f62e17c4,2025-03-06T16:15:53.373000 CVE-2024-5807,0,0,bcd7f1773756c308216942ed74fe8b63dad936ebebf2c4e22c08a44714f2e7fd,2024-11-21T09:48:22.057000 -CVE-2024-58070,0,0,4e96941870f19160ee0abf4a8dc11f2d652ccb3f2fd2e07c00c4f60da545bfc1,2025-03-06T16:15:53.480000 -CVE-2024-58071,0,0,e2187308a3c54651be755875a9cfa8feb71b8649c44e0baeb126c8142553f3bb,2025-03-06T16:15:53.593000 -CVE-2024-58072,0,0,24d89844d6f1493212431ad264fcbbbb1973872706eac6c214cfaf903e3d1cc3,2025-03-06T16:15:53.703000 -CVE-2024-58073,0,0,109fadd3201cf47ca89f9a569fc60b9a69b2ee83d751aa8631e712ab45aeb7f0,2025-03-06T16:15:53.833000 -CVE-2024-58074,0,0,883e6ff7932d7cffafc87fdaad452ce3afa9cc5ba5a81459b9802774df1ecc0c,2025-03-06T16:15:53.943000 -CVE-2024-58075,0,0,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8877,2025-03-06T16:15:54.040000 -CVE-2024-58076,0,0,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000 -CVE-2024-58077,0,0,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000 -CVE-2024-58078,0,0,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000 +CVE-2024-58070,0,1,b46bc2b5b875a18ed6f3cf614ba42ce7b98195acf9376fbb13ac24a526fa68d6,2025-03-06T16:15:53.480000 +CVE-2024-58071,0,1,17456b84238510897e40f3d2e32c62584dd180d2a92a6a3f842a287a411cf597,2025-03-06T16:15:53.593000 +CVE-2024-58072,0,1,853a29a7d337c2d87d77a03601a22927888b93046838277f73b9bcbe773fbe31,2025-03-06T16:15:53.703000 +CVE-2024-58073,0,1,c24e07026b48bdc8c4d47f1f43aa762c6767eb7ad118bed8ac539caab1f4b6d9,2025-03-06T16:15:53.833000 +CVE-2024-58074,0,1,51c9bb636e42824de50935c1bf7dd85d664beb5ad820c1e1234878622e665bc9,2025-03-06T16:15:53.943000 +CVE-2024-58075,0,1,a5ff1b0ca28db4a770623fabb30b69f4139dfba3c7c0a176696b1a37db92de7d,2025-03-06T16:15:54.040000 +CVE-2024-58076,0,1,b5aa55fbbf5eafd10eace9793bc7387ea416e3853e0685afb0c5788833cc9872,2025-03-06T17:15:20.997000 +CVE-2024-58077,0,1,755373b89c9a426558594c830a81fd2f74aebf94ddb75995d4d3e9f027e1611f,2025-03-06T17:15:21.123000 +CVE-2024-58078,0,1,2726ebf4497934ef71148d5aedda89563a018a9c33d22b6afe14ea4dc29a38c8,2025-03-06T17:15:21.250000 CVE-2024-58079,0,0,0489bcb218c455f1fe45767363ca697b65c94ba3e6d21a28867c0f2c4f081c72,2025-03-07T18:15:47.040000 CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000 -CVE-2024-58080,0,0,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000 -CVE-2024-58081,0,0,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000 -CVE-2024-58082,0,0,499452ad0355aa6c904b9df7b6880d14ce8265474f0b29ab42bb87143a85ba14,2025-03-06T17:15:21.677000 +CVE-2024-58080,0,1,88e2e5a3cce3d1c53df8686e722dbe66177cc0a05dc1b509a0edd4553f115eb7,2025-03-06T17:15:21.473000 +CVE-2024-58081,0,1,4390974dd8546ac4fb8f180602a2b19823a58928c771d9ffe8c9023966c1522a,2025-03-06T17:15:21.577000 +CVE-2024-58082,0,1,5efffe3077a6aa5a23d2e84e0cd31dbd617dd4af6b8eea2dd20b18571a275a9a,2025-03-06T17:15:21.677000 CVE-2024-58083,0,0,bd7cfb950a2c169e6423eab96cbba45b1cde4a4295ee7100f509f98188eaf827,2025-03-06T17:15:21.773000 -CVE-2024-58084,0,0,a41bf7a6804b945971730ab63f6618961e5bea4f9ad3567be6339142dc5c7265,2025-03-06T17:15:21.890000 -CVE-2024-58085,0,0,47b3e6ef1fbef3749b81ec4e1f9f1f251d5e9c39cca48b3d54a6db21ff814257,2025-03-06T17:15:21.993000 -CVE-2024-58086,0,0,31e9af0e84acc2b9ad39f5b34fbb6206a8e2c6a4b156a4c24852e0249fb9ac4c,2025-03-06T17:15:22.117000 +CVE-2024-58084,0,1,761e0a19a7541dc4d3adc17b41965763858ce0bf661795c1c731b788d5c9ed6b,2025-03-06T17:15:21.890000 +CVE-2024-58085,0,1,981f4d06c7f8e86d1255978131fcb7e9ace6150d195fd8a485d2043b45aadc66,2025-03-06T17:15:21.993000 +CVE-2024-58086,0,1,2552955cd63adef972bd47a06698e4a6528aa21dc05a1acde05264ea141bd3ce,2025-03-06T17:15:22.117000 CVE-2024-5809,0,0,d3a3cb96d02b3d9c2efd17f0531d777c80fde692d386c7f6a56c47f2ca5601d8,2024-11-21T09:48:22.387000 CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000 CVE-2024-5811,0,0,0c5a0ebde16bcb77e73a53dccf7ebf134980e586a889ff63137b1e7e940a0edc,2024-11-21T09:48:22.670000 @@ -276524,7 +276524,7 @@ CVE-2024-5844,0,0,f7166c2f80e920e08cba7fdbda9a9366885767ae136f41bd6ace84d90afa50 CVE-2024-5845,0,0,5b718370e84b679a81637d4199896e68b9d165593a0e376dbd37e8074db5eb6d,2024-11-21T09:48:27.953000 CVE-2024-5846,0,0,8fd5b08dd1640170622320c6f704197b1a2832967577812e5eb5c9fb2a7ab82d,2024-11-21T09:48:28.140000 CVE-2024-5847,0,0,87d5ce050b557a465e5143a009946f5f5087ff74600ecbcc1e881bb1a360ae8d,2024-11-21T09:48:28.323000 -CVE-2024-5848,0,0,dc3aa0f733e1eb48b3d1e9d76cc553e7dea44c222e666ab2b0ddafa6b6ad6a75,2025-02-27T08:15:30.887000 +CVE-2024-5848,0,1,92236bec3aadb916f90e12dd83f421792788223b1ce6adfcecc2ead6aaff5406,2025-02-27T08:15:30.887000 CVE-2024-5849,0,0,fcdd5e3412e958dc179ed0d47847c43372ead73476748f6a3d0337c11bff6c59,2024-08-22T13:39:08.797000 CVE-2024-5850,0,0,e5d2b7b1a227233983ef8bd2d81066bf86b1d44aca51f5ecdbb32fc2de38e3f7,2025-02-11T02:15:35.600000 CVE-2024-5851,0,0,23075b3a54affb58b02778a8d88f3439b383cd88f7b75f6ae996ecaabe77b41c,2024-11-21T09:48:28.597000 @@ -276546,7 +276546,7 @@ CVE-2024-5867,0,0,a84a4485b9b89a34a9b2e6540030b67f8a9bef718a8a51b99351ad92423ca5 CVE-2024-5868,0,0,09bd98c6fbd40287ebb31f53ece0d15fc5e4a7a8b3a283f4f90b74328626a728,2025-02-07T19:49:25.727000 CVE-2024-5869,0,0,68c3e0fe848ae034c25ba0cebcc0c0b603f13bafbcf85f0ffdc6bd0f553659c4,2024-09-27T01:06:16.247000 CVE-2024-5870,0,0,5e5fff01583dcc3023fca0497ab0a6cb9a973e707aca05f8f359be6d39f0e46c,2024-09-26T20:24:16.813000 -CVE-2024-5871,0,0,5557870bbf7d06ad40e5d158a4bed29348efed404b6919402396dccb208edc9d,2025-02-07T19:41:49.427000 +CVE-2024-5871,0,1,3eb162460689194d8f63349c5321bd2a1b7ca422cd1da7eb6781615a007c071f,2025-02-07T19:41:49.427000 CVE-2024-5872,0,0,9e0dbb26beb67fcb568ee746e66cf304472696e00c98383571f35075d22013a8,2025-01-10T21:15:13.367000 CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000 CVE-2024-5874,0,0,a9e63275a6908bf33435b1a068d43670d23b99f7e26f6c3e737caf48c167229b,2024-11-22T20:15:10.900000 @@ -276910,7 +276910,7 @@ CVE-2024-6257,0,0,3c450049ad1a84e0b297a8d37be25b1d0e2549032909d0064d332ba84cab26 CVE-2024-6258,0,0,9f8fd150e46db75469fd7fc658db5aa120700d36ac5826497f097b978edd30a4,2024-09-19T01:40:32.813000 CVE-2024-6259,0,0,c6f96fdcb3ff3fff17080c8c4b550038410883f348096d5bc80a22f11eca4cfc,2024-09-19T01:33:36.477000 CVE-2024-6260,0,0,d4af7b4cfc44f08d8432811020e56f72bfcd7f1f60b9158bd5a407cfd9935f76,2024-11-22T20:15:12.013000 -CVE-2024-6261,0,0,8e80528e64cca61616963b548cfa6c5959e258ce88f6816380a77d74ff99229d,2025-02-27T06:15:21.790000 +CVE-2024-6261,0,1,e7733b4af567c2826228022fdb349dc1cb9f5ab66144a859ecb4cb89a52a70ca,2025-02-27T06:15:21.790000 CVE-2024-6262,0,0,25f9bfdcc4aa7fbe45f36b65288775ce8759f234561b7e68f77257c5e457e984,2024-11-21T09:49:17.823000 CVE-2024-6263,0,0,64ac66a765d88001d3119809569f68e9e73208abe19a92eeb56f7a4ffa929880,2024-11-21T09:49:17.943000 CVE-2024-6264,0,0,02e86a9a4bf982b67050a877dc734ef40fad5667e32ddac6d7d5d04963214bed,2024-11-21T09:49:18.070000 @@ -277055,8 +277055,8 @@ CVE-2024-6406,0,0,2676ceab1816a07520f22ea818a76e0108b2919867915793ed2db25d1f5f91 CVE-2024-6407,0,0,9a5223a8fc4d11a8f457182deaf2f1a5f23abd2e31a0d369ada5145f5e176bee,2024-11-21T09:49:35.463000 CVE-2024-6408,0,0,25be28a21749757d9e20038470880e70a210d6afa8753a64a1a681ca83054a70,2024-08-01T14:00:21.483000 CVE-2024-6409,0,0,a7fd15ec37d21b5a5103c31d051df2a98fdd11293bcfd671adde2d6b71c1b7da,2024-11-21T09:49:35.850000 -CVE-2024-6410,0,0,ae2b2b5977faa2e52d9fb5041374baa1b7ced554998462464e0e0a16128ccff3,2025-02-10T16:02:35.810000 -CVE-2024-6411,0,0,5a7123960073da6f3472404ad6d252c6df120049e1844aa9a0e7eee8334467e3,2025-02-10T16:00:19.467000 +CVE-2024-6410,0,1,50165d1662967869bcb3714348c22773aa44b11bd1ca581e38d46fb1aa191fed,2025-02-10T16:02:35.810000 +CVE-2024-6411,0,1,90292b1bab251c6b9659c50637f115ebcc12ba19d63f63d982b560f264848cd6,2025-02-10T16:00:19.467000 CVE-2024-6412,0,0,17fb16d5f528a280f2b0c9c641e625a33a0d132133fdc0f6fa6567342a855ae8,2024-08-01T18:35:24.697000 CVE-2024-6413,0,0,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000 CVE-2024-6414,0,0,680b93173475ddcaa6adbc0944f1e5c3530a7e69a2cc6fb17e05baeb0ac3d8c6,2024-11-21T09:49:36.473000 @@ -277099,7 +277099,7 @@ CVE-2024-6453,0,0,598b1df42401504abfd5c873e4d328e0cc7ab8ec4d53af830b48327a3ab481 CVE-2024-6455,0,0,ee8244df84a11847eb1bf1028e566aa28523bbaf30c0278a51b37678378b4bf9,2025-01-16T15:06:56.973000 CVE-2024-6456,0,0,4d342ef8d1540b057336adffb43adfa93f0a092549b037991ec55128528c4378,2024-08-19T13:00:23.117000 CVE-2024-6457,0,0,9fd7207180c09f39d2da8b48b95fa822cfa4ef21e4a0f2e04ef9fa9c667cf66b,2024-11-21T09:49:41.470000 -CVE-2024-6458,0,0,8a3ebaefc03a7a26d636a3edb16257b0785e2c2c28887ce21cc208c5bdae5646,2025-02-19T15:38:25.183000 +CVE-2024-6458,0,1,b11ced7b48e4999cb2402c171f587f9305fd15589abc8a139c63445b66e9d620,2025-02-19T15:38:25.183000 CVE-2024-6459,0,0,cb27c4eea4018b8b04b2fde4bc91aba6c1054949f5b07e05557b1533c2ff9cd3,2024-09-06T17:35:18.880000 CVE-2024-6460,0,0,63861aecadef5cdffd3766d8f1f2c1741328b3e12a69d4364f017e469adf9a4c,2024-08-29T21:35:12.753000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 @@ -277124,9 +277124,9 @@ CVE-2024-6484,0,0,2321b3e4cac43e4cb38252b77fbd5ab74d6875fab07b3d2a29d1bb66c757d2 CVE-2024-6485,0,0,5de38639f840b10385a78b6c25abdb8a0ace1dba6d9d706af40210e5d356fe95,2024-11-21T09:49:43.863000 CVE-2024-6487,0,0,921508357c74923ed124f2aa5e291b9363aff9b880ede7a7c8c63969fa3cb1e7,2024-11-21T09:49:43.990000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 -CVE-2024-6489,0,0,5bab2db41f476f0a236a169d4c1048ffe7dbe513b8eea448628621b896a626e0,2025-02-04T18:04:39.737000 +CVE-2024-6489,0,1,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000 CVE-2024-6490,0,0,f07c5d01534f9d7db74ad4f9c70da26cd7d2ecd19d83d76ec7babc7619efc0e4,2024-11-21T09:49:44.290000 -CVE-2024-6491,0,0,8d47fa4b354c5a04c99ab85e1f11b49050bc92a585ed6d7c2ab339e6bee65cae,2025-02-04T18:04:16.517000 +CVE-2024-6491,0,1,a07e0d56f7fc28c3f1292b90a22fd6a616cc710caf31e939ed63246741b6e559,2025-02-04T18:04:16.517000 CVE-2024-6492,0,0,9c2414922871ab30614f56835ecccc8694f189e5e267c59f2a5c738ba43c5038,2024-11-21T09:49:44.590000 CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff16217,2024-09-27T21:28:49.020000 CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000 @@ -277196,7 +277196,7 @@ CVE-2024-6563,0,0,20dbfc9da09625d3774bc8d08a3c2da165600124f44189dd9a1f9a35360b93 CVE-2024-6564,0,0,e643f763c48681048fe26389523b4b2d122c57091396d3974a38e3f4ce918628,2024-11-21T09:49:53.680000 CVE-2024-6565,0,0,f6e4e3ff9362d309b7e696ab2283a4d7e8af7f94f4d8ecb59874d16d69223754,2024-11-21T09:49:53.813000 CVE-2024-6566,0,0,fe974bb5ffaea0494d0e619a76e8b4262eaa71592402018f0c12bbeaef880d90,2024-11-21T09:49:53.937000 -CVE-2024-6567,0,0,73c5d5348d1a15ba867003500782a556a4d13a49f7b32100fc4d8ae29ab3fa4b,2025-03-01T02:14:17.087000 +CVE-2024-6567,0,1,e3cbd81ae2c60b6d60772e4f62486bf6ff1d57b2c9c7383945ef38153dab2599,2025-03-01T02:14:17.087000 CVE-2024-6568,0,0,ecf43df633689b708ccd083aafbc7fb6d5daa57fdca09ceaff6797aeeb61b95f,2024-08-21T12:30:33.697000 CVE-2024-6569,0,0,52ef91a961b1fc6f6ccc9ba0ca4cce257430e6716ad79cf2380f59bcb396d604,2024-11-21T09:49:54.260000 CVE-2024-6570,0,0,c7a7a16cb852f8f3171a4638c5b633cedf4d5a5ce0b9a65668ea70faf379817b,2024-11-21T09:49:54.383000 @@ -277257,10 +277257,10 @@ CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca CVE-2024-6632,0,0,268b2594307f0bda8e17a2689039de2621f9fc5f9af9fdc9e5d9433dac3ae035,2024-08-30T14:07:18.443000 CVE-2024-6633,0,0,cda5c7fc0ca2db4cf8195816bab379d74af0fa26cdbe5f912287de04e4ee8327,2024-08-30T14:11:45.287000 CVE-2024-6634,0,0,f03f7665ce29f89692475d4e7ad26f71c67c7220472b79a61d39cb4d5d4e01e0,2024-11-21T09:50:02.530000 -CVE-2024-6635,0,0,aabc15e901ae2c41752eaed36005434ed97c7b1f65594adeb88575f5ed99334d,2025-02-11T15:39:13.527000 -CVE-2024-6636,0,0,ff144c80a27724056f459d937300862b4389853f4bf6b5f86d95908311b3a7e0,2025-02-11T15:41:28.280000 -CVE-2024-6637,0,0,0663aa8a54052606afca718825c3e6cb2f7778a011fad59e63fe847bc2fa51f3,2025-02-11T15:43:25.850000 -CVE-2024-6638,0,0,7e5bdf6db9909ffde8a3af7dc2dbe736094707a98f8199ce236a2f9f68fb0869,2024-11-21T09:50:03.050000 +CVE-2024-6635,0,1,e3e6a83352df325310bca2cf1f0aa810f4becb732ae576086becea9b0f074c36,2025-02-11T15:39:13.527000 +CVE-2024-6636,0,1,119fec91aec708ba450bc164b7d265343c048fd6420a6e92527fcd7535ffd644,2025-02-11T15:41:28.280000 +CVE-2024-6637,0,1,8cc2b62e3688860186b71fd0580e2f73983cac68a5cfb5caafa8fa3b703f0149,2025-02-11T15:43:25.850000 +CVE-2024-6638,0,1,92162d60401e245005cb32b5cbb3dcf2b6433ddc62107f904751315909cc5923,2025-03-06T14:24:40.890000 CVE-2024-6639,0,0,b6af8e6c4b9702263f02409397a7833b6c6b23578255eef1153cdb5aefb44942,2024-08-12T14:46:23.463000 CVE-2024-6640,0,0,74b4515f6b06329765182031b4f6c4b2c94e8f2b65e7f1f9795a0017fcaf65ca,2024-11-26T15:15:35.053000 CVE-2024-6641,0,0,3f8fff3477097b21aef67b0f7d7d46ad90eace6d6a1177cfedf4b60ca081218f,2024-09-25T19:07:40.013000 @@ -277388,7 +277388,7 @@ CVE-2024-6780,0,0,4db2765824e08317655513c06e959ab5619d487ccfa2efc1d7c86120a66859 CVE-2024-6781,0,0,47a24b53fb6b9fd8c09af1c57dcfaa9c67d275ac691fc2f4c15d2dc0980fd1d6,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,718e1d79780261b60c359e19d0776a8dde2ec8da1b3bbbef9c2b08242f327e82,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,30396e535fef620becd6732289bd9ae4f80ad5b136f96028347dd4d24b676e64,2024-11-21T09:50:19.543000 -CVE-2024-6784,0,0,b861c061357595e269b74b1abd4aed15b62ed7a6b59edc86f5fd4fc71b5e7555,2025-02-27T15:45:57.977000 +CVE-2024-6784,0,1,3db9a9b75f9bb5d25e5b86797d3bf363d7d2e2a7bc4ab203e41cfcdc572c9375,2025-02-27T15:45:57.977000 CVE-2024-6785,0,0,c43194406d30df565911463e2d4bab322b72c7e74954c641df41848e92f8ebf1,2024-09-27T18:59:25.253000 CVE-2024-6786,0,0,096e13123b872997f97663c9a7629e8a421cf92386c5322fa6cd5e2f0d8e78bd,2024-09-30T18:31:50.473000 CVE-2024-6787,0,0,8a1fc137a9d09d87a931aef1c2ffb91f2c30216bc0a45745d239e3314ee732e5,2024-09-30T18:02:51.080000 @@ -277411,7 +277411,7 @@ CVE-2024-6805,0,0,1c210d059e5406d15a939f7588c555a69c38d162b88d34499e6d9a21643fd3 CVE-2024-6806,0,0,bd9029223cfe8d0849ca636b94ad7a5588631303a0efbbe7c8640e9f42ceb678,2024-11-21T09:50:21.780000 CVE-2024-6807,0,0,7f71653e35ec114f0c23aff9fc2f04ca0ecdeb8c0033f0fd3b1799a46e782b12,2024-11-21T09:50:21.907000 CVE-2024-6808,0,0,69f62605e7fb121e33aa81824d018e7482a9cb46dab12ce4cdf216b5192e6597,2024-11-21T09:50:22.057000 -CVE-2024-6810,0,0,b7324a97d1e60a0a25fdcd596a92cca90fd5d738e0e69db372b839e160a2a858,2025-02-26T13:15:40.600000 +CVE-2024-6810,0,1,3aa0289c5b55c0813f23eeba3dd4eab1a11c03e2079bbbda39ffbd6f73ab2601,2025-02-26T13:15:40.600000 CVE-2024-6811,0,0,2c1c48c47ef38136f3e99ba59fe67000710a1b454b7a3765f0d5dee362d67d67,2024-11-25T17:17:22.273000 CVE-2024-6812,0,0,264f3438db917ec43d2bff1f5d827215fa9d89e7b8f942d74adc5117890c2457,2024-11-25T17:17:07.970000 CVE-2024-6813,0,0,278bd177812b8586be5e9bf710944d5077ee2b922460d8aec51a06ad7fd376e8,2024-08-27T15:01:38.630000 @@ -277424,7 +277424,7 @@ CVE-2024-6819,0,0,ddb9aad5e919e8aaa951196a3c8629fe866716676329711fcf1fba08b1512c CVE-2024-6820,0,0,d49345aa069d354d1c6e40ded1ad61f62a354359a5ce0728beadc1fcf2503b8d,2024-11-29T18:25:55.430000 CVE-2024-6821,0,0,d9533168d7235e28df27c61e6f5f17f9ab7fdd5177768258a9eb801a7c053fc6,2024-11-29T18:26:30.487000 CVE-2024-6822,0,0,d07de9efa27babd066138fbe688e614f83b8a08f0a4be3e53ee99f76a8051349,2024-11-29T18:26:48.817000 -CVE-2024-6823,0,0,8db0be648b0bd3faaf15655ce4cc0fc988b8cebbf43401c1844ead64f4937299,2025-02-07T19:13:03.450000 +CVE-2024-6823,0,1,eaa64c1e1310315b82e5f832c97e01ca2308a13290a3ec0ec0da80c626a1014e,2025-02-07T19:13:03.450000 CVE-2024-6824,0,0,aa23fd5579cfdc3f2c0e9f65e67bb12c513928f2173d0f46d80385a5b5f5d2cc,2025-01-08T21:19:51.450000 CVE-2024-6826,0,0,6dc3ddf1692843a912faeec64198f3b4a4c6df842fd14ed632d889092f2dda4c,2024-12-13T15:29:32.850000 CVE-2024-6828,0,0,982edf1ce9d659dfbd11370bdbf0f7daf4367ded5d8dbae90ae3fb05b545d32c,2024-11-21T09:50:22.943000 @@ -277679,7 +277679,7 @@ CVE-2024-7131,0,0,b08d2afed20a09a710ebfe4d4d3349ae3aed1ab3b039c0e6dd36342e0a8070 CVE-2024-7132,0,0,7f00893e6dd2b548c0a141178cd51c01a0e977f2a9e4adc229306e5debe17a1a,2024-10-07T15:44:37.107000 CVE-2024-7133,0,0,20a71460acb2cc2918dd1a17d948e3f8e3572ca60a62cc2cedc03afd6786436c,2024-09-27T21:27:50.053000 CVE-2024-7134,0,0,e2a5ca3c0db9b7079284acb04005dfa5285d4bba9eb8cb07d690e27ce1cf16fe,2024-08-21T12:30:33.697000 -CVE-2024-7135,0,0,2710a429338a782f11beb530e2762598e3f2560e6e78fc1747b54e7ef50ad7a0,2024-07-31T12:57:02.300000 +CVE-2024-7135,0,1,3c1faff3d86461f1f643e4cd3b8efc4c334a8616131dc7e2f488a311aafc137d,2024-07-31T12:57:02.300000 CVE-2024-7136,0,0,c9b7c1934246d93b2333971d2ef8defed42959b13176d62d2020adb9f2cd26cb,2024-08-19T13:00:23.117000 CVE-2024-7137,0,0,315ca8a4d8d765de04e23f26963a3f09773d43e19e5c1f55bfec2de2390ac1d5,2024-12-19T20:15:07.820000 CVE-2024-7138,0,0,5c76b507d93bfe0849573964a8b74ef29a6c94608dcf9ad8427b4e5898b74f76,2024-12-19T20:15:07.947000 @@ -277925,7 +277925,7 @@ CVE-2024-7385,0,0,101c941ce4234279ac93469f4d75a71718ff61f7f4f159a8cf136648a29532 CVE-2024-7386,0,0,623f13cd2bc79eb32d7c88560297357b78b3ef2e7abbbf45c8d9ab2e2aff0739,2024-09-26T13:32:02.803000 CVE-2024-7387,0,0,c2f7dcf02cdd17901d7de24823d83c3c0d3eb2f86ae88f5e8ad91fb71d3849b1,2025-01-09T09:15:07.903000 CVE-2024-7388,0,0,832d23d5406547c0193a4b31c0fd589fd6f309473f42f5bd0b1b9a8f787e7450,2024-08-13T12:58:25.437000 -CVE-2024-7389,0,0,51a45c74c4d7034be1b54a31386aa4fa5b65613721fbdd00afc8832a9fa00ab5,2025-02-05T14:59:01.993000 +CVE-2024-7389,0,1,4c79c2d529ef8bef508283cf27c80fc3b6982c4aebcf90f4ed7c8c1833408988,2025-02-05T14:59:01.993000 CVE-2024-7390,0,0,62257d50cfac87a87bf72bf184895cbf9edf65dcbcd5b500828f71bf6dd1b693,2024-09-27T17:45:05.590000 CVE-2024-7391,0,0,2752de4ae00b5b2870d0f6d32309617f0c9e8b04345fde12d660bbbcdd1fe039,2024-12-03T21:44:10.397000 CVE-2024-7392,0,0,df337276c1b7ad5043680e2710dff50a1d97b86398705520a864550842c7662d,2024-12-03T22:17:52.127000 @@ -278007,7 +278007,7 @@ CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e19 CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000 CVE-2024-7480,0,0,889913e08b28911ab727e916e197e7a32d9902edd6649d9f23fe700790b2a411,2024-09-11T15:03:37.293000 CVE-2024-7481,0,0,bf6e71c305fd43251fbcb5f52a4a81345af9e8e272b1611d80c17ceab539c2a4,2024-09-26T13:32:02.803000 -CVE-2024-7484,0,0,7c4d26b1ba70bd39a9bb804c68a784c1c96899ed50549db9c943a59509e28e8b,2025-02-07T19:12:46.530000 +CVE-2024-7484,0,1,91af1fcb4d9c46146c066bf51df63a9ca9f9300e2124a9fb4c79312110691cfe,2025-02-07T19:12:46.530000 CVE-2024-7485,0,0,77a03737f64f0311e18ac38b85b14e29cda902a2427dcdfc9eb2926e8fac9b18,2024-08-06T16:30:24.547000 CVE-2024-7486,0,0,764ad773026fa24416076c90ec047cfade301c0aaedd49f54191cc16389d738b,2024-08-08T13:04:18.753000 CVE-2024-7488,0,0,719a60a8572e224f7b257d2e4a4320c1c0c34f3675642f73203161eda33945f6,2024-12-05T08:15:14.123000 @@ -278025,7 +278025,7 @@ CVE-2024-7499,0,0,1f894e06dcf2ffc46bf576263476a1e41e17bcdaa43b0c3ece5c027d5d00cc CVE-2024-7500,0,0,e24730c23801166bceeccd068e22a1ade614f77d984bdf814a09184ef97d6a94,2024-09-11T20:07:31 CVE-2024-7501,0,0,6546961937872b029a9a0f0f0f5ae6ba43c71845a59f340aa15f275b3d86a9a1,2024-08-19T13:00:23.117000 CVE-2024-7502,0,0,3d48b5160a60b0b52457d33ace8b486d4c8d94c5b53a8f8f0a6965a353bdbdc7,2024-08-12T18:50:46.897000 -CVE-2024-7503,0,0,6f91670b5df8fc2cf24cc575e1a4ec777c4fffe91c690d5f9f8e06999ae94e47,2025-02-07T16:06:13.577000 +CVE-2024-7503,0,1,d6c7c3ffb46d01ee4183356fd2575cc5ef075201c14a2d9c7b378234847f86a7,2025-02-07T16:06:13.577000 CVE-2024-7505,0,0,bfa4d15952f802402ee91b24aef891e71e2dbce621fc81f9b13788a770a39fa4,2024-09-11T19:53:44.640000 CVE-2024-7506,0,0,558c8ee2b1a5738c55ad1b92337d7240683a7081d00a086d02e166b3b90d9f87,2024-09-11T20:02:56.717000 CVE-2024-7507,0,0,81f2ab319d251c54893f817485f4dff326a8b55e82c579d6f103ddc3ceefd79f,2025-03-04T17:11:31.917000 @@ -278077,7 +278077,7 @@ CVE-2024-7553,0,0,51c76f89ad0f35162dc146930d14173942ac0baef362fda00eb08ea86e0c96 CVE-2024-7554,0,0,1df9b2230aab1032094083d8fb6fb42fa73877160c1bbdfc733d62b31133ecb3,2024-08-29T15:42:13.387000 CVE-2024-7557,0,0,bac422d2dabdaa8c81c707ffed7c996ac4df061e4999eef6ba5a759824250d30,2024-09-18T07:15:04.293000 CVE-2024-7558,0,0,259bdf301858f4db668dd1acb451e2b7d5b30015660e19c8265bb194624378a1,2024-10-04T13:50:43.727000 -CVE-2024-7559,0,0,609d7fa4a20a03e98b660480020be11bc57dd898f45f5123cdb0567f5d105d11,2024-08-23T16:18:28.547000 +CVE-2024-7559,0,1,5e435d767b44513fd54316132a44278d70a54fea7d0236802467f50b34df9092,2025-02-24T18:17:21.883000 CVE-2024-7560,0,0,42fcc5d7b3253b142f100968587a9194b34fc19177fdb10cf4447b9935e32495,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,39b56d5e0c935d1569f6c65718ccaefe2b713d37c7e2453b35a28aa8c470f51e,2024-08-08T13:04:18.753000 CVE-2024-7564,0,0,aaecac6657aebcba5c5a0a4353a649c0e9b449808e772fb1d7591dba40d01531,2024-08-07T19:59:36.240000 @@ -278135,7 +278135,7 @@ CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54b CVE-2024-7620,0,0,a6e1762202d9ff2fc30aafa4e82dc20cc0dbf79d1afd8927d81b277e2583dae3,2024-09-09T13:03:38.303000 CVE-2024-7621,0,0,d7edbf78cd9a0025f60a31e1bc1601b793ca6cf0a0f9a7273953ad6a55f1fc7c,2024-08-12T13:41:36.517000 CVE-2024-7622,0,0,1a72a4df56e9b8fe0a0165570b42b8b40c9d3f5ee79eb2feb6dba40c6f2a3918,2024-09-26T21:42:15.400000 -CVE-2024-7624,0,0,4be85ddc4d446c89052e7de466dfca74aeedf2875e4143ebe29fc18ca0f37378,2025-02-11T20:13:25.027000 +CVE-2024-7624,0,1,ca13ef4c61a642dd21f6701fbde5b3378106ed2d59b811f6d30d9dd2015ad58d,2025-02-11T20:13:25.027000 CVE-2024-7625,0,0,3c5ca40613ed86e8af550ea015437d4d37f0d998b4731eb2e19b9c5d63a26f1a,2024-09-25T16:15:11.307000 CVE-2024-7626,0,0,acb590d53cfc7ff0f752b107c4788e7f8cb1f661fa0fd16cad1862bcdd4cf3ba,2024-09-25T19:32:57.807000 CVE-2024-7627,0,0,7a27d6248993c2a650c62eed80c2a5e47d8cc6211f5d1a0602c8ccc0f987de58,2024-09-11T16:31:21.893000 @@ -278279,7 +278279,7 @@ CVE-2024-7786,0,0,2ff24a5a37133b947596cb97ca7416a1fb3cff87f148315852ff960213611c CVE-2024-7787,0,0,dc05dea1aca9fda0048c6ff5b3f257f2aaaa5d290a64eb06e79bc06f0b79c290,2024-11-15T13:58:08.913000 CVE-2024-7788,0,0,c15915500f1fc8e21d1d2aa102b7c394f1759dddf488852d2eb509929c3ea685,2024-11-21T09:52:07.257000 CVE-2024-7790,0,0,55a8fe7f165440c1b611a0ec93f5ff76c0372f2b6d297c28ae593d542706d680,2024-08-20T19:27:28.757000 -CVE-2024-7791,0,0,385b6497d15c90d34d79d72c2097d99a06fd8d1fc2bf8d47625b02fb0b2350bc,2024-08-27T13:01:37.913000 +CVE-2024-7791,0,1,eb7c9c3dd7c137372f71f1e1a9bd20bd208a4dd2448bdeedce0473e2d45c9d0e,2024-08-27T13:01:37.913000 CVE-2024-7792,0,0,daa4618510d153e1eb039f21aba5a9854241b5a7b7da9510518f71aa2affc758,2024-08-20T19:08:12.970000 CVE-2024-7793,0,0,4471c342a1d373cf44967e0b25d2c12a4246d1582fb1d55ff2912e7fec81c214,2024-08-19T16:25:22.220000 CVE-2024-7794,0,0,12bfc8cdf4bae5ce8ffbbb5e4de3c98735b7bb45d6ef13dcf41019cf072ae8a9,2024-08-19T16:27:08.303000 @@ -278336,7 +278336,7 @@ CVE-2024-7851,0,0,f11c43fa9f3080cb7691f923c879e61ef6621a4b03eabded14075a6a5e232b CVE-2024-7852,0,0,086f1046f119e4d1dc4c4432b6abf1e3b4611967eaca0ac84ff54546b0cea518,2024-08-29T15:23:16.160000 CVE-2024-7853,0,0,e17f53cc26f5980375c896fa58871077ee023a1ef8dacfba910f4f9f84cb0554,2024-08-29T15:22:52.710000 CVE-2024-7854,0,0,0b47ffe940d38ed9e7bf1073212ecf4340a21634e21c5b44d416692cab2d3fcb,2024-09-27T17:27:56.723000 -CVE-2024-7855,0,0,e19f48d6a415274271412e871e4ee90e6d620975dd2c0bc54a79b00a343a1614,2025-02-11T21:42:45.820000 +CVE-2024-7855,0,1,21aa671c57e7a459ccbbc994ab05daecbf46cd285918bd59b3d3da6920984670,2025-02-11T21:42:45.820000 CVE-2024-7856,0,0,05f69adb00ddf77a27097603eddb7157cb533b16d14142b3b062d6f580a91fb0,2024-09-13T18:14:47.280000 CVE-2024-7857,0,0,d03b7d8d56a99d042b21d0588f3b1b7385f120b777ea7b30b3ff959ff1df4f98,2024-08-29T13:25:27.537000 CVE-2024-7858,0,0,3edac6c9a0e6314bcc735462b6b60e668fb000079290c4bf735be564ae6ba2e5,2024-09-03T14:34:09.017000 @@ -278353,7 +278353,7 @@ CVE-2024-7868,0,0,9e808ba59db5e75df79564ecc2138484211632b9d431d14239406d748d65bd CVE-2024-7869,0,0,a24ed1b37588c27588e8f347c06825561aa4e483768430e73928fa9d6c6d77d1,2024-10-04T13:51:25.567000 CVE-2024-7870,0,0,3ed63dc8c6790f45531fa92ee00a8019436a7c365c07e1d62a5d07b0d3c88d17,2024-10-07T12:29:19.203000 CVE-2024-7871,0,0,31db92eb5e0af181e39b35c41b604931a9d330c8192fefbcc353a016d70cbca3,2024-09-04T17:34:14.630000 -CVE-2024-7872,0,0,da9e48ba3c5ebdf2a98907c1d3bb0d0d8666f811524323efeb2f562336a5c4c6,2025-03-06T12:15:35.667000 +CVE-2024-7872,0,1,722286cda6e9c6f12993da3ca6c6f6d07dba82346ed0de38f84a12115df85f79,2025-03-06T12:15:35.667000 CVE-2024-7873,0,0,03a7d50af22555e4239c69e93e200f90c2450fb77addde43aeb65c5f4bc2bdc1,2024-09-20T12:30:51.220000 CVE-2024-7874,0,0,79509650a2a2c64601c5be3ed14299dfd192578a0a0c4b43f8e745203fae82b5,2024-12-06T21:15:09.487000 CVE-2024-7875,0,0,fb1669572475de6533c581f8c56bc49b1a49b90132a9fcae7ae022ebc7e1b8e2,2024-12-06T21:15:09.613000 @@ -278458,7 +278458,7 @@ CVE-2024-7980,0,0,e8a3a45c56239daf8539e2eefc5a5fa653a5119b71f94f66cec627822cde64 CVE-2024-7981,0,0,1c6e460cfce74f6fd4e2f6469dd41e8f70193dc8e653e2954b698b81d2342698,2024-08-22T17:36:24.803000 CVE-2024-7982,0,0,462c506ba764519643e33c61c10fcdfbe069d0c78c9882d0732f619d73215e62,2024-11-08T19:01:03.880000 CVE-2024-7985,0,0,ec1bd93d5f9861900169c49521b54a80432ffce2591a30e5deaf45d454faf56c,2024-11-08T15:22:33.123000 -CVE-2024-7986,0,0,3b9d2cca92fbfd6ea714e5592d24cb9b99aa6ba9d32ddf59932e5b35a9cb5eb8,2024-08-23T16:18:28.547000 +CVE-2024-7986,0,1,923fa5836f510e17609369738d0cb8b5b9a6b25a961b0efd03438a183a8f2fa3,2025-02-21T19:08:44.023000 CVE-2024-7987,0,0,408ab95ecf75e2d07c3e9445941bad830e3599aae4004b6b3198df0552516904,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,09d3f7d89a87370bd48978c69be2120f08467490773370f6645beb798db695e0,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 @@ -278468,7 +278468,7 @@ CVE-2024-7993,0,0,07965c83eccb4d0c1d02c4c0f63f174d1471ffa40acc41fbcf0de6e84ca8ce CVE-2024-7994,0,0,677bb0d3a07210a7d5902c83c522b3beb4ddf65c53dfa15f4ee3e8a6eb5c8b23,2024-10-21T18:35:55.397000 CVE-2024-7995,0,0,a8b278e923ed83ab90058edd8bf9d51cbec9eb8e7e1669b64ad19e97359b7962,2024-11-06T18:17:17.287000 CVE-2024-7998,0,0,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000 -CVE-2024-8000,0,0,20d17ea2c760ae936afb73caf17f54bd136cfbcd975e64763d63d4fbfcc0cb6f,2025-03-04T21:15:12.220000 +CVE-2024-8000,0,1,3bc399d62a5af40474781b6fd8cc82441489eebd46151340b3af8fb7996e4262,2025-03-04T21:15:12.220000 CVE-2024-8001,0,0,7aeba4a4d15e98a48f9b2362095933d475040fffec8531b1bbd417b6eade812e,2025-01-08T07:15:27.463000 CVE-2024-8002,0,0,0cb7909b5f1f4d7c5244de591889203d2577aae5ba268c7618f858bb8db772fa,2025-01-08T07:15:27.773000 CVE-2024-8003,0,0,badc57814940a87be012bad00d6c0167779253eead22504dd18a460d7e0be4df,2024-08-21T15:51:28.397000 @@ -278540,7 +278540,7 @@ CVE-2024-8097,0,0,c73e330cf372ba66691065108ce7a7c3faa714d62d6d305b38abb0b1408d0b CVE-2024-8102,0,0,c8d7e80f3d01e30f125b61e16f2075e20200cf969389ffd8a679fa4e25d12ca9,2024-09-05T13:28:54.747000 CVE-2024-8103,0,0,c2a7656e489435896ea57a9d9970fe3499a0bb14c13a60e9b0db54bcdc5dc797,2024-09-30T14:20:16.063000 CVE-2024-8104,0,0,e493a0bdd9ca485d90b4c1faac1d17a7f4cda81ecf7833fe4a37d0f679df8b4b,2024-09-05T13:28:06.817000 -CVE-2024-8105,0,0,0aafc72473c14f7daaa869385fc7bdf76544159ffb827b6a601e3fcbcad28a0e,2024-11-21T09:52:40.667000 +CVE-2024-8105,0,1,4a8cb33bbf32349f3885dd51317fd5286fc4bbbda0dff9917240cf0165830508,2024-11-21T09:52:40.667000 CVE-2024-8106,0,0,39be3434e5c93bf3e6aa0b9056d1420710fce531a01958832674b0cb3218f570,2024-09-05T13:05:52.540000 CVE-2024-8107,0,0,68e4ec4c5a00408a6e057c68bc091a3beadb6e2833b415830197105e4294068b,2024-11-13T18:06:00.077000 CVE-2024-8108,0,0,b1c9b52258c24f33554e3bcd48b3590684a7946c82a0ab8c4c87d072ed6d9bb3,2024-09-19T13:37:32.203000 @@ -278614,7 +278614,7 @@ CVE-2024-8181,0,0,df421880038257102966196c13cd04d05c22cea7a93153a2801c2b264a3f91 CVE-2024-8182,0,0,ea6aec216face156fcef6f098448074a9c150d5b197d49bfe7028bcbeb9c8aa3,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,6044cfd9d7679b518bad3b71d8be891d1f4f800d655f9ad4df1a737adb133d14,2024-11-08T21:00:09.857000 CVE-2024-8185,0,0,5bb32bde0a7376fbad45b0ae1c279a948502740cbb2731bae19b85e8ae7b7b9d,2024-11-01T12:57:03.417000 -CVE-2024-8186,0,0,ba8e3276e80d606f27d0f412499f6f413e8d72031e60f9d67042c76d7e4d1153,2025-03-03T10:15:09.937000 +CVE-2024-8186,0,1,40b9ef8d92c720de17757d5723b1f40ac8c19dbe40b420eec364ab40b04fe6d9,2025-03-03T10:15:09.937000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8189,0,0,11741570df8ba8e8c35245ba7ffe597cab54eae987d0728aa893ae354525d134,2024-10-07T15:44:45.110000 CVE-2024-8190,0,0,bfacb7a033fdf44fb1cd3aaa6f103e4dd6f39d005302b69dfafb5be0d617d12c,2024-11-26T19:55:46.433000 @@ -278672,8 +278672,8 @@ CVE-2024-8256,0,0,1611701250ae3ec61529b0da09cb8680607654a2f70f8e904e5974c82b4cf9 CVE-2024-8258,0,0,f110e480f74f3d8ee9f2f16ea989eb0ea229b8f21015ec0d3b5c01c8038eabd1,2024-09-27T18:56:41.140000 CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f96f,2024-12-13T08:15:05.017000 CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000 -CVE-2024-8261,0,0,b26e3650b4e8c808c79ab42633b4cd9f746eabe974630e56d567d421bcda9b41,2025-03-03T15:15:15.820000 -CVE-2024-8262,0,0,1b71717d43cc8abe3c9b92de4653872f506de8ba7069bdf5958b8e5371b45b63,2025-03-03T15:15:15.990000 +CVE-2024-8261,0,1,c897a07730782795d57c9afcc6840c1c91721fea5fad18731002040448e27255,2025-03-07T19:37:23.273000 +CVE-2024-8262,0,1,a8f7b4aa15785640ae8bb74224a13bebe2b89827e2dfcff6e5586d4dfda3209e,2025-03-07T19:37:23.273000 CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000 CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000 CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000 @@ -278918,7 +278918,7 @@ CVE-2024-8544,0,0,f57d32bfe54ad578e2b1b1b6b550d79e0498f20d0d3b1ba87ad0030906c674 CVE-2024-8545,0,0,4d8aaefd2ab22645dc32b469397023109e62457bc457323a06afe74dc2a9f189,2025-02-11T02:15:36.350000 CVE-2024-8546,0,0,f93ed1ff4a37b717c58ca72d093af81f5b1a4bb5386b6a5aa1e29e09ebc531fe,2024-10-02T18:56:40.703000 CVE-2024-8547,0,0,5507c5bc9e2a9a528a5460a1f4aec471f22d6289bc0158012b4647417c0610a6,2024-10-01T14:32:43.330000 -CVE-2024-8548,0,0,e790eb3e2ee2949ee465e2600f4ac965b709eb7db2707e2432c78ef11f873f2a,2025-02-10T16:02:02.883000 +CVE-2024-8548,0,1,afbaab6d5c7ea608b3b3557ddfd0e106ea8d1d2701fcdbaf72b84442072ee8f5,2025-02-10T16:02:02.883000 CVE-2024-8549,0,0,9b241b2e318dd0d969e39e62b8546f0ea207dfa2f54cc5c666f1bba9b12975e5,2024-10-02T16:04:41.970000 CVE-2024-8550,0,0,48ce1674ae363ff171adb5737540a91e9036ee92b18bd2e4d3c13a700de299a7,2025-02-11T00:15:29.010000 CVE-2024-8552,0,0,70425fcd76e2369e4f564ff13922902378a4810d60a83152b70c4e59b4a95b68,2024-10-02T17:00:45.083000 @@ -278951,7 +278951,7 @@ CVE-2024-8579,0,0,0fbaa850c4d170545eff862a0f591e0b5fe07b2207ab6dab681b710fc429c1 CVE-2024-8580,0,0,febd2b658a33383b1844bf5e4ca8e8406b84b45b0db85240e7a616229be21768,2024-09-10T15:47:47.397000 CVE-2024-8582,0,0,45e008e574b868ab3d2116a4822a817d620ab0c28e8cb04233f74d54ccec154a,2024-09-10T15:48:30.537000 CVE-2024-8583,0,0,59c8a01f617dc408233b1477928fdb42fe7e3b1da570046a62c1155fe317284c,2024-09-10T15:49:29.103000 -CVE-2024-8584,0,0,b0dc0bea39e7d70469634735abb2deff2bcca9f51dcd1b983d5b1077d93748cb,2025-02-17T04:15:08.240000 +CVE-2024-8584,0,1,60ab30ec7339bc7a3dd0e4a0283ec54560c855749c55796fe229fc5e23ab86d8,2025-02-17T04:15:08.240000 CVE-2024-8585,0,0,e43991387496ce0a491b65292cd0d96af1def22b2ac17ab72a4a3d670a6e4784,2024-09-11T15:53:35.693000 CVE-2024-8586,0,0,c81785849ec75f68cf96f0fe3c9f37de440c3e8b7367165a55bfd7289f79313a,2024-09-16T13:28:03.400000 CVE-2024-8587,0,0,3f4faf35adc81197cc4852be3f91d2d540a69580ad3de8383aef603a7f12eff9,2024-12-16T00:15:04.950000 @@ -278993,7 +278993,7 @@ CVE-2024-8628,0,0,b68a3e50b7aa7f345a4a8d9267235e89f90c245dc8aedbab47c4bc06341f36 CVE-2024-8629,0,0,e2a922a358bf246c8de0dd6bfffe026aac95a455217a4a0cb80f1b479dc48aaa,2024-10-10T12:56:30.817000 CVE-2024-8630,0,0,9231beb3f821a80799132fdcd34c2598101fa414da12f0797383823096e01ab6,2024-10-16T13:15:59.997000 CVE-2024-8631,0,0,6add3c922f01e948b70b9a8f4f98763fe55445e80cc9b5705a7ba1631f6addfc,2024-11-21T09:53:28.227000 -CVE-2024-8632,0,0,7f180509080c5f4934b4540b607ab8a99c8a47493cd996552234f3693eba915f,2025-02-10T16:00:58.347000 +CVE-2024-8632,0,1,1f3c61a93d4f517a45f1eacf3fe318f93e7db2cdd8f40d6e3a7895b4de42b47e,2025-02-10T16:00:58.347000 CVE-2024-8633,0,0,a474bc024171c7d9e69884bfc37072c088ec98aa796f0784ad6c45b7d3463e72,2024-10-01T14:17:43.700000 CVE-2024-8635,0,0,cfb7d449f171f693094a702123a213080518e2e536d3f4261539003d733d0628,2024-11-21T09:53:28.537000 CVE-2024-8636,0,0,fd87b542e8253644768af284e1e9bdd2413bfe5aab3a1c6540c10e1ceae1f035,2024-09-13T14:35:08.313000 @@ -279038,7 +279038,7 @@ CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea1 CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000 CVE-2024-8680,0,0,d26d5eba91e9e07ee9b59e08affa3d4d4587baedebb8830ed04ba5321bbb1f0e,2024-09-27T13:53:47.910000 CVE-2024-8681,0,0,cc400ecaa32dd9e4f3bd8a7ca6c51e9d6c2c86f98de06f0d89656986f17c2119,2024-10-04T19:04:49.490000 -CVE-2024-8682,0,0,daddf41a6d4cb8d01566af592e3a1c558195f98ff5032141058ebb14a08fe832,2025-03-05T09:15:09.770000 +CVE-2024-8682,0,1,23612378c2ae5571508bf1b41cd625a896a2831a252b7f023fb6390234803aa0,2025-03-05T09:15:09.770000 CVE-2024-8684,0,0,654446cab325131fc0e44f97b13320fdc554516047e5f89a6437f77c3112522f,2025-02-10T13:15:26.103000 CVE-2024-8685,0,0,f81829db7e24f10a279a46bb1f2309fba8584ad62cd972b00bc9c625257a6f1f,2025-02-10T13:15:26.270000 CVE-2024-8686,0,0,5fbeef78ba158f7453367f08deedd44d4c0bfb4e67586077c3301c73e0fcba8c,2024-10-03T01:35:10.317000 @@ -279241,7 +279241,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972 CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000 CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000 -CVE-2024-8911,0,0,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000 +CVE-2024-8911,0,1,7b193f113dcabb72190dfa54c4c190e54ec04d545082a5b8916f8e19463ea02b,2025-02-20T15:30:18.643000 CVE-2024-8912,0,0,df126ae299d5cc2caa7160c169ca52c794fe7171d7327a4e34c25ab6fe5c9546,2024-10-15T12:57:46.880000 CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000 CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000 @@ -279270,7 +279270,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3 CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000 CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000 -CVE-2024-8943,0,0,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000 +CVE-2024-8943,0,1,52d936cada047191ffa53571ef516296883876d237f0c3e7fcbc466a6bcedfa1,2025-02-20T15:30:59.567000 CVE-2024-8944,0,0,d32480e6cc35927b8e5f3e86fd3bee0308056dcb47c33ba80e1a3ad79095c4d1,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,85c1ba7bd420af136c7a4f3d96f6c09a2f06a585a66f83fd9ea837381a0a3783,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,bd227a7831ec0b2afacbd2a63c3c8349e603364414583f95b8d9f661a220032a,2024-09-24T13:11:17.417000 @@ -279425,7 +279425,7 @@ CVE-2024-9131,0,0,50107691d6f8995fe8a6b7113df12747d01b199eb120271aa41cc0db383461 CVE-2024-9132,0,0,4c377ed325e14fd1af892554c7d35507ad3abf8234e1ac3ab54429e427bcc737,2025-01-10T22:15:26.783000 CVE-2024-9133,0,0,fcbfbc2bd4127e72a9aa3ddc848c573d78bc72fa9ddd322a5be2ae12167a11d5,2025-01-10T22:15:26.907000 CVE-2024-9134,0,0,25a903436b6d7d769fb834ac188d1e6735193281626409ff9b8726ccf7896b79,2025-01-10T22:15:27.033000 -CVE-2024-9135,0,0,25c0ddda2344b7699adc016b7a6ae907ad30123b99641511f7c6dabb4ad1cdec,2025-03-04T21:15:12.360000 +CVE-2024-9135,0,1,916553e63ceffd66bb88bd2c118b4d376397beab0723a3c65e0143b11b1dbf4e,2025-03-04T21:15:12.360000 CVE-2024-9136,0,0,440b3409a14907c29d57b03ac063b5d398f0722a11dac00ea875af9fd1c6005e,2024-10-01T14:28:31.027000 CVE-2024-9137,0,0,f01ddd62d94a1f3860b505f4ee6768f2cc665b82d44b256f042250b9599b8b79,2025-01-17T08:15:24.690000 CVE-2024-9138,0,0,94a5768e7e73f1fbef0aa543085c8f51b1c4781f2d47badd1a3c54651a536d60,2025-01-03T09:15:06.370000 @@ -279438,7 +279438,7 @@ CVE-2024-9145,0,0,97a312c1c66b488d02b8e5ae15f80967927307525d089b410f672665e8c386 CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000 CVE-2024-9147,0,0,0093d2743a16315fb2395e20e4313d0098c0f4e5a32333383ccd3780d7d6e4a8,2024-11-06T15:53:59.983000 CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000 -CVE-2024-9149,0,0,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000 +CVE-2024-9149,0,1,c47d697b33193c225ee2b64737beae1b005e77eb95036d60b4ed96e0d66301de,2025-03-04T15:15:22.530000 CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c3126535,2025-02-21T12:15:30.463000 CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000 CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000 @@ -279451,12 +279451,12 @@ CVE-2024-9164,0,0,d5548ae3a00867f99964259f08e97b03cae6c8fb72f3546b0fe2b1327f21c3 CVE-2024-9165,0,0,dc899508d72791e5c761f96fa2a1f7b8193367cfac67250d9f9f4a221602c30d,2024-11-01T12:57:03.417000 CVE-2024-9166,0,0,08c32389088d64b5a79629e9f333dcbd555727e84c36a98189c88480a6573842,2024-09-30T12:46:20.237000 CVE-2024-9167,0,0,4b4738bdab8e192846399c30b844741698a4faffb2baf51396eac5836744cab7,2024-11-04T15:15:24.557000 -CVE-2024-9169,0,0,88a8fb9b88ba0d31fbc4bd59b5e73c5d2b5388247825110c319f7fc5da74c8cc,2024-09-26T13:32:02.803000 +CVE-2024-9169,0,1,4ca0577c18395a237211d8f61e39b445ffe87e048ace34b078389778f6e6a8e5,2024-09-26T13:32:02.803000 CVE-2024-9170,0,0,fc0d2b28edb421bbb6825db66bb513b8e437f18c08e7c85641db282a049e16b9,2025-02-05T16:42:39.357000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,b35aa31884976a5f72a9f64a6c4fb2bdf693241a033267ead8bf3a804c216cb3,2024-10-08T18:05:10.863000 CVE-2024-9173,0,0,61d7772356f925b0168ffe8ba49707e943ee610149453e61508264540d13a2cd,2024-10-01T14:12:41.293000 -CVE-2024-9174,0,0,58db21848a67763bb523dc8ae9ef289d2fb6278ae7ddcf0e701b26d21445a612,2024-10-04T13:50:43.727000 +CVE-2024-9174,0,1,42814702ad37fbdc100808749d74578bd661371198645c6d8aa8f1092ecf4abe,2024-10-04T13:50:43.727000 CVE-2024-9177,0,0,ce77b4d0bcbf9966a0cb91de2ef7b9e3d62b88654cf0f42f98e921fd75d4d09b,2024-10-03T14:32:46.150000 CVE-2024-9178,0,0,642845b431730b2b39f42cfe9bba564382251d774cc731cf45211d75cfc26a14,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,ddfbbc6ef10dedd28a9cb332a26718a84f91bc3934f39d4fe574235b72d9f3d9,2024-10-18T20:15:03.393000 @@ -279469,9 +279469,9 @@ CVE-2024-9188,0,0,5dd6784f0ddf222dfed6f3f6f8ef1425cb794ae63276e1d1603c62bc0b0fa2 CVE-2024-9189,0,0,4e8c036fffae828e6f3882cbb1531defe39b113820187b885e346d496fe1295e,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a44,2024-11-05T17:06:41.363000 CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000 -CVE-2024-9193,0,0,7aa1dbde18a2cefd1d5c7994b259059c12b9ea975239024491588fedc661ea63,2025-02-28T09:15:11.437000 +CVE-2024-9193,0,1,e9fcabeca8c2a679cb4268e62dc1a9ef8ec799fb5d366ccb5b675730020983a2,2025-02-28T09:15:11.437000 CVE-2024-9194,0,0,1077144cc77b6254f33936a25ffd1f7bfdaa1a60153ac4b35fb53e4c8f3eb6e6,2024-11-21T17:15:27.480000 -CVE-2024-9195,0,0,78b1fc40d9caf9991dd97fbb23b8dd02b45f5722200cffc9c47e60fc4d41061a,2025-02-28T09:15:11.633000 +CVE-2024-9195,0,1,29a3855b8bed692163705c71bc27ac9f489a5fe6ce73924e05c630425f69a304,2025-02-28T09:15:11.633000 CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000 CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000 CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000 @@ -279488,11 +279488,11 @@ CVE-2024-9208,0,0,0f3ab5f9632a8e4b4d18bc0dcd765efd79f461fe4d33f9170b7dcdb58824c5 CVE-2024-9209,0,0,23750bdc4f9c650f82cd685942246dc8c2f4c461cac57cfd6b7d60cb94f7fe7c,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,c4e5f9d47e14247e63a2b18a451c4a1ff64faf127742a99345638ca5cbe6f226,2024-10-08T15:34:42.060000 CVE-2024-9211,0,0,9f3db3fbfc8b77df31c04200f6e0f4fd68502b04da49c90d6b1017cd48a111e9,2024-10-15T12:58:51.050000 -CVE-2024-9212,0,0,0338678b31a0c5eb931e7db8d93762f227275dedc8fb7aff3ffd02f7098dda76,2025-03-01T05:15:15.580000 +CVE-2024-9212,0,1,55c0ccdf68309ba6677a0e7b170158661036a27d3efd6d4b3d3f2978a5962ca6,2025-03-01T05:15:15.580000 CVE-2024-9213,0,0,50a3fecf1d9e65fdb1198901bebb3c09dbf368ac9ac500ffed976e76e4cadf54,2024-11-21T09:54:08.710000 CVE-2024-9214,0,0,ff4f7487babe28f72c3b35071fb70c2023a16ddda382686cdb75602684654db6,2024-10-25T12:56:07.750000 CVE-2024-9215,0,0,eaaa521f180059382af6cc54edb14baa19d96f7c003ba61a3f836e30402504d4,2024-10-18T12:53:04.627000 -CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8aae,2025-03-01T05:15:15.773000 +CVE-2024-9217,0,1,e70d6e665d5456ae7030ed1193619598ad04f517286204d3a820da02a8d8cb34,2025-03-01T05:15:15.773000 CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000 CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000 CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000 @@ -279554,7 +279554,7 @@ CVE-2024-9281,0,0,4ec13f802ddee346d05664fbcfaf5cdef3926fa90a14c1d516eec250aa2676 CVE-2024-9282,0,0,40065863388d488ca4c18c3f210669f0846c3368652a867c2e3f2289ec68ccdf,2024-10-04T18:33:38.293000 CVE-2024-9283,0,0,dcd8b95ad5e410b75408ed4f6e3216692b24644281f442561ae210acd3d86782,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,f77f319fbea704cc8a59413ed55271224edabfe67529469a993d053fd4241f3a,2024-09-30T12:45:57.823000 -CVE-2024-9285,0,0,b81006c0f3193439cd7f1140e0fb575e64d34a941b154cbe68a8db4e410d1689,2025-02-27T17:15:15.953000 +CVE-2024-9285,0,1,0a8c2852b89e68dda21ee74d045e0c7026530a5da986781439ac5e2311236d94,2025-02-27T17:15:15.953000 CVE-2024-9286,0,0,b22f353ffb74d19ffff8c92c28f12b3239ac28a3be92a45d1a2225a17e197e4f,2024-11-21T17:15:27.713000 CVE-2024-9287,0,0,abbb5913dfd02735ab25ea4310f5b653a79908ad2a03628b1d4fdf54d6263ff9,2025-02-10T18:47:16.547000 CVE-2024-9289,0,0,82efcd622bd05af8234fb7f9750f1266ba9c6595f5976c11981038e615a0ed09,2024-10-07T18:25:21.380000 @@ -279595,7 +279595,7 @@ CVE-2024-9327,0,0,b6ddd0dc229f4835273e3daadd690772e17832642ed5d67344cd59d4f6acb8 CVE-2024-9328,0,0,07f1dd248538cc1192d1da8dabc114dfeaa70254400c42a81b2c4be007b9fd31,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,669bfb011b48ad17266d0a3f049e046103b888554134593de7810884bc3deb81,2024-11-21T09:54:17.147000 CVE-2024-9333,0,0,25ab5640a6acc6d05c602e0c7a12246052f5f0a7b1493f17ea944ee31b84c052,2024-10-04T13:50:43.727000 -CVE-2024-9334,0,0,c479a531077313e8c329d390b3ba2d2286cf58376ab732981d77b14a10cfe175,2025-02-27T14:15:34.783000 +CVE-2024-9334,0,1,0cf89f352a19e8a41734a022a708ce50ad3605afadd390780d5d52c816d00fec,2025-02-27T14:15:34.783000 CVE-2024-9341,0,0,5254cd0407dba4163e45bfc4ed2a071202e5ab922b5099bdcba8d28a558c1e38,2024-12-11T04:15:06.090000 CVE-2024-9344,0,0,947aeadb28a081f51ccba5cfed355aa11f035786814ba0789ea30b60063bb469,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,1092198f3341340c84b195f1fb0718cf68fae0e79a30c397da7978c7a50c2c5b,2024-10-08T16:10:17.567000 @@ -279680,7 +279680,7 @@ CVE-2024-9440,0,0,a69e07088aabef35098db35f85960979e41685b2d98523d771f71531c8d28e CVE-2024-9441,0,0,9c2f451222c8d34c3c7cc1d8356bb67663eb0e6e2d7d32b9d6e782a42a70a69f,2024-10-04T13:50:43.727000 CVE-2024-9442,0,0,0c9928f202a45a11b25fcf7062b71491e6a5c212b7ea70c33124c04d06a89d03,2024-11-22T21:23:27.683000 CVE-2024-9443,0,0,2a422f97c9bfebf8d531ff5d13604d131648f4d3288d4daa8b5ea6324e071c48,2024-11-07T20:56:58.797000 -CVE-2024-9444,0,0,119e3f1229f7744ab2f65eae5b678a32c6c873e8784d39fa79fdf78f014d665d,2024-10-16T16:38:14.557000 +CVE-2024-9444,0,1,f4b7de36d4a5dd8f586988f78cb3af63bbabffdb84fce12f9e459b87f75e447c,2024-10-16T16:38:14.557000 CVE-2024-9445,0,0,222d56e36a105a97cf79ac3dc4e58dc49e98537ef3b809dfb306c177a3849289,2024-10-10T20:58:04.907000 CVE-2024-9446,0,0,ee0be45119359cf3135c82a89083c6a75f08ced887ea6c23258e1f9eb45c3834,2024-11-01T12:57:03.417000 CVE-2024-9449,0,0,2a3228e9059253e1a1bfcfc05cb787fa2d46cff95eac90562166618dea81a001,2024-10-10T12:51:56.987000 @@ -279732,7 +279732,7 @@ CVE-2024-9498,0,0,351f6eeab28c8f31f264d498f22c77289a13807982c368dccdb6a7f836e034 CVE-2024-9499,0,0,81af556c8c87db2f2617b72d1cd7f2b5e7c72e75b35c27bc3dd4f72f84920e7d,2025-02-18T21:15:24.887000 CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000 CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000 -CVE-2024-9502,0,0,e3fb711f67887d1258017667f51437e489fede52d407ba36dbc6fd6d3d71d276,2025-01-07T07:15:28.360000 +CVE-2024-9502,0,1,6b115fc71ecf09fb04dc3603943cc99a1d8eab4939bd3655409ca54188d72612,2025-01-07T07:15:28.360000 CVE-2024-9503,0,0,4a374149f46c5c701e65518c6ac93ba2816680bc5fe571350f5d89a586a796f8,2024-12-20T07:15:12.797000 CVE-2024-9504,0,0,d5582483784d6c852a9dbcff40d18eb6f930294575e0934168018fc044a9db21,2024-11-26T08:15:08.180000 CVE-2024-9505,0,0,9fa554b249edec9f6f3c55fd2b3a6ab6df16ec28919e88fec8b5527ce060489f,2024-10-31T16:39:41.193000 @@ -279759,7 +279759,7 @@ CVE-2024-9534,0,0,491ec5d6b5ab9ce3a6949ab86a011008ecd469bc754ae94796c037eeecca32 CVE-2024-9535,0,0,05a8974d5ab63dabb40f54eeb0ddeae3245ebb5002787b32c335689791e2d5e0,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,85829d5d2c4b58c245fbd3cd2f4b70321fb487128cb949f5e25e68a85cac93f0,2024-10-07T17:47:48.410000 CVE-2024-9537,0,0,1842ac1dc1547d9c02b3e71de0450aadde1e4e1067642c4ae3f5a382feb2e233,2024-10-22T17:33:23.837000 -CVE-2024-9538,0,0,d95ab76ec8d0a37bf6a30bf639dbcf1cdb510f6fe68694d1362beea16b373271,2024-10-15T12:58:51.050000 +CVE-2024-9538,0,1,f758aea6a8eb39bf5f51da86d457a0cffd198479af4d79aabfc833b1cbbe5100,2024-10-15T12:58:51.050000 CVE-2024-9539,0,0,2dc490dbc437edfa0ce5d3611b8b3c4b9cea26f173b2202d9c18aa0ace8beb99,2024-11-15T17:15:06.600000 CVE-2024-9540,0,0,d758cb49ce3dd0226a2fbe7c6c4f76abf11590889a4c76eb537def5a9bb2e766,2024-10-30T20:56:01.637000 CVE-2024-9541,0,0,112d2769f3fac6053209a88d19d4c5788c14efed52bd0cea2b7d81fca23492a2,2024-10-25T21:16:12.447000 @@ -279815,7 +279815,7 @@ CVE-2024-9593,0,0,21801a2171579b0fca5664961ca84ca3788674fc1c315858ecf64823c3b477 CVE-2024-9594,0,0,267a42f79726ee7202a7ad1c9bd8476bd052cf72dd5fec3bc9d04fb9e665266c,2024-11-08T20:50:48.720000 CVE-2024-9595,0,0,affe800d4ccb9fbe30c63eaf437475e7b4f1b8f6ed06b3135e5296a266d83c31,2024-10-15T12:57:46.880000 CVE-2024-9596,0,0,97d2b24b69eeab4b46fc850bb8355e0549024bcd45410c14a3bd69da526dabde,2024-10-16T17:00:19.787000 -CVE-2024-9598,0,0,a4c9b52607422cd2d0de28550efd88dc4b9c97b8e4b93ac5c9c5e06f1d845304,2025-02-21T20:47:35.277000 +CVE-2024-9598,0,1,6a874a15bb9eb714ea875a039722227c9d9ba2a1dbd1bceb961c28fd5be1b7b1,2025-02-21T20:47:35.277000 CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a997,2024-11-21T18:15:15.853000 CVE-2024-9601,0,0,16377aee6b1757cfe9136af384fa497dbe5d85cf18a9b0ffef21739c36f3986a,2025-02-25T19:42:12.050000 CVE-2024-9602,0,0,97e94b3551b8a143150ba66a2e724dafe158b773cf8b0069e0eeb8d400c5b732,2025-01-02T16:48:01.163000 @@ -279829,7 +279829,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631 CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000 CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000 CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000 -CVE-2024-9618,0,0,3229a4a9edba9afa8437c03cb7fbe098a5fb834064e988929d93898486da8753,2025-03-04T20:34:08.907000 +CVE-2024-9618,0,1,ad88bde938264c1a737b9d6c570135bad698cf41c2c4531244c22add3253b491,2025-03-04T20:34:08.907000 CVE-2024-9619,0,0,a7bf5db408a5ec4a6f2bb2b3418fdbfda580c42a8671077d531fc4eac03bc58f,2024-12-20T07:15:12.977000 CVE-2024-9620,0,0,5f4d387a05e8c7d787dc78c4da6b8994737bf87f4aa2585e1708a37b135ad3b4,2024-10-10T12:56:30.817000 CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000 @@ -279845,7 +279845,7 @@ CVE-2024-9630,0,0,c5bfebdfc374c6829acf4f216485f47c7193dffe76ae06b5710261faf3a923 CVE-2024-9631,0,0,8b9648c02ba078f0734a6594b2ae5a0daf10ff539344382557488d0ca821b44f,2025-02-05T20:15:45.210000 CVE-2024-9632,0,0,239a4c189d3eed560921482fe12c18bb19732b61a1100ff2b6e56460beb86ea5,2024-11-21T19:15:14.210000 CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe304606828160b,2024-12-12T21:43:44.480000 -CVE-2024-9634,0,0,5a1303eaa7f93b6eb08e5bf2c5ca20cd76106538f564ad02f1744a438904d495,2025-02-27T18:47:11.020000 +CVE-2024-9634,0,1,36076b8175e5d635afc05ecca25f945f088c203b571a6517b055bb9b6f774850,2025-02-27T18:47:11.020000 CVE-2024-9635,0,0,9f77fd7ccc96fa6d4c00f44465f9f4a309bfc7a2ae1c26c3627ef0449f3c9e02,2024-11-23T07:15:05.027000 CVE-2024-9636,0,0,0b62f247a55adcf843a0ddc11a4709285f570b0022910e18b3e03743a1ef61f4,2025-01-15T10:15:08.607000 CVE-2024-9637,0,0,0f4d16db68000f66da50bae84c41a0f228004e7436fcad95d0969905f72e932a,2024-10-28T13:58:09.230000 @@ -279864,7 +279864,7 @@ CVE-2024-9654,0,0,fd3fb172327992ba73adcf3932d1758d60aed29430ab00c9cc12d26de27f95 CVE-2024-9655,0,0,2a977445375643540061a74b53550c45c8d62d924de1685c2ce444a34ee3b46c,2025-02-07T17:03:14.563000 CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e4f,2024-10-15T12:57:46.880000 CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000 -CVE-2024-9658,0,0,c997cfc60c91f4b774c300415870e0c575dd0c1f9ad91c95b624dea0d4cce108,2025-03-07T09:15:15.993000 +CVE-2024-9658,0,1,42ecd44ea7311c22db91774618fbc762b606a81ed121e8448a9a1edf4a9c4383,2025-03-07T09:15:15.993000 CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000 CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000 CVE-2024-9661,0,0,ccb9dcc8b3dd9d09161a1c778fe8d073a9195bcdbca50f740749e45ff37a6e76,2025-02-18T19:15:22.967000 @@ -279873,7 +279873,7 @@ CVE-2024-9665,0,0,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251 CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000 CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab478063,2024-11-08T15:27:25.697000 CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000 -CVE-2024-9669,0,0,9627ded9c1d14f291b2f5713c793075edf748ba1dd1ad6a2c861ec18aa9028c4,2025-02-26T19:54:38.100000 +CVE-2024-9669,0,1,c107789103aa3df0aa5565385138d8ee3b16c830fe6609c4bfda668ba8a6efb6,2025-02-26T19:54:38.100000 CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000 CVE-2024-9672,0,0,86cfa21f9d605c119ad8f12206e2a4e62457c3e0d7e7be3b9be9abdd26e1b1e9,2025-01-30T14:55:08.713000 @@ -280204,8 +280204,8 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 CVE-2025-0158,0,0,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc256,2025-02-06T21:15:21.923000 -CVE-2025-0159,0,0,da072f8e2bfae3faad56b7993bdef58007c1768b134558714a537dfc9135c68d,2025-02-28T19:15:36.243000 -CVE-2025-0160,0,0,56a2c0b88768866a06a1cafe52553211de3c4fe7f1bdd2a1b69e2c78efb329c1,2025-02-28T19:15:36.393000 +CVE-2025-0159,0,1,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000 +CVE-2025-0160,0,1,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000 CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000 CVE-2025-0162,0,0,c98031bc8c519f3da09a456385ae46f1f328a956c39e6c9186405a6de7ba8344,2025-03-07T17:15:21.110000 CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000 @@ -280260,9 +280260,9 @@ CVE-2025-0230,0,0,bc65d0d35f660bc650fbc4f0705fb5a9812aab4f06d4bc817901d10fc282c0 CVE-2025-0231,0,0,9beb7e164e57634662c36d30c9aafece94f452e48dd6afc367480eae254e674b,2025-01-10T19:58:05.663000 CVE-2025-0232,0,0,77251a2fd0c37e468c6cdc344fb9499d7bc6ba9c5097fa6e4fe0883aaeb2e18b,2025-01-10T17:36:26.073000 CVE-2025-0233,0,0,2decbc1831f5a9afa81e185a3a95d9252e4d536c12a9e03c20a2ec3559be2431,2025-01-10T17:28:30.577000 -CVE-2025-0234,0,0,6178bc66bbabfcbdd5082304668f3606f0e04f74abc6b043a59e02ac416d6f5f,2025-02-26T08:12:46.393000 -CVE-2025-0235,0,0,ce9f38b38a5a235efed2d267154e7e569af85c1e98ccacc330bc1a3d5ef2ad4b,2025-02-26T08:12:46.617000 -CVE-2025-0236,0,0,612130b4cb5a7e208f8560525da9993cbefa0cd69cb4f7545559547b4bfc7b44,2025-02-26T08:12:46.730000 +CVE-2025-0234,0,1,a7228f750af95baebb0e95fb1ecd1f82f6a2f25aa926e17023fe1ab8b1b4130a,2025-02-26T08:12:46.393000 +CVE-2025-0235,0,1,4165b9058851daf976f1e3fd64462601f85e315ae3d9a0af6ea3d16694c1ff5b,2025-02-26T08:12:46.617000 +CVE-2025-0236,0,1,3f84f1e57c7e753d25e4d68c49e689ce065da377fb7fcbff98229cb9a92292ce,2025-02-26T08:12:46.730000 CVE-2025-0237,0,0,726b9fd4a1cc35feeb251f210c4adbb8387d0cfa8a7807bfe531c06c5d5e23c4,2025-01-13T22:15:14.740000 CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000 CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000 @@ -280277,7 +280277,7 @@ CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a95246 CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 CVE-2025-0285,0,0,4831dfb88edfaad15d3b159af89ca8e4b44eba800428b41a9fa527cf07435932,2025-03-05T14:15:36.060000 -CVE-2025-0286,0,0,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000 +CVE-2025-0286,0,1,594b92147de822455f36381bb75d435e48d0c5da0ed4b72df873f6dcf52d4767,2025-03-04T16:15:36.167000 CVE-2025-0287,0,0,4dcb5dd88c8e60224b4c9a209ee5974c1a6c00db395b72c96cdce748b13a63dd,2025-03-05T14:15:36.253000 CVE-2025-0288,0,0,0b1e2365b27ccfce1154f46e7d56ca5437e3871eb5ed29ae989f0655fe49bfbe,2025-03-05T14:15:36.390000 CVE-2025-0289,0,0,b048b066c322e6746f9d2ad3d9569f0fb36c1ec7366376297a2bfd2dce508d49,2025-03-05T14:15:36.540000 @@ -280299,7 +280299,7 @@ CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da3 CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000 CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000 CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000 -CVE-2025-0316,0,0,3b21ddc15a8fdffe484273e0c9b65bb4522e9e69d90628e5bee1998b9c1011ef,2025-02-08T22:15:28.477000 +CVE-2025-0316,0,1,25fd7fe5edf79101ae2318703f4978f3c60d73f85c2ce3aafc07a98a04e1c521,2025-02-08T22:15:28.477000 CVE-2025-0318,0,0,1adf5fbf909f385869a8e3e2c4143fad7dfe52742d5225eb605180883ed9373b,2025-02-25T22:09:05.680000 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 CVE-2025-0327,0,0,b0d403ed029992537329b72e255db6654825e2f564637a9b3d86592d52f17a2b,2025-02-13T07:15:10.570000 @@ -280309,12 +280309,12 @@ CVE-2025-0332,0,0,10e294c3bcb66386a9705e885fda97504f486a40642545ec52dba01d6b68bc CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d40e,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed665,2025-02-26T18:25:29.120000 -CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000 -CVE-2025-0337,0,0,e1c87c19f3cc4ac741cd664509844da009a4879547ec0484afa3b36eca0f697b,2025-03-06T17:15:22.303000 +CVE-2025-0336,0,1,da64b5e660b1e1277920a1e4c32f0d13e73747bb08b5c55eaa2a31a61b5c7e0b,2025-02-21T22:33:14.743000 +CVE-2025-0337,0,1,61c0e70ca49a4ff11bc872436df0e997c33edc50a47617ed93c7edca25d5454d,2025-03-06T17:15:22.303000 CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000 CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000 CVE-2025-0341,0,0,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000 -CVE-2025-0342,0,0,3dbfe8ec26cd89c8d358aa4179b87636b3a72d2e0b33768a4263c0b8cd9e88dc,2025-01-09T08:15:30.310000 +CVE-2025-0342,0,1,457bf9270217112b938275036af0e485e8c9e69a8d88b8edc24b2ca8b3f8e52a,2025-03-03T17:42:59.740000 CVE-2025-0343,0,0,2f07750fbab5848d7fd769193ff51e5044832fbe65109094687a56b43364aa58,2025-02-18T22:15:16.350000 CVE-2025-0344,0,0,fa9cdc375de2a99e7299b1ccdc9be76ceb7ad16da8244b21c453c84a18a28efa,2025-01-09T08:15:30.517000 CVE-2025-0345,0,0,fdab4ab061ba34e7ae56477c0a30fa81f9f16f64f88fe386d4634a52d9c45ceb,2025-01-09T09:15:09.220000 @@ -280329,8 +280329,8 @@ CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49 CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 -CVE-2025-0359,0,0,a8b9f71317bbd31b8acc25e76b447b373672102c20d6b40a65f8bb1cb7b008ed,2025-03-04T06:15:30.023000 -CVE-2025-0360,0,0,6257e8ae0cf638e78f20fda6cb79099a2705eecfd085eac3a721f563b42934cb,2025-03-04T06:15:30.180000 +CVE-2025-0359,0,1,5d195c4a796a9d61c5445ec078ba210735f7a70ba6be4fd93632b7b4f6027f55,2025-03-04T06:15:30.023000 +CVE-2025-0360,0,1,6206f28ff4cea73a7524a4842bc2375d59423b5ee65bea65d99ad80bb9353d1b,2025-03-04T06:15:30.180000 CVE-2025-0364,0,0,d86e1de6aeb2da3860f3a6864380bb4611cec9a62b9db022fce493a15089702c,2025-02-28T20:15:46.323000 CVE-2025-0365,0,0,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000 CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000 @@ -280376,7 +280376,7 @@ CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee011658,2025-01-17T18:15:30.920000 CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000 -CVE-2025-0433,0,0,b1fd9922f5ddbc31e769695d80dcb91e7be80c9c026715a84649cc27bf0f22aa,2025-03-04T20:34:08.907000 +CVE-2025-0433,0,1,7dda94cb500b1164fd18f36a3b16b6b3b3b23892d4907c38a93dff09fbd87dc8,2025-03-04T20:34:08.907000 CVE-2025-0434,0,0,80805d1fc694dbf391f864cbd97ec8a7e48ef050c445c249811ef890ae257b48,2025-02-18T22:15:16.447000 CVE-2025-0435,0,0,604058ef793e33435759746d46c23b90cc51452de4822b6472440608e3ab5958,2025-02-18T22:15:16.540000 CVE-2025-0436,0,0,72789f2cd8147d5a86876c7b0b79e40e25dcd2c9396b81691e6fd199d1206765,2025-02-18T22:15:16.627000 @@ -280406,7 +280406,7 @@ CVE-2025-0463,0,0,4ed981ea896dcf71a48c2c09e72737274c33bfdae5c13459ce01815003275e CVE-2025-0464,0,0,d03e95d8868ae551ebfe743c91a29954286156e5fd7e3c6614a84c0d59d5891b,2025-02-11T14:59:43.043000 CVE-2025-0465,0,0,ac87b8092144ef2d8d1d41ea23b1ff95c3c32177ff08abf13300a7d5c9b19410,2025-01-14T18:15:29.883000 CVE-2025-0466,0,0,9a46a54bec667a669976057bcdf901ab11b6f396748538013cd1a3fe095e1fd1,2025-02-04T19:15:32.587000 -CVE-2025-0469,0,0,2a327be0c79cc97cec5bbc0772898ea0e825b00ac7eed3ccfc38e86ee30855a5,2025-02-27T05:15:13.950000 +CVE-2025-0469,0,1,a76afaf860d431741a6ef807c30c88d17067203254f2d51b7d6243736c6d8369,2025-02-27T05:15:13.950000 CVE-2025-0470,0,0,f40a32fdbc5ae7b8c32b69b52a058e31320914a0fd6f97992ce5e422a9a061b6,2025-01-31T04:15:09.053000 CVE-2025-0471,0,0,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa7679,2025-01-16T13:15:06.973000 CVE-2025-0472,0,0,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a96,2025-01-16T13:15:07.353000 @@ -280444,7 +280444,7 @@ CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204 CVE-2025-0511,0,0,208876e26427d3b8f218407b81a5b4afa8bcd5e931fdeb6575b6f455a23596eb,2025-02-20T20:35:03.573000 CVE-2025-0512,0,0,cf90a8890112925e9d3690628010cacdb7ff24fc40e2313e40394963b6695fe7,2025-03-05T16:39:32.083000 CVE-2025-0513,0,0,16e90cd60d3f0b990d0a506119738b488f3ad7bf5bf01e1849a16f8301021207,2025-02-11T15:15:19.257000 -CVE-2025-0514,0,0,0ea869b55fb06aba02ed9e48860e6595c30b3a11be9cc65554e0ffc514b5fb9a,2025-02-25T22:15:14.887000 +CVE-2025-0514,0,1,50e780d8ac95190b358f43f5f66f954006e52bb8aedbb7d52e083dd5bc47a903,2025-02-25T22:15:14.887000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 CVE-2025-0516,0,0,54ab7a64b43a5bfec8dcc0561006b4b6d888b05cbf982c088d6e719e3d73b992,2025-02-12T16:15:42.883000 CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000 @@ -280453,11 +280453,11 @@ CVE-2025-0521,0,0,ae94a1fe73318139f9da2622de592c6e10d25105d56f65a8078c6428a35bf2 CVE-2025-0522,0,0,049494dc5db0d63aea89474c83a4309664a2b8074bd7164b1ed7fff81c86960f,2025-02-18T19:15:23.177000 CVE-2025-0525,0,0,a16c2b8ae85412f40af57db61a3c37ef6168842996c9a168770855b255640d23,2025-02-18T18:15:28.850000 CVE-2025-0526,0,0,670acdbc4654e2e0730989280b5b7f31675021f8f03998dd08dc9ceae770851c,2025-02-25T19:15:14.467000 -CVE-2025-0527,0,0,5a050484708b6888d68afa9602ab350596ffdb9a4c21820494f9ca3ece811d49,2025-01-17T14:15:32.840000 +CVE-2025-0527,0,1,a3dc07cb26ca8d1c406cd2fd510dc166a0c688ab2e3b3f386fdf39efe06c16d6,2025-02-21T21:20:23.447000 CVE-2025-0528,0,0,9a5ff48ddd9d71956228edb95dc0cb0945dc75209025b5720233df418ad510e7,2025-01-17T15:15:12.430000 -CVE-2025-0529,0,0,b38696995b48c18a78bc95b32e1cbfeeeb5a4a658854daf6110f0630bc262795,2025-01-17T15:15:12.670000 -CVE-2025-0530,0,0,a58483c911ff802e2f9d7b5c154b4ae8b10920f1fe65a2ffb83d4e5fdbb198ce,2025-01-17T16:15:33.937000 -CVE-2025-0531,0,0,5e6bee6c03e38872986070a193c8342c8fe4348614a2ab45ca6d9358b5cc4283,2025-01-17T16:15:34.250000 +CVE-2025-0529,0,1,8bbea3215bf6a5355b69d0cb5a426e835d25e5ebc24a116916eeb2aa8486855a,2025-02-21T21:20:23.447000 +CVE-2025-0530,0,1,92840298fd98d8f4a14a968a6540764ef6489561e8061bb1fbfc28157fafd455,2025-02-21T21:20:23.447000 +CVE-2025-0531,0,1,dfaf72cd01db26c49cc09dd16b8569c10ad74d201c532cd9d06c11be4dbdf416,2025-02-21T21:20:23.447000 CVE-2025-0532,0,0,d17dee1e94bbfa23583627b7c128219b27a06c183331b86bd4b9b669b7c4dfd9,2025-01-21T16:15:14.560000 CVE-2025-0533,0,0,c9eaf681312616e888aae3d822e61ac239c2de7e47dac37c75fef4b4ac89300c,2025-01-17T21:15:10.487000 CVE-2025-0534,0,0,e90b47d84165ca4ff9843bf6b8251a15a8974eef4a581c03b4d0d4e43640d1a4,2025-01-17T21:15:10.650000 @@ -280471,7 +280471,7 @@ CVE-2025-0542,0,0,6313331796a87cfd429c6887ebdeb1b0129ce5eba24c6840f8a5db7fe94154 CVE-2025-0543,0,0,eff0a1055b76d4ca2905d4fafa8d1e8eefdbdc8138e12e68c5bbcea714737ab9,2025-01-25T17:15:21.720000 CVE-2025-0545,0,0,63c3b9042492b87a07e49abf13646d4f678ce0fc03e014fc20736bc03bb30cd9,2025-02-24T14:15:10.910000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 -CVE-2025-0555,0,0,13e96b4b6559b4859a1e09ee34d9bd76a96e1705c70a1bf7532ff1abe8c059c2,2025-03-03T16:15:39.227000 +CVE-2025-0555,0,1,f6c7e528fefe19a7abad23761417c0f3f831d77286eff527cfee1558478448e7,2025-03-07T19:37:57.623000 CVE-2025-0556,0,0,2e939f9c46df46e943acd27c5231aa3ec1bc692b51067d4f0d8c17d23ee23f89,2025-02-20T20:41:40.723000 CVE-2025-0557,0,0,a4d2397bb9974138a91f8206bbe00f4a1c6824d0efb01426f3cbba3778440e81,2025-01-18T09:15:07.710000 CVE-2025-0558,0,0,7fd691444ae638db34f49f79deeccdce303e5d6667650549a03c453163c549f9,2025-01-18T13:15:20.417000 @@ -280502,7 +280502,7 @@ CVE-2025-0583,0,0,3309be0bd9417030616155e70103c52eaa78dc57edd605475e0a342fdeb599 CVE-2025-0584,0,0,b6ebfcb7703542335a8173fc5a4ab8c33a7e3e0c6c92bba5dc58412b0c892d56,2025-01-20T03:15:09.120000 CVE-2025-0585,0,0,119134bf231d480ab92b157699965013bafbfc56920a2e232ae3b58aecfc3ffd,2025-01-20T03:15:09.283000 CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b437,2025-01-20T03:15:09.433000 -CVE-2025-0587,0,0,23ce5eee650538bc74a103f6c2cf53486587001e14603c6d3aa60a954275c59d,2025-03-04T04:15:11.240000 +CVE-2025-0587,0,1,758bde2366f1b5a4a9cf6a8b0b502beae68c942d297edfdae91b1d36d418c373,2025-03-04T04:15:11.240000 CVE-2025-0588,0,0,105c6e2f1707afb6fe1d795e929817750010d681e996f4066665b271dfe4e5c8,2025-02-11T15:15:19.673000 CVE-2025-0589,0,0,b8e8405a2d4c9e015de1ea53fbbafdf6cbc934d741c73f04d4cecba6da66759b,2025-02-11T16:15:49.667000 CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237d6,2025-02-18T20:15:23.477000 @@ -280542,9 +280542,9 @@ CVE-2025-0680,0,0,304211fa316d5ad912272d7e1c6d2fe276e0a8944295f89aa501df2029db6e CVE-2025-0681,0,0,7f6d6145ecf7ddf69724980071110b6e3798eda306effd9fc06d55b4146ea16b,2025-01-30T19:15:14.300000 CVE-2025-0682,0,0,82dc327006a11cf9eb8ed15c2db6bd7a0cc541bc0cc289fa88e6bc57635c989b,2025-01-25T06:15:28.740000 CVE-2025-0683,0,0,656748caff6fec701396e9f78e84e971ce5f7b02979f679e43ad5dbf6778d8d5,2025-01-31T18:15:37.750000 -CVE-2025-0684,0,0,08cf09aadd4265d9f17fc91e7ffa365e4af4b017983ec1ff0167ffac235b59e4,2025-03-03T18:15:30.537000 -CVE-2025-0685,0,0,36f03222d9846bb79813c677d1ef99c125061b51820965038a411e4d83039174,2025-03-03T18:15:30.733000 -CVE-2025-0686,0,0,c1cd4659b63910dd911bbe910efe568d44b2d78dc5d45dcca3ca5f7d1cf3b4cc,2025-03-03T18:15:30.930000 +CVE-2025-0684,0,1,59479f12cb799e400fb4106647b69c9ceab509dd388ef0570e07fc4bd42a3198,2025-03-03T18:15:30.537000 +CVE-2025-0685,0,1,f3687002adf0813b3953d3b546de20e3b94743b39bd9815d9514b934bdd62593,2025-03-03T18:15:30.733000 +CVE-2025-0686,0,1,11bceb40312f8ab77a468695ad27facd72f3d9901dfe6468ac0460ce742da42b,2025-03-03T18:15:30.930000 CVE-2025-0689,0,0,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c4316,2025-03-05T21:15:19.503000 CVE-2025-0690,0,0,bbbcb650d9130b5dd35bdfc4d8287eb5fdbb2a723c8cda9af36e91d7165433a0,2025-03-05T21:15:19.603000 CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000 @@ -280564,9 +280564,9 @@ CVE-2025-0706,0,0,0cef8e972c076a49b63e31b0016f9af7c832c7c526bac904d251d55c7048c3 CVE-2025-0707,0,0,55af5a496e269961ec88b38790c14b42adfdcb5988ab56927e8e27646489ba61,2025-01-24T20:15:34.020000 CVE-2025-0708,0,0,659d85452dbea3574dcbf830e77ebd7d9b31a5282c05d0b34b2613bd9e24ca6c,2025-01-24T20:15:34.200000 CVE-2025-0709,0,0,db800c30c627cf742b915e1d20885c2c6704e2eaeeb546112e3cf2e52c16fcbf,2025-01-24T21:15:11.237000 -CVE-2025-0710,0,0,8f4016e8f0039b4c1c6bcb61da88a4cde8b3d6eb55c2b846147e1d49213a592a,2025-01-24T21:15:11.420000 +CVE-2025-0710,0,1,8cdc5209f546a76ca16b2158c485605ebac2198d7e009a4440b9d0fb175863b7,2025-02-21T21:35:05.797000 CVE-2025-0714,0,0,7a5ace77913ec81f29c63850fa9378895a034df434a64ef2c1dd7b18a728bf62,2025-02-19T09:15:09.863000 -CVE-2025-0719,0,0,b6697a9d0b7877afc4946ef3370bed5abc19a775396e340dc40852705185cbff,2025-02-26T14:15:11.587000 +CVE-2025-0719,0,1,44927ec8b6afaf34270843fd13dbd3ba0f3f99ce1ef23ab7a0954a7b4854cf52,2025-02-26T14:15:11.587000 CVE-2025-0720,0,0,bf163c74b4e9e0ae1d92684788b595f2199f607068d51d6135d379966c283462,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,a17c1b763dfbd45aa4203f0e8b4c3b1bd0f0a61d080bea2c50ad8ff161e60eaa,2025-02-25T20:28:55.787000 CVE-2025-0722,0,0,c9c24be950ff93b5151cdab68af4eb0f25cca0b4d685aeadd762fbc951dbdf6d,2025-02-25T20:12:27.810000 @@ -280576,7 +280576,7 @@ CVE-2025-0727,0,0,89665f1801b7a5f4bd56958ba24239f6773c6fef24507ea8f637acdf839ad9 CVE-2025-0728,0,0,c5ade298244d1796a7a7e7f33b62e53d6c928f9a2bbee06730bd7bcf52127f3a,2025-02-21T09:15:10.077000 CVE-2025-0729,0,0,63c4f9a984425198df1b11bafe02f85dd96fdaf17e756a1e351de6e7cf84c494,2025-01-27T17:15:16.917000 CVE-2025-0730,0,0,90061643cc4dac91b197f5ef3fb8d0e9f9139fbeb4c8ad0d42c6f09e5de9d18b,2025-01-27T17:15:17.133000 -CVE-2025-0731,0,0,c5098ebceef8a809513be077458f3fce777d3a66a3554682992140c95fdf68a1,2025-02-26T13:15:41.040000 +CVE-2025-0731,0,1,f3a6f53720f313459a1d5c1132e09ca05c60b7759061d8bc51c79df9c0e88ee5,2025-02-26T13:15:41.040000 CVE-2025-0732,0,0,234fd2ae69db2537978e4781055144f526040d5063bfcbf5b1f197cbf63f9002,2025-01-27T18:15:40.550000 CVE-2025-0733,0,0,2bf1ffcd7082ed8aaca488c566ff86bd86ffe68cc8167f42bed7cf7977336901,2025-01-27T18:15:40.760000 CVE-2025-0734,0,0,285f7de184b54b422889f4b7f4a2f33b2c51f439962170e20fbeb8ccab20cca0,2025-01-27T19:15:19.130000 @@ -280597,12 +280597,12 @@ CVE-2025-0751,0,0,2b0159d2b80ca8f6c31c7a92179524a6b98755309de092cdf3c75b0acb8db2 CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6c7,2025-01-28T10:15:09.493000 CVE-2025-0753,0,0,b79ae10e9a426e92eb74a340fd512dc583626856d89e7283f4b8083cb7e021b7,2025-02-28T22:16:37.477000 CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000 -CVE-2025-0759,0,0,3950068b51270dbe7575a23dc385c472189e9c3ef0131c0ca8aebf6982e5189c,2025-02-27T15:15:40.603000 -CVE-2025-0760,0,0,4ca9ac99fb9336a13e4c0593cd94e546cc82a4636817a6aff90106a98c22e8a6,2025-02-26T00:15:10.890000 +CVE-2025-0759,0,1,09d991e76c287398c2be16cd3769fbff0d891df9fa18a6f52ed6c200cb01eaf9,2025-02-27T15:15:40.603000 +CVE-2025-0760,0,1,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000 CVE-2025-0762,0,0,e4f54e0a8112ca4bbd93833150136d658b70b741ccb351b92cec93e89ce75210,2025-01-29T15:15:17.687000 CVE-2025-0764,0,0,05565ab00dd47478df6fddf826fcaa677cc4cff7c4d3d296c1f19709af483840,2025-03-06T17:52:55.370000 -CVE-2025-0767,0,0,ebaf8c1290fdf05b5e391e352659acacd8062a3880fa35ea591d863dd24a3d46,2025-02-27T19:15:49.350000 -CVE-2025-0769,0,0,b581b08d9ccf53eafac9a57a886485fd542a058d854e1408644a5ca22deab911,2025-02-28T20:15:46.440000 +CVE-2025-0767,0,1,36072095d56068369b20f52bda087faaf294ad12e2f47acd8ec63d7b2c7819ac,2025-02-27T19:15:49.350000 +CVE-2025-0769,0,1,8a8ea5cb17f2fc341a530991a05db29f5eab49abeb8ca520192f7b46c34ee88f,2025-02-28T20:15:46.440000 CVE-2025-0781,0,0,b187217e5320659130c2f954520571f906b51edbf3680129182cf06170507db1,2025-01-29T22:15:30.187000 CVE-2025-0783,0,0,a1a945868267bdb320547ed220abbc700a32cfa153b0093b401f18345d541648,2025-01-28T19:15:14.410000 CVE-2025-0784,0,0,4eaf34ca2eb1e58d1808f28c199f31d018cdb7dce226b156d3dea721938df5ba,2025-01-28T20:15:56.230000 @@ -280634,10 +280634,10 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000 CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 -CVE-2025-0820,0,0,a323d0e12b72cde008663e0bb6d8d93e7e4a5f9a1644cb6478edcadbdeacd60a,2025-03-01T05:15:15.953000 +CVE-2025-0820,0,1,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000 CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 -CVE-2025-0823,0,0,489bc052750695544d585739b7e55771102b6fbe5b2f90bedc63d7b39bccf2d4,2025-02-28T03:15:10.510000 +CVE-2025-0823,0,1,b17020edbeb4f15871634c93dd95e17203bfc02555cfe3346399d6264293faeb,2025-02-28T03:15:10.510000 CVE-2025-0825,0,0,a0334191040ddd84cf58e374702797f73c6f21c21dcc064c3fd05efc8149278f,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 @@ -280657,9 +280657,9 @@ CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000 -CVE-2025-0863,0,0,05bf0d910dc69d1772372dd1a1dd0179015f365690dc688d5f7ca632db415d0e,2025-03-07T08:15:40.827000 +CVE-2025-0863,0,1,25f75f53ac04ea589177effa9855fb48b54a3fe1172f00572f63d619955ad4a7,2025-03-07T08:15:40.827000 CVE-2025-0864,0,0,f624aa3dae4420585b7ecd223f0cdc2320b0f2cdeffb279c09c255206ab70361,2025-02-21T15:32:38.470000 -CVE-2025-0865,0,0,8e7a833f7ab566288a852b874c2c2241c8aeaa06be15b76d2c4067b59b0781f4,2025-02-19T08:15:21.853000 +CVE-2025-0865,0,1,d4e63af2a8c8e06f1760cb959eaba4be9b11522f4eef313e7f500aa3b6a5e381,2025-03-06T12:42:22.567000 CVE-2025-0866,0,0,bc27d8b63aca27f60c6d523d29de4adfa02179c276dcc04d1814ec20276ae960,2025-02-25T18:18:49.543000 CVE-2025-0867,0,0,4fde11566279a15e445605316c6a028d3da8ac1ab7e4268f517e24d9af6fe0a0,2025-02-14T13:15:42.620000 CVE-2025-0868,0,0,5f9c282c5702e9789822e6c9b524fa67eb3fad651e552917a18526a606656d93,2025-02-20T12:15:10.893000 @@ -280669,14 +280669,14 @@ CVE-2025-0871,0,0,a9db8232db94718d41bf6e96d50fc960e1fc11044b43405a9641244f217c6b CVE-2025-0872,0,0,e07508ceef8393fa75d891955449dc691af8810cd495d3336262099110723cda,2025-02-07T14:07:40.797000 CVE-2025-0873,0,0,5aa4d6fb1c3a8eb595c4da8c3d69b8728e6fd89d36901ed8245170c7f8b81c38,2025-02-07T14:05:17.653000 CVE-2025-0874,0,0,125dbc60ce30bbccf3019f6512261a2e3942682e065309657be2653037ecf35f,2025-02-21T21:36:58.723000 -CVE-2025-0877,0,0,9abd91ef8daaee0e2c940a8a18ca67cbbbc22c8da6225fc8641235a410cbacf7,2025-03-06T14:15:36.107000 +CVE-2025-0877,0,1,7f41f12142ec8abd36664f28366e339447d20d5a1e414032c4fc42a23d313e68,2025-03-06T14:15:36.107000 CVE-2025-0880,0,0,77e515b74976a5dc3eae29ea5053c11b5ba4746b76e1c02c2445f07f8eff78da,2025-02-25T19:20:49.193000 CVE-2025-0881,0,0,db910fe9bbcd2f0479a83598ac8b27c8e73be02c1af8fa69430d4bd0072a10a7,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000 -CVE-2025-0889,0,0,a3ae28cd1eb9ad44d4044429c5d77259cb331427005c0b4f2bd4843ae7a60701,2025-02-26T08:13:09.050000 +CVE-2025-0889,0,1,3dc2bbbb613a47b35a5ae9bb49f5dbfe682e817feb6892e08df44d3133437acd,2025-02-26T08:13:09.050000 CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000 CVE-2025-0893,0,0,9aeacb99190c595b48dfab12a1ef373316d1268f2ba3ec63739da944f1088a1b,2025-02-27T16:15:38.110000 -CVE-2025-0895,0,0,ea239554253dca837dc66c7dba816f60e18253ed7dc7c58c3db5032863591bd7,2025-03-02T16:15:35.410000 +CVE-2025-0895,0,1,9a0a30807b663ca2666f3f02ccd8e4f1272940cdbd228caede7d58736104dbd0,2025-03-02T16:15:35.410000 CVE-2025-0896,0,0,6751a9384c4941fc50728420c1f3798103a546a9d03291af10ad95d9f21fc6d0,2025-02-13T02:15:29.470000 CVE-2025-0897,0,0,17e8fee0d08c1e41eba72312a61f77d72e1199079fe8978f61db78a1602a3680,2025-02-25T20:40:15.277000 CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 @@ -280691,8 +280691,8 @@ CVE-2025-0908,0,0,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b6 CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000 CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000 CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17 -CVE-2025-0912,0,0,7d91fe8bdf75dc10fc3a6ee045af78f6d8511b1dffa7e9ab755c8337b5808dd8,2025-03-04T04:15:11.390000 -CVE-2025-0914,0,0,9e1fc990beb9632007c48895ab7342f6dbef3aadc843d2d68815604598633e4c,2025-02-27T16:15:38.237000 +CVE-2025-0912,0,1,57fb75f8487ed354dbc265aee031c613ba2e59311440785bd1acc11f7a8d2e72,2025-03-05T16:39:15.917000 +CVE-2025-0914,0,1,42678a20c4dc452af9f91c4b0ea09c3e290aeef5b5759975f5d9768b3a81d3dd,2025-02-27T16:15:38.237000 CVE-2025-0916,0,0,b3e2dfc1a782ae4e58fd745e6dc8ce9f3019ca5ca64e71e978c066cc4fb2d49f,2025-02-25T20:19:48.457000 CVE-2025-0918,0,0,3b7ea2206360604d42b031bd9cb0adecc5bc1a42f350443e778efc86f1a584a6,2025-03-05T21:28:15.293000 CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 @@ -280705,7 +280705,7 @@ CVE-2025-0935,0,0,33f67133e31f18fd4a46b7018ca75f17bd9c12cd022eca372c7880cd3fb289 CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000 CVE-2025-0938,0,0,b2ac2dfef9d7a89f3be36441f4d9584f63acc9fee67471220c7b44c56f6a2315,2025-02-28T20:15:46.580000 CVE-2025-0939,0,0,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000 -CVE-2025-0941,0,0,4453c9d70f88d2e47a6dffd343fdf06d18590bca15f64fe0e63500c4d0f84314,2025-02-26T17:15:21.910000 +CVE-2025-0941,0,1,c8666aaa7ced7c9f01c38235f5f0f79a25e500c559c1e710321a0ccfbaf4ca46,2025-02-26T17:15:21.910000 CVE-2025-0943,0,0,4b30c1ddd7ae655b7bf4d2eb9793548500a8e02002071712c23dcca41b54333a,2025-02-07T14:03:39.237000 CVE-2025-0944,0,0,d13b662667ebb11ccdf7df575aebea999f2f98df20cada3f9e187be25fb4f53c,2025-02-07T14:02:27.067000 CVE-2025-0945,0,0,1a59820c4935e2d16009f5e71afda284dd2c717c729eccad6a055d3b163de706,2025-02-07T14:00:06.057000 @@ -280715,11 +280715,11 @@ CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c8 CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000 CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000 CVE-2025-0953,0,0,13d291258e4c30c78d80b709e158097d095b4eb5e4d1fb760e2f7e371f933aaf,2025-03-05T21:28:15.293000 -CVE-2025-0954,0,0,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000 -CVE-2025-0956,0,0,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000 +CVE-2025-0954,0,1,81ac52e2c35d2d0384ad093852f1aae6a07415f826817f32adad7fbd23a98566,2025-03-05T10:15:19.130000 +CVE-2025-0956,0,1,f70f22dd7aad885845100de1c08ba9be5fe6fcac9e909ba285c16ccd3c4dc18d,2025-03-05T10:15:19.480000 CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000 CVE-2025-0958,0,0,6a8abacfef7e74902962072738d5b34e6ea938b59880ac4107bc2c79fd800440,2025-03-05T16:39:32.083000 -CVE-2025-0959,0,0,ac017d0c713053db6819d69f4f96b0782445ffd184bb81105a5d7c2c0e594e76,2025-03-07T09:15:16.153000 +CVE-2025-0959,0,1,2325c20f8f81b9f45706330fe8d3d9a02cd906edb708d9a4c6bf2a32277a4fcf,2025-03-07T09:15:16.153000 CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000 CVE-2025-0961,0,0,059a317a12e25a50163b21bef6bea5a610b1a05de1674dda2e4a2359a3f086cd,2025-02-10T13:15:26.413000 CVE-2025-0967,0,0,d8c64e0386338d50f41e26d5ea4b324d68ccfa9e57d63544f495e90b3a5b315a,2025-02-25T19:05:40.627000 @@ -280729,12 +280729,12 @@ CVE-2025-0971,0,0,5b8e3a772e26bf816abefc74071cc81ffef57f2dca25d3ca940637bd90f99d CVE-2025-0972,0,0,e5956f37d0d2c05528deb236852ccd083e64a88ec4620fb922e8c6291dff82ac,2025-02-03T00:15:28.007000 CVE-2025-0973,0,0,c6416a4ddf0cbe47c5367a90b3549804a90cf4f838d3c61d7ea9f87f8d53f644,2025-02-28T22:16:37.477000 CVE-2025-0974,0,0,d5c477dc78b0d3fe8557a020be3504381bf16f4fc509c0d46fe50fb97cb7b86b,2025-02-03T02:15:26.433000 -CVE-2025-0975,0,0,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000 +CVE-2025-0975,0,1,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b539,2025-02-28T03:15:10.653000 CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000 -CVE-2025-0985,0,0,b26b31af0c06da0ecdbbec5923f39fbb50dadbe219faf9bd5908c2a08e5b3d3e,2025-02-28T17:15:15.937000 +CVE-2025-0985,0,1,ab5ff17cf137036249b569b35bafebb7d2a0f32a700db9a5caa2f8f0911870ef,2025-02-28T17:15:15.937000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 -CVE-2025-0990,0,0,92e6e15cb16b6e29b8e9ac767cd0ef53fbf77548976d34469bb9d167b90fd0a7,2025-03-05T09:15:09.947000 +CVE-2025-0990,0,1,2a293fcb71423ee2382da50f04e02bce226c8f2de09f53ac036786a6cada4e8a,2025-03-05T09:15:09.947000 CVE-2025-0994,0,0,7e9665376804e5d3cecbef020101144a587ced5be1a96d3160dfb8d1e8544f4a,2025-02-12T19:29:30.383000 CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000 CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000 @@ -280748,7 +280748,7 @@ CVE-2025-1004,0,0,9cae67c415976182c9e721c9cd510a26d80715a77eb7b99e0e645fceac3cfb CVE-2025-1005,0,0,6634395cbbb9a7c65c4fbb122df0f4ce8e0e536d41583c0c210842e7f1160ca8,2025-02-24T12:31:01.313000 CVE-2025-1006,0,0,d649cff08ce4b1c1c688483cba24b8f6211ab5d71e1f74150bdc986243148c7c,2025-02-19T20:15:36.163000 CVE-2025-1007,0,0,a3f70a46cd73e0586b87b15b1921e7689062414b24fcb0ed834a9ea125db4d4f,2025-02-19T09:15:10.117000 -CVE-2025-1008,0,0,51e628e9e44fe449c04c94758013fbbd1872f4c3055304670259874b4c1ea543,2025-03-05T09:15:10.110000 +CVE-2025-1008,0,1,a4e93ecfee4d66a8fdfca5ce33323e278b461fd1db1440294e1bc6431e120e78,2025-03-05T09:15:10.110000 CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000 CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000 CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000 @@ -280792,14 +280792,14 @@ CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5ba CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000 CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000 CVE-2025-1078,0,0,27fb4b341e8da1a1de98d2672d440ce3475e4637ab1dc7078358dba9618f5194,2025-02-06T17:15:21.040000 -CVE-2025-1080,0,0,ade976fc0557fdb6c1cb869623868c205f052811cd96335b0e4c11a47ef03c1e,2025-03-04T20:15:36.867000 +CVE-2025-1080,0,1,abc78b68f44000c0db6bd3b4f439da56161ab3589bdf844c7f69f26a57b1e2b3,2025-03-04T20:15:36.867000 CVE-2025-1081,0,0,2ed1c232468718cca0ffefebc7a9616f01188f5ebdfff7d66afc4bbe1846689f,2025-02-06T21:15:23.120000 CVE-2025-1082,0,0,fce3a76bcdd4192df493e2cdecb45710022efa3172953cd17ae4bb75681720fa,2025-02-06T23:15:08.140000 CVE-2025-1083,0,0,24575cc196a809327eac507956b0cfbef268c827f0bdead2d6d6395339f4414c,2025-02-06T23:15:08.350000 CVE-2025-1084,0,0,9bdd1b4cc79c8734b99a91f772eea406bc01ac38fde0723939e3b96ec244fa26,2025-02-07T00:15:28.180000 CVE-2025-1085,0,0,240f000b2a2196559d3c93131a0f7508a4e94aebf865be36c2ffd695012f0fe3,2025-02-07T01:15:07.930000 CVE-2025-1086,0,0,a69d2558168bf2a8aaa109750d1ed5860f8baf2bb5bad3b2b8e78234f1d8c631,2025-02-07T02:15:30.523000 -CVE-2025-1091,0,0,84b0dac5ac8047fda6aa7c87ec14d05bb7ca818062693c659c2c5acdf4288dc5,2025-02-26T00:15:11.250000 +CVE-2025-1091,0,1,41f3aeac640c3e0e17c6b04948a8dcf1ae635325d94a919fd15d739e41c450e8,2025-02-26T00:15:11.250000 CVE-2025-1094,0,0,dca1378d2e11e054a0baff76bda52bd172b0e41af32ad66e0ce66e679989e2ec,2025-02-21T18:15:20.033000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1099,0,0,11f1d55ac2f54be33d32f312ff6f7c0de1cca4630441d99340d06e9ba24724ea,2025-02-14T12:15:29.460000 @@ -280832,10 +280832,10 @@ CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000 CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000 CVE-2025-1147,0,0,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000 -CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e57c,2025-02-10T14:15:29.927000 +CVE-2025-1148,0,1,d2e6ab3499adb7a846f070e5cd9b65e4226902a4767962a18f95eea1b7a2a4ff,2025-03-04T14:53:43.637000 CVE-2025-1149,0,0,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000 -CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000 -CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000 +CVE-2025-1150,0,1,dbf00b96ed1718eecdda5b6c202f493e85a1d856b86de0f8858499111d5caa5c,2025-02-10T17:15:18.517000 +CVE-2025-1151,0,1,08ae19a717b1ec6e2bbaad571ab2e13a8c5ccfc7eaf1387e7545f0cbe9983a49,2025-02-10T17:15:18.713000 CVE-2025-1152,0,0,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000 CVE-2025-1153,0,0,4a0aa81e885caa78790692d05830179faca64dd7e5cb7f2a5704fa52079f4dff,2025-03-03T16:52:20.953000 CVE-2025-1154,0,0,57272d35734346cb9c87a9c3d8280a92cef919f388fe5cd9152692becb234631,2025-02-10T20:15:42.173000 @@ -280912,44 +280912,44 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,7e59a5cfd949661bef29f7dcf50cf62d10c20d0e220dba94bf5fd512d2e88789,2025-03-04T08:15:35.920000 CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000 -CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000 +CVE-2025-1249,0,1,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000 CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000 -CVE-2025-1259,0,0,975ae5ff97cd191d701987d3d89a49ef9f149b61d794323b6064e28c5ee88adc,2025-03-04T20:15:37.003000 -CVE-2025-1260,0,0,33abe94e0faf572da8b0a7cf9ff4b66ed5eb9cd32ed8fc580ecfd4b9b555e933,2025-03-04T20:15:37.133000 +CVE-2025-1259,0,1,bab76048a090914f490546cf99a5b508bb1b7dfd40f29b8dbf00677fccf70e92,2025-03-04T20:15:37.003000 +CVE-2025-1260,0,1,3877b28b76cb9e302f3b60f77cca2c3daef6092502ef7e5b63ae242ac50b382a,2025-03-04T20:15:37.133000 CVE-2025-1261,0,0,f06464da6be1cd8cef66a95f5731dd7dfeb8fdba4f639f0d373e7bbfddec034d,2025-03-08T02:15:34.147000 CVE-2025-1262,0,0,b2387eb6dd825b4bc22b3213ef83d0e48b91556ac3dffc3cb635c9915a53a643,2025-02-28T01:30:32.830000 CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9e8,2025-02-20T20:15:46.537000 CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 -CVE-2025-1282,0,0,135e0d0f84484b53270653b79f9e366f1c0baa627fbaf4af3fe538f7cdb33c50,2025-02-27T09:15:10.160000 +CVE-2025-1282,0,1,bcd550bc4b0f7b2c27f0f5e69aeba338cc0185c6a99805b296dc4f3134453366,2025-02-27T09:15:10.160000 CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000 CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000 -CVE-2025-1291,0,0,bb482c13e6ea46eaa51479ea468a757d12dfa1292b1f2ec778322441cd52e4d5,2025-03-01T09:15:09.710000 +CVE-2025-1291,0,1,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 -CVE-2025-1295,0,0,24bdaaeb758634ffe52b87573cb2760c08e1a07ac9682ba1ed20b65d22033cf6,2025-02-27T06:15:21.990000 +CVE-2025-1295,0,1,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000 CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000 -CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000 +CVE-2025-1300,0,1,77db9cd7a18e3de4a8b6c836390a2247e6295125845190568cfff46e60843c32,2025-02-28T13:15:27.043000 CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000 CVE-2025-1306,0,0,1ee42c9c738fb719918d183e21eaf97d7c5ffad4c1efdf287d4d8d62c7af94e4,2025-03-05T16:39:32.083000 -CVE-2025-1307,0,0,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000 -CVE-2025-1309,0,0,da538cdce636b31b2addd44bf497711ed6f7f2ca23a8aa760bbe290c3d014531,2025-03-07T08:15:42.017000 -CVE-2025-1315,0,0,5be04aa629598e4be5d357c662948434207fa248de797d14003b93bcf9fdac16,2025-03-07T09:15:16.313000 -CVE-2025-1316,0,0,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 +CVE-2025-1307,0,1,603784af08138e94589dd407d41184292057617d2411d50064a5da373532e4e9,2025-03-04T20:42:28.777000 +CVE-2025-1309,0,1,ecdf15c6fe9b0a527b02459248595a98c896b03949aeb88d936e0c48a43c2de2,2025-03-07T08:15:42.017000 +CVE-2025-1315,0,1,a9a2a2e5b94ce503cbd86ae6e3ad16274b70fcd984076a1d09c1fed7b361bb2d,2025-03-07T09:15:16.313000 +CVE-2025-1316,0,1,30640b26d4c683231bade7d46b205749ec7479d1c0ce97988fd171ec81e89a6a,2025-03-05T00:15:35.057000 CVE-2025-1319,0,0,33bda93fd3980ba7b6a91272d6a6ae7036010f8fa7bdd3f4dc099ca7b24e3ab8,2025-03-06T15:00:16.447000 -CVE-2025-1321,0,0,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000 +CVE-2025-1321,0,1,04472976fdb73b7db2650d95ffbe1f42d5766a8cc0b174eb9c1b7815f98211f8,2025-03-05T16:39:15.917000 CVE-2025-1322,0,0,ef532a524b09825661ab421375ab624604880ea49516d5ffa6abd3daa6646678,2025-03-08T10:15:10.583000 CVE-2025-1323,0,0,033b81ac968bdbd8998abfe50ff1029213aaccbbd88f79ffcc07fefd27cf79c7,2025-03-08T10:15:11.003000 CVE-2025-1324,0,0,7683703969288304647be96e6e18acedc0aaa47738bdb4c92e55ffe9d48662b4,2025-03-08T10:15:11.217000 CVE-2025-1325,0,0,b4fb99b87c595d4997dd2b75e32d285cdf4b5b8e9910ed9f6bc4a7a9a97b0ede,2025-03-08T10:15:11.427000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 -CVE-2025-1332,0,0,04253da72e8edd91cac77b4f2ad8533b669f4d496d09ec3f2573f85295be125b,2025-02-16T01:15:20.440000 +CVE-2025-1332,0,1,e9bb45c833efd8c50b3d3a50407ffdd793698000dded88de9d0afd2a7bb2110b,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,bb409ff99c8e3378896a9535373b62c93c367d19339145f6746127b81b9cf3e2,2025-02-28T19:47:07.220000 CVE-2025-1336,0,0,94c18a1aa58d3c2ef1027a8ec07c915190dc07d2ac6d7f527e5afadf3dc48ea8,2025-02-28T19:47:07.220000 CVE-2025-1337,0,0,d237258419f5e95c4a41a754d9d9f7a676c18c48c58598e7cf94f97f0eff79dd,2025-02-16T11:15:08.203000 CVE-2025-1338,0,0,9507b7d3049bacb036f565c3abe2a79aa2eac0c5105a53ebfd7cc272d65639f0,2025-02-16T11:15:09.530000 -CVE-2025-1339,0,0,dd6791487e0b6543ccd5210094c70e7da19028225224c9242d711611f868d7b9,2025-02-16T12:15:08.173000 -CVE-2025-1340,0,0,5b827fedbd7ff3be4f76e008461569a1db501b335d80d1ad28164755045aac22,2025-02-16T14:15:21.130000 +CVE-2025-1339,0,1,db8893dd6b482199bafccf44a261f60f71bcd4d653ae1a2ffe4fcaf758c84882,2025-02-16T12:15:08.173000 +CVE-2025-1340,0,1,2a8e869213076f4a20324bcd8b840df9a199476ff204b4ae058d07c9a94e0098,2025-02-16T14:15:21.130000 CVE-2025-1341,0,0,81c73205f91da4e4a53e62a4a3612a03f01d8a5a3578739a3ddcdc59f89bd9d8,2025-02-16T14:15:21.893000 CVE-2025-1352,0,0,49ac14e9196cb2742d9d61507be651bb74f909d13564705f3ec967ee19bb4a5a,2025-02-16T15:15:09.133000 CVE-2025-1353,0,0,592b3b5fa0e656024e4607b02db6b1922da161f4886bf146bf25aacc925677e1,2025-02-26T08:13:23.443000 @@ -280960,7 +280960,7 @@ CVE-2025-1357,0,0,ed748fcc9d023acbae682d7a1236530483f53d6ca6eeb189959266b42b71ca CVE-2025-1358,0,0,0f208cb5faf98f47b54c1623a5f1e8ec8422f5e67babe03ba960d67439b5c182,2025-02-18T17:15:19.737000 CVE-2025-1359,0,0,928153e696d5f6207f6d6a7c7efd1da8ed8292bd335d2efe90d073eb5fca30d1,2025-02-16T20:15:08.817000 CVE-2025-1360,0,0,04b27b5e48ddff2127cd3fd628d5f591046dc85d058ff7002fb398e03a37f386,2025-02-16T21:15:09.970000 -CVE-2025-1361,0,0,c2a0bceb6d9b392ac2bc8151ba32ad13a82f99db026327296fa5825204a7190f,2025-02-22T09:15:24.033000 +CVE-2025-1361,0,1,6cb349d7b19dc38a2ff9ae384ac7f6eda164bcaf984371d86a7a853419d5a9e0,2025-03-05T21:28:15.293000 CVE-2025-1364,0,0,65dc29b185f996c94288640d016e6ff7390ce593ff33d623924f6210375596ec,2025-02-16T23:15:09.087000 CVE-2025-1365,0,0,813fc9e0260c87b81bfe6c46903683e2e4d13197329a0af18f56252f992c77d8,2025-02-17T00:15:09.140000 CVE-2025-1366,0,0,f077a2c0632d4ef86caccb2d0fb29590ceb278eb30f80c1449c20989373c5e08,2025-02-17T01:15:10.280000 @@ -280978,35 +280978,35 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89 CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000 CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000 CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000 -CVE-2025-1383,0,0,26b3f9287a3dc8bde52150fc61dab501d76865193cef15f0f8e76bc4558f6230,2025-03-06T12:15:35.937000 +CVE-2025-1383,0,1,3d6bb558842041d82d621f422104cb5c9be368f9bc9ceccf69a42cab81d3fdb5,2025-03-06T12:15:35.937000 CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000 CVE-2025-1391,0,0,d90cb6e9a989a8a68c01cf8b9c7ddb91844bc2ec06595b67c0549c7c80f8bc3a,2025-02-17T14:15:08.413000 CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000 -CVE-2025-1393,0,0,7e67ea62469d5decfffee901208f62ab89eaada4966e37e0b8373112ec3c539d,2025-03-05T08:15:35.107000 +CVE-2025-1393,0,1,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 CVE-2025-1403,0,0,d98767ffbbabf7b703d6464c4760704cf18c9952a200d902dfdc98a149c5818d,2025-02-21T18:15:20.550000 -CVE-2025-1404,0,0,206798e10794776f5070bd90971934cac6d858de29398b0cd87fe60644cffca8,2025-03-01T12:15:34.310000 +CVE-2025-1404,0,1,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e64e,2025-03-01T12:15:34.310000 CVE-2025-1405,0,0,016e0a2d9c49bef945de3d88454b1b089cb01529a46c8d393d534fcf1fc43e82,2025-03-06T17:52:55.370000 CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000 CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000 CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000 CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000 -CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 +CVE-2025-1413,0,1,66d6334b5b3ce2a5ffd2689297e5c1bb234e6299d8a70ce39e1288c295632ed0,2025-02-28T09:15:11.850000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 -CVE-2025-1424,0,0,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000 -CVE-2025-1425,0,0,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000 +CVE-2025-1424,0,1,1d26219e5d821b27df6f7c1ae9e132bd2b17590c312b5e50d5eee5c35fb80873,2025-03-04T16:15:36.663000 +CVE-2025-1425,0,1,223dd7021af2c436e6b52a97efc7f14c75c156bde773a08ab074a96d25cdbe2b,2025-03-04T16:15:36.803000 CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000 -CVE-2025-1435,0,0,5769f1e4d835d83465db5788f65be161aa498d69888f34e730e0859889f385a0,2025-03-05T09:15:10.267000 +CVE-2025-1435,0,1,d840829e9adebbd2e05cc9e4789e2ef73a3bfba41e90989d315c56fa7ea84aaa,2025-03-05T09:15:10.267000 CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000 -CVE-2025-1450,0,0,49a816e7c5a69e24720ab368bac5ce58ec4ef269578dc55c279521400fe5c40f,2025-02-27T10:15:10.677000 -CVE-2025-1459,0,0,d4ba0fca00fb1394af6261aef7e66ea4aa76dab54f464d17b8cd4c337f3e2ffd,2025-03-01T07:15:10.980000 +CVE-2025-1450,0,1,162c0b930672185bd108fa37bb3f44f1a62099d9e3d7e96e9e17908566b144b1,2025-02-27T10:15:10.677000 +CVE-2025-1459,0,1,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000 CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000 -CVE-2025-1463,0,0,d248ef273a3b5e888e172d8fd07cc9fd97f2fb7f97e8edd42c6b6898096b1d0e,2025-03-05T12:15:35.270000 +CVE-2025-1463,0,1,66bff7e70ca672b5367a8323921deb52eeae1be259f6bf189f389bd789ca9f1c,2025-03-05T12:15:35.270000 CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000 CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000 CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000 @@ -281017,24 +281017,24 @@ CVE-2025-1481,0,0,9e409e3b28b73c12a8c29859ff301d77be438a235d6868794f50991b53bd6e CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000 CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e53733175,2025-02-24T11:15:10.193000 CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 -CVE-2025-1491,0,0,40186b708c4228824b2aec7aee2f2d8fd38e21f8b843bfbf932f90bc1889000b,2025-03-01T13:15:10.750000 +CVE-2025-1491,0,1,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000 CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000 -CVE-2025-1502,0,0,0a039472763f0268c96bf0cb63d948faf52e8b650cac893f2842ccae51bdaafc,2025-03-01T07:15:11.183000 +CVE-2025-1502,0,1,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1504,0,0,0caf0fe296ba3de7804662f98b8d86d33ae80da3d9d2ad938f31b1ae97694007,2025-03-08T03:15:37.393000 CVE-2025-1505,0,0,1355264158a2ba11ce2fd21a6bc45f6ba2c7a41beba2055617c8a72a80e67517,2025-03-06T20:21:36.547000 -CVE-2025-1506,0,0,3f7cdcccb4278d311606b0b4c7fc8dc6a6db82f7eaadf4061c1d5cb0a4181211,2025-02-28T06:15:25.557000 -CVE-2025-1509,0,0,96513da0fa9cb03c336b83bf5bddf52acacdda9db2e967b5f8ef0dc0a4de0f27,2025-02-22T04:15:09.883000 -CVE-2025-1510,0,0,5e7f4e908d48e1455cf18a81d8dfff338614746cef18c3315cc85b0c64b8c8df,2025-02-22T04:15:10.040000 +CVE-2025-1506,0,1,1a3dc27492e0227e9be18d0d6fcaaa964bb01e29c760d9e3b9cb263d26e312c0,2025-02-28T06:15:25.557000 +CVE-2025-1509,0,1,1a5faaee231a2f918a1f7dcbd7fa0b900016cced0ec7ab7dbbc19bb7eed90578,2025-03-06T12:42:22.567000 +CVE-2025-1510,0,1,eaafc82c94652e15aeba6be8dab487f63a6f8dda886db91ee01d546563bfcf4b,2025-03-06T12:42:22.567000 CVE-2025-1511,0,0,b1b588667a5e649574877e42702a5753176a9b5bb63efe10313a554d2504ba09,2025-03-06T17:52:55.370000 CVE-2025-1513,0,0,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998dde,2025-03-06T17:52:55.370000 -CVE-2025-1515,0,0,40fb5af3561fa8566133f431829f949e2515107ad298d86ca1e6887d1d266212,2025-03-05T10:15:19.850000 -CVE-2025-1517,0,0,f77151ae5031cf639b38b016ea952fb6438aadc87174ef04eae6ee15efb2dd99,2025-02-26T13:15:41.193000 +CVE-2025-1515,0,1,6745568ce7f500454ddf7cbbbf3fe5b80633db8da56aea69750d807282006f92,2025-03-05T10:15:19.850000 +CVE-2025-1517,0,1,2fa9cdc1e0143bd8e9da49275eaa45f04a63792c53ac8ebc4aa9796acfc194c9,2025-02-26T13:15:41.193000 CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000 CVE-2025-1536,0,0,13d2bb79966b022c194b53190d029539a3b9db0220df5fb889249e7f79d2fadc,2025-02-21T15:15:12.270000 CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf0c,2025-02-21T15:15:12.460000 CVE-2025-1538,0,0,13e428f2e0a70ca29f792d43841bea06ccb32609b695e1ccad7a3e5c918f65a6,2025-02-25T20:54:42.947000 -CVE-2025-1539,0,0,97460c98bf526740214940beb1708fd987b97676a93649d845868894467b4304,2025-02-21T15:15:12.830000 -CVE-2025-1540,0,0,0c563f4f685636159ddf5e4314eb08b0ba3d992f086b463f21581a35e349e4cd,2025-03-06T09:15:26.317000 +CVE-2025-1539,0,1,5107b21fa1eed62c5fd4c5fd3439ee0c6c194c495f82d6047c4ab790d1d5dfd0,2025-02-25T20:29:38.367000 +CVE-2025-1540,0,1,66b37418e619d238e142eb9ca10b5a1d126fd7e1af75476ac259950e1fce209f,2025-03-06T09:15:26.317000 CVE-2025-1543,0,0,dfb74998b01a6403cafc6b46cb4c4c78345f8468d3e985eba5ddcbda95801293,2025-02-21T16:15:32.787000 CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de177,2025-02-21T16:15:32.953000 CVE-2025-1546,0,0,84418e607817926124f36f2ad2fdd36567961e93366563a9f6287482acdf5eab,2025-02-21T18:15:21.523000 @@ -281044,15 +281044,15 @@ CVE-2025-1555,0,0,cf4f7ec4c7f22b94f8768d59c9ac2dc8d623655b78ea6887e44ed58b3a34f6 CVE-2025-1556,0,0,49cf967daea174b937b57c499bcc0c58b27409b32832009c453b7af5b3d38409,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,3e42539e3278629613c7b2eda2c607604ec0199542e2ce94bd1310750af51221,2025-02-22T13:15:12.247000 CVE-2025-1560,0,0,ba11227614899d3056761ea4c890190d97fc89170a767994ef7607faca65ce17,2025-03-06T15:00:16.447000 -CVE-2025-1564,0,0,645d5d3c72d90d98c848dad749bda526f296bef655490c72ec6d985301cb81b4,2025-03-01T08:15:34.007000 +CVE-2025-1564,0,1,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000 CVE-2025-1570,0,0,9c53718a1eed240e02a569965a467342bf3a80fb8b884074af55a034defd9df2,2025-03-06T15:00:16.447000 -CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000 +CVE-2025-1571,0,1,2d3a707930784aa3adbd68ee03cef939167b2401972e390284b2599d52422b6b,2025-02-28T07:15:34.227000 CVE-2025-1572,0,0,4624d62075f2625515018b130359f28dc2ef1b58e0a085f5d23b7995a7032a3a,2025-03-06T16:36:54.387000 CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000 CVE-2025-1576,0,0,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000 CVE-2025-1577,0,0,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000 CVE-2025-1578,0,0,0d9ecf545c28371e3a17142eb6623e9049c12d991fcbf8ec598bccc17e9c793c,2025-02-28T19:36:29.477000 -CVE-2025-1579,0,0,27c513acd0a9c40f3d5e6eaa99975a86fa62c7ac2618374b3e15bf65d08f5d6d,2025-02-23T09:15:09.393000 +CVE-2025-1579,0,1,2190f5827a26e420ebf33b84b3329a731b7520fc75675c07813e25c7bfff6018,2025-02-28T19:36:29.477000 CVE-2025-1580,0,0,afeecf9391b29af9c4df01adece54496ac1306b282e21af172a55a31e76b33b2,2025-02-23T10:15:09.623000 CVE-2025-1581,0,0,57ad20b66c5edb4e9e2c84f0761dd94c02cc070a82d9a015202bb8b0a6e6bb0d,2025-02-28T19:36:29.477000 CVE-2025-1582,0,0,920fe80e182948c0b7201f4da0fbeb064aee469b0b0b5f589c4ebea7b5734795,2025-02-28T19:36:29.477000 @@ -281072,7 +281072,7 @@ CVE-2025-1595,0,0,a0e8a94b26f6becdc2e852b029e76fb8d479d7bc5617822b254931a008a490 CVE-2025-1596,0,0,c5a6ef6ff14996a4302d92cb957f93e5cd5ae425c9cfdced362b6793f1afdcdd,2025-02-28T18:33:35.540000 CVE-2025-1597,0,0,3c0030e150cd76838eba98a7b6d5cf1327f4ca2c86609e77208f23c7981043cf,2025-02-28T18:33:35.540000 CVE-2025-1598,0,0,d471983e31136e083d728509bb5e280fef1e96d4745e882b56968e8ac2305c88,2025-02-28T19:18:04.507000 -CVE-2025-1599,0,0,100a0c34186946ae867f9a2889f63e70851ee91bb0af53ef5888e3cf39353e5b,2025-02-24T00:15:09.393000 +CVE-2025-1599,0,1,91d3eb8d40bad353d99518c83718f2a653f26f718f0e3940dd2914c47f1a3062,2025-02-28T19:36:29.477000 CVE-2025-1606,0,0,cda9b0d19715f40c1ef1366ad90bc4fb92bb981b32de6d3cb8af3f5634f2fd38,2025-02-28T18:33:35.540000 CVE-2025-1607,0,0,dc108e05ca391ede91b96dae8a712efe3dcac9a91991f34aa8ee3407ebba91aa,2025-02-24T01:15:09.803000 CVE-2025-1608,0,0,bc9ffcf9c1a654ab00d2ab854e1284b9173828829509b30aa2c4483b07df8d9b,2025-02-24T01:15:10.420000 @@ -281088,8 +281088,8 @@ CVE-2025-1617,0,0,5699c11babf41c6523a7b468d5f93f623e40fad3886f2c2564d3fbf01bfd5a CVE-2025-1618,0,0,26805ff186a34eff816cd1df89880ebc77e7548d77ce085b3162d114680f02ff,2025-03-03T07:15:34.730000 CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000 CVE-2025-1632,0,0,28fe99b7a4053d94bf92a115fabddf2bf6f2fcf0d6264d4d013a0dc1f70735ec,2025-02-24T15:15:13.217000 -CVE-2025-1634,0,0,4cd063c32518b09ae8b07ad657bad146c97cc4d931f5189e3d631a7cc1d23de7,2025-03-03T14:15:34.237000 -CVE-2025-1638,0,0,73f08267213d85fae6cfc79fe8ee252b893947fe65424e2f84e6465aca895ec5,2025-03-01T08:15:34.167000 +CVE-2025-1634,0,1,765d25a71e7596e3d1f1f1f40fca8aaec5cc08e3158b2f39db981240c06c1630,2025-03-03T14:15:34.237000 +CVE-2025-1638,0,1,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000 CVE-2025-1639,0,0,cfbf2e6591ffebf411f63d293bf18c5e63cdb958516a5890f7098c88e7d5697f,2025-03-05T16:39:15.917000 CVE-2025-1640,0,0,a0f8f210f37587375db5b38f353b81a59e9ce28e661d11d8fbd0998061d8e8e7,2025-02-28T01:55:41.530000 CVE-2025-1641,0,0,298e7bd3f12e0ff5b9a9caf6661079e526cc4d770741d969c699c4454e05db34,2025-02-28T01:55:41.530000 @@ -281101,109 +281101,109 @@ CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc3 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 CVE-2025-1662,0,0,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000 CVE-2025-1664,0,0,928cb3965a19577a81242a6eb1ec59c4bb6442769e32edf43d299744e6de1a44,2025-03-08T12:15:36.010000 -CVE-2025-1666,0,0,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000 -CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000 -CVE-2025-1672,0,0,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000 +CVE-2025-1666,0,1,129a5300a49835d516d7b95bc1f11c6cf7012490eda8d6a20d90a510d721111b,2025-03-06T12:15:36.117000 +CVE-2025-1671,0,1,3e864abf2317ed0da2e5ce5c715f77427678e759b1b0b7661615571210565dd9,2025-03-01T08:15:34.320000 +CVE-2025-1672,0,1,acaf01950ea049a2828558b06c1cada5a4018322c579aca0f91cd8d8cfdde40a,2025-03-06T10:15:11.897000 CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000 CVE-2025-1674,0,0,c9ab5cf0d854b00d30135f8d3aae01653c22e99139baff93dd6ad32b17a41d13,2025-02-28T01:30:32.830000 -CVE-2025-1675,0,0,0b817eb545f757f9942631ee6d87bc1530fc1d31342388c76d70ff502c500bfa,2025-02-25T08:15:30.020000 +CVE-2025-1675,0,1,41964deda5d2388164c40f16f260062c32ffffe02c616e33cd5948a6538bb6a5,2025-02-28T01:30:32.830000 CVE-2025-1676,0,0,ffcca994630f7ace6a571d92659403689ac413c9afb10a75dc0095ea449331e9,2025-02-25T14:15:31.447000 -CVE-2025-1681,0,0,7d51063b53cc26e2d9d7ca02fac87d9b025acdeb1000e1ea34d2fcd8d5fd2d98,2025-02-28T00:15:35.950000 -CVE-2025-1682,0,0,ddd132cdb3da4a7beb83f24bc5536ffaabdef7bd809ceeb815e5c9ab2aef1663,2025-02-28T00:15:36.100000 -CVE-2025-1686,0,0,3536660160af922789f8fad218b9ae6a9bf3bbf3597f65b81116a5d82e5bb6b3,2025-02-27T15:15:40.940000 -CVE-2025-1687,0,0,6afc32ff83b588e4afcaf9b93317980059c72f8b50037b8136b65694c39d4c43,2025-02-28T00:15:36.240000 -CVE-2025-1689,0,0,6e4c147bd13cbe8c1c99d7fb980ecf15a6684b3f1077d9b14a92e18ec3748aff,2025-02-27T07:15:35.400000 -CVE-2025-1690,0,0,c3c30e76959167db5e53b3f3d7f732bab0cb17823abdf119dfc999308f89a271,2025-02-27T09:15:10.697000 -CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec582d,2025-02-27T16:15:38.610000 -CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000 -CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000 +CVE-2025-1681,0,1,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e1071,2025-02-28T00:15:35.950000 +CVE-2025-1682,0,1,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000 +CVE-2025-1686,0,1,aeb3e336ffe94b1c0a7e4872f92b31f7de132db0e69b60fe0611b8798ab6716d,2025-02-27T15:15:40.940000 +CVE-2025-1687,0,1,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000 +CVE-2025-1689,0,1,27f88440d15cc4638b7de0e755f526794faf4f0384e03f795f8c0315bae674a7,2025-02-27T07:15:35.400000 +CVE-2025-1690,0,1,27374a34521b8d136365bb94ee2f06ae3a84166302e0fd1fcbd44e96dfb04c6f,2025-02-27T09:15:10.697000 +CVE-2025-1691,0,1,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000 +CVE-2025-1692,0,1,2e6d02e2120ba7cdd2d2dce988c300f2bd2785f615f13934cbd4bb5f104f2bf7,2025-02-27T13:15:11.413000 +CVE-2025-1693,0,1,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f50,2025-02-27T13:15:11.563000 CVE-2025-1695,0,0,11ac8a68241490aba1f5f798db0dba9522b478d170bec56bb4dd6fd08e218fb4,2025-03-05T15:18:38.660000 -CVE-2025-1696,0,0,e19ce729f319138dda2bbd521ee9f97aba68e3dde2fd97d4281f0a0a35131297,2025-03-06T12:15:36.293000 +CVE-2025-1696,0,1,ce6275a845a1290c62e8c0fe3a0fcacdf1abe14eafe526218c3da3df65c4ed48,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000 CVE-2025-1714,0,0,61e824a1ccdf54ec33bae3dd88565effb2433516529becf60015224f7bb0775a,2025-03-07T05:15:16.233000 -CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000 -CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000 -CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000 -CVE-2025-1726,0,0,1eac96fa1d7a7ec9ea278c42b19f49f33808e18559f649ea58334e24fccb274f,2025-02-26T20:15:13.510000 +CVE-2025-1716,0,1,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 +CVE-2025-1717,0,1,4eace37625fa94455212ed05fc0d7dccd597669fe610b1618145f4f97f30cd81,2025-02-27T08:15:31.130000 +CVE-2025-1723,0,1,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000 +CVE-2025-1726,0,1,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 -CVE-2025-1730,0,0,3552c2abcc0f807391a69e1527a01ae3b1d54867e5f720c6c378cf1c5b09cb05,2025-03-01T07:15:11.380000 -CVE-2025-1738,0,0,58e54f7ac9bdcc825d654370e2844b73977d07a9621ce43e5ef4606622aff0a3,2025-02-27T13:15:11.720000 -CVE-2025-1739,0,0,474bd41a40b4d7e6fdfff026df5b08f6be7f300b56e56bcc0fdd145be437283a,2025-02-27T13:15:11.883000 -CVE-2025-1741,0,0,5cba87695e016c6ffc8a5b6e746f0eb6861a6e2a2fd36e6d7ea77a37ce54dd19,2025-02-27T16:15:38.930000 -CVE-2025-1742,0,0,2c7e3a0bff7af3d54fe7d2d8c02a38b295dbd02f49796aad0eb4c1d9e47ae14d,2025-02-27T17:15:16.460000 -CVE-2025-1743,0,0,85e807e76c55c354bbb5228fcb259eb78d92c1cbd6ee9a33bf4c666a7a379b8a,2025-02-27T18:15:27.650000 -CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000 -CVE-2025-1745,0,0,e4aacfce1594956f6e566e4c97bca7be44c830e80b130dad3dfd40e074d02e60,2025-02-27T18:15:27.923000 -CVE-2025-1746,0,0,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000 -CVE-2025-1747,0,0,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000 -CVE-2025-1748,0,0,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000 -CVE-2025-1749,0,0,2ed2d8a684d2a9d359b913eedd08701fd98f085a7906d02a287bb2e85b9600c9,2025-02-28T14:15:35.760000 -CVE-2025-1751,0,0,23febf746b08b9b62d9a86bc04beb9eb423113024e0cb3002fb920be2326e655,2025-02-27T12:15:35.030000 -CVE-2025-1755,0,0,e98722605b3f73dbcfde847f93fc06a2f7a469a54167735911620ea692356f92,2025-02-27T16:15:39.137000 -CVE-2025-1756,0,0,9d3e6b9b79f2288093ce2574e75d10b1239a012c0c72bf0cd61bb2c5778cb69e,2025-02-27T16:15:39.287000 -CVE-2025-1757,0,0,78b33a074cf39bfe778889068f984255867e6a5fb09e8f531bc6334acbd95f5f,2025-03-06T20:21:36.547000 -CVE-2025-1768,0,0,e21e53cb16776247b7fcdb1da98b2a5a84bc79fed4b5aeb36139ff1ea1a21bd9,2025-03-07T11:15:15.653000 -CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000 -CVE-2025-1780,0,0,226a30a5273cda636f0411ff11753517352eef60dfa6b2b998a1836a6dc818bf,2025-03-01T04:15:09.713000 +CVE-2025-1730,0,1,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 +CVE-2025-1738,0,1,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000 +CVE-2025-1739,0,1,3fd0271bebf5dab4e4b7dc5bc9151c4b432e19911079ec61b281141a587b7651,2025-02-27T13:15:11.883000 +CVE-2025-1741,0,1,e3cefbac58ae300d7a16e849817a4e07ca1da020b4a797f97ccd724d6b4aefd2,2025-02-27T16:15:38.930000 +CVE-2025-1742,0,1,3691d98a8ef935d8f5b33040a2a9528758300e7487ea2dd4faf22ae3f2bac338,2025-02-27T17:15:16.460000 +CVE-2025-1743,0,1,bee1e73e97e9601080a06d9803444f53f91ce94b2810d40c3b0e4ff691e7e1fa,2025-02-27T18:15:27.650000 +CVE-2025-1744,0,1,1f1ef389af661a882010c3d23413e9c514afeb8763bb832b32ecaadb3b36cc7d,2025-02-28T04:15:09.603000 +CVE-2025-1745,0,1,9400d8eb0fef37d809d5bd41ae0c788a13003350e8c6190c28df0488dd38f2c5,2025-02-27T18:15:27.923000 +CVE-2025-1746,0,1,00967a578db914df9d08da1c45837a54359605ac7f7fb2c315112d5dee867a08,2025-02-28T14:15:34.943000 +CVE-2025-1747,0,1,3e9813816aa639c6f1b7264f59b80d2fdaea69f5655aca7c390cfb5b4a06657b,2025-02-28T14:15:35.480000 +CVE-2025-1748,0,1,ba557eb25b8329e0f702fb12acce78cf301549bbe6cc5aeb4f757bc2d519a79e,2025-02-28T14:15:35.617000 +CVE-2025-1749,0,1,8e8ac83ce81bb2c83085a3c887a754ef1b17b79d609cfe9504640812bcda4a01,2025-02-28T14:15:35.760000 +CVE-2025-1751,0,1,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d823604,2025-02-27T12:15:35.030000 +CVE-2025-1755,0,1,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f354,2025-02-27T16:15:39.137000 +CVE-2025-1756,0,1,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000 +CVE-2025-1757,0,1,dc2ff923c8c3145193c6561db00b356fb8535b7d409d9e1ae9c89572d47684fe,2025-03-06T20:21:36.547000 +CVE-2025-1768,0,1,c05b89cadd612720776009e6e0d5cd82f5ad65495c19a7bd41a71ec158195a94,2025-03-07T11:15:15.653000 +CVE-2025-1776,0,1,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000 +CVE-2025-1780,0,1,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000 CVE-2025-1783,0,0,7fcaf339289a48edd534e2424306b8cd911988b21bbe826dd21f100c86d4c9de,2025-03-08T10:15:11.647000 -CVE-2025-1786,0,0,6efea7c83ade59c3484e3ccdf6b16455298d78bd2d350ead5c28c52e73509d8e,2025-03-03T21:15:16.130000 -CVE-2025-1788,0,0,65633b0fdde44bd6e8f752d6a57d4e3e26e3a2eb678db1c79ca98769400305da,2025-03-03T21:15:16.263000 -CVE-2025-1791,0,0,3c9031f43c5aed2d49ec4c2e3a617d4eaa134c60206475ea4448611f5ca2f51c,2025-03-03T21:15:16.433000 -CVE-2025-1795,0,0,70fd77cb540d3bda179678e58a7ef81c271cc3e16d5d4d855b724aa1245ec66f,2025-02-28T21:15:27.570000 -CVE-2025-1797,0,0,35cd6fca0cfe3ac5393e26c9bc504f8ea192504ea49ff800a18ec718c424d269,2025-03-03T21:15:16.557000 -CVE-2025-1799,0,0,885514253a2ef413af13c0f4d7541e34ee68bb5983ada95bc369f7e5b92bbc17,2025-03-03T21:15:16.707000 -CVE-2025-1800,0,0,fd2fdd805fcc7bea784eb14326496de3bedc903088555e8e1ce34c3f56c59530,2025-03-05T03:15:09.160000 -CVE-2025-1801,0,0,a2a811c3bbd4e41c2b1f7fc15d1597e52583d9e67a8b01eb2f319fa5bd9e33e7,2025-03-03T15:15:16.500000 +CVE-2025-1786,0,1,ad5ad2cc482ea0e990ccfde4284bed8bd985e906e2b3d6d5c46c5b7aa325f660,2025-03-03T21:15:16.130000 +CVE-2025-1788,0,1,eea96ff8d7571aa32dee65283e84ed9282f70445eccb027f53ff2ff5b53af011,2025-03-03T21:15:16.263000 +CVE-2025-1791,0,1,b51ec6e3363933841ca9d89f35b1f043f0875f3be451d26be83ec61e44a02997,2025-03-03T21:15:16.433000 +CVE-2025-1795,0,1,733c5474719ba514128cb1d7a904c28895ad9709317e8c3f67851a90e83a7a8e,2025-02-28T21:15:27.570000 +CVE-2025-1797,0,1,21932d476b45bdfb45af7756ea9c313776c862e5d32503d17ac7b8ec47d6a277,2025-03-03T21:15:16.557000 +CVE-2025-1799,0,1,ecb0d3b56d4b323c7219f9a8afa0b58675a5a7b2283b2f8ba1e01ad7d5346823,2025-03-03T21:15:16.707000 +CVE-2025-1800,0,1,ccd6f4bbccefc45f48ec444e61873d1dbe21c83cff41f19d6933a1cac20729cd,2025-03-05T03:15:09.160000 +CVE-2025-1801,0,1,a6bebf279dfd13940c53ee57820f3d2385eb4821c64d6b780ee1162086e6c089,2025-03-03T15:15:16.500000 CVE-2025-1803,0,0,61b8ea959516cf458cfa0ea204219ee983e8adc2cba473f893652a1e07a05d40,2025-03-01T01:15:28.077000 CVE-2025-1804,0,0,d9a84f00fff83ba1b976e1f99e54d8d7bd9d32a10eeb71378628c4f7f3e82618,2025-03-07T20:15:37.550000 -CVE-2025-1806,0,0,3aac2324d3185a269e7ba125d7b3deac2ef84675cd1751db9514b86090757425,2025-03-03T21:15:17.103000 -CVE-2025-1807,0,0,54d4df5c6e5917a8e6301225da71138a49df62996289c880d666829ffbe07a14,2025-03-02T00:15:34.160000 -CVE-2025-1808,0,0,ccbcd3d15e61b95621e43a33482fa67ee5a5ca0ff16b92afa1467cfca7eaf417,2025-03-03T21:15:17.260000 -CVE-2025-1809,0,0,732f3eb03bc3fc5477e3c28525c960155ec0c6fae193539517a0ab932510c486,2025-03-03T21:15:17.397000 -CVE-2025-1810,0,0,7b7fd018a1234d97fa91c21371c506271aad4cc0950dcd0f0a9c6f8af741e73c,2025-03-03T22:15:37.280000 -CVE-2025-1811,0,0,08202dd0ccb40ab1c0e10bc0820a19c337cc1ad6cc5102d7e54e5451d537ccb7,2025-03-03T21:15:17.517000 -CVE-2025-1812,0,0,30720cb3a724812998817b9ecd44ba7c1b0bfd60997183f13e38834b0f3e5541,2025-03-03T21:15:17.640000 -CVE-2025-1813,0,0,9513648ae60fae2d0fe5d1f90f059c1f909bb1eb9b01e4162e62498c8da83893,2025-03-03T22:15:37.400000 -CVE-2025-1814,0,0,f32f303f45c0d5175642c5f837f279040d610ef80b5baab57e9f2806480cde1b,2025-03-02T11:15:10.133000 -CVE-2025-1815,0,0,e50a08e38aadf1270458dd9bb121cf5b9c66ce703305ff04db4b5c28c5daeb68,2025-03-03T21:15:17.830000 -CVE-2025-1816,0,0,dbbabc45a1be82f47993a39afe3b8746008e9afc4e1a9aaacf5fed4264d1cdbf,2025-03-03T20:15:44.383000 -CVE-2025-1817,0,0,53a1c022db594c0fa2028946293b7900fa2e6f7b105e1d2a1ae13104e4767d89,2025-03-03T22:15:37.520000 -CVE-2025-1818,0,0,3fdc4f98d24795dd58ad6b3ea90ad02dd95a4e1bd2ce8d95b66fe29313d3db2d,2025-03-03T20:15:44.530000 -CVE-2025-1819,0,0,b8077e9897a336636549b20cf9dc0e287a17bc30f636d2d56ac710cc82e6e8b0,2025-03-02T17:15:11.483000 -CVE-2025-1820,0,0,deecdbcda8290a07709ecec10effda2fc7d2f4a5c9a6836a753ee5af873fe0fc,2025-03-03T19:15:33.900000 -CVE-2025-1821,0,0,966c1dc7a296e11213c07a3d4591152c64ca74e072d59403764622388fb7ca4d,2025-03-03T19:15:34.030000 -CVE-2025-1829,0,0,fde8c132aea7b0381baf40fb45deb0fda4ca046d0a6be0cd0198b49b4d2a0189,2025-03-03T18:15:31.937000 -CVE-2025-1830,0,0,ff0389204894edddb6b225ac592aaed63f7e67efafec35fec1203efe16b7cdba,2025-03-03T22:15:37.637000 -CVE-2025-1831,0,0,dedf0ae51363b8d3ed1c865993f4e92f8fcbae9a0264890a31526f1cf08aecec,2025-03-03T18:15:32.520000 -CVE-2025-1832,0,0,629dbdcf5550d5557538ee06a7ac8f727a167d99ca32f116db8fc1cbc6bc3943,2025-03-03T18:15:32.950000 -CVE-2025-1833,0,0,412c4506bdf3d53653b4205b23dc52fa25efa7a9f0ddc11e86618e846c0dd94b,2025-03-03T18:15:33.763000 -CVE-2025-1834,0,0,fc0c44e2a8dc23791dadf2c051e188ee06bbfce030b36e8d57cd12aaa0e0e0a7,2025-03-03T20:15:44.740000 -CVE-2025-1835,0,0,778344fc1cddfc35a2a3668a283f4fead3623f5450a1861863d465f6c3582d94,2025-03-03T20:15:44.867000 -CVE-2025-1836,0,0,13bb65ca0c6e5a0d08d48c52a2ee2cb91592f3886044f600fe193534f47d51c6,2025-03-02T23:15:10.993000 -CVE-2025-1840,0,0,8aab70aee482a86071c635ee919c7e5d8950c48a5a8239f8826f40c11e72f0b8,2025-03-03T20:15:45.073000 -CVE-2025-1841,0,0,483c23095397d904531e2f8213ce4c2044b21c90ae077a0a2311dabc23d07e32,2025-03-03T20:15:45.197000 -CVE-2025-1842,0,0,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000 -CVE-2025-1843,0,0,952309a902e5f1ef5af6384d2fedc20e363b2d346a8c7b0b378ee7b767fbe968,2025-03-03T18:15:34.290000 -CVE-2025-1844,0,0,36733d3ad467e74040d2298fc997773dc4b826b85e011a14f94c3f5f7b4b2d14,2025-03-03T18:15:34.773000 -CVE-2025-1845,0,0,c92853bfb71ea4fa8e4a4fc1f4b9baa88ef35e5426053983652151fd7bce795b,2025-03-03T18:15:35.840000 -CVE-2025-1846,0,0,51092600573c3bda80c700b6a8ea887629c09c0e03ae4b0ac2064388b0613b3a,2025-03-03T18:15:36.340000 -CVE-2025-1847,0,0,46fdf146f62263a0167fe919bb397b4120a8e8de268127eff305761e90fec00a,2025-03-03T18:15:36.537000 -CVE-2025-1848,0,0,4304128e930dad5c3b8b7258c342acdb2748223c34186c8f98d95ba3006e543a,2025-03-03T18:15:36.720000 -CVE-2025-1849,0,0,f2258c853087c6840804e3a02ab7b6509c32174f759f6aa5b93be0056910680f,2025-03-03T18:15:36.893000 -CVE-2025-1850,0,0,ed2d993fc975f386b8fad0f239bbd09bd774a741a5c53a4b455fd831639e33a1,2025-03-03T18:15:37.077000 -CVE-2025-1851,0,0,f8420159a375356cdfd200ff3bd53ab2168d0b711b6e47bfeb1f78dbe8d34bc6,2025-03-03T18:15:37.277000 -CVE-2025-1852,0,0,368f0d9bdf8de44077e6f73fd13ce719918d7cf971eb7381c563106693af6c20,2025-03-03T18:15:37.447000 -CVE-2025-1853,0,0,1ca7b3f52c25c3fc5fa57ff0b3fdcd1cc5bcf593f896e1516be8778f7214bfba,2025-03-03T06:15:21.697000 -CVE-2025-1854,0,0,807272fc1faf394020bd02f44d1204a0d3e08b77045a8805f11576c69ec3afca,2025-03-03T07:15:35.030000 -CVE-2025-1855,0,0,3e9f8b558ac6552e8526a9c2fbaf0089e976661b34f06258bdcdb5078af97e9f,2025-03-03T07:15:35.277000 -CVE-2025-1856,0,0,58e10d6310d6a4f926500637cd981991f15a8c8166565755e79475990347bf0a,2025-03-03T08:15:16.303000 -CVE-2025-1857,0,0,b91c7d6358a703ad5510a09be0b8927b11845424ecd31d685ddde03f87d3600c,2025-03-03T08:15:16.823000 -CVE-2025-1858,0,0,13250cb27b85ee9301624b410ac1ebc87a8eb2cb3d392c26d533013f6e6e4870,2025-03-03T09:15:38.857000 -CVE-2025-1859,0,0,cec2bbe4b5d2e118568321075753819d0891b3b13ef499b00197d73217154000,2025-03-03T09:15:39.037000 -CVE-2025-1864,0,0,5dcde85bed1ed1221f07f6484eca3855203db58c6f1815d82cefcaf7b5c07293,2025-03-03T09:15:39.210000 -CVE-2025-1866,0,0,d0afd76161369e92718a3d901fc0c2664a4a6cd4b550406fdc5521568f9355a3,2025-03-03T09:15:39.370000 -CVE-2025-1867,0,0,8e365b83cef7b7a5f391f2005dcb9922258f062cedfa81b30500ba43743068fa,2025-03-03T09:15:39.520000 -CVE-2025-1868,0,0,458001b298730476004eac6d19a8af50c907ad4cd889604956695720bc492f98,2025-03-03T12:15:34.610000 +CVE-2025-1806,0,1,912413ec1862655f80c0924ce2f29f25f2ff7976c05332199dd89fb175bd2feb,2025-03-03T21:15:17.103000 +CVE-2025-1807,0,1,3afd0e9e5fa3a96d48ea1fa23c1b9dbef69b91fe93dbbdd3e6826fba11afe752,2025-03-02T00:15:34.160000 +CVE-2025-1808,0,1,e7598b7f8580190f908b3118b5c0d79761365b9d99dd376ca7955b674e589d3f,2025-03-03T21:15:17.260000 +CVE-2025-1809,0,1,0e051d8eda56035c04f32be51a96c16adce266a6be0493dc65b33d1bbb6b23ae,2025-03-03T21:15:17.397000 +CVE-2025-1810,0,1,5f1c16444374fb3ece0458b6736f8ec3c4daa432684a2200a8e31c80b7e6e99c,2025-03-03T22:15:37.280000 +CVE-2025-1811,0,1,857715adea2e0e1d71f608745fa6268cd41061918ed8a5823a90033505937a29,2025-03-03T21:15:17.517000 +CVE-2025-1812,0,1,f7a3e49379eac60e976b6a98b47fefc1910883904e4ef01992d36eb7fd2f53c4,2025-03-03T21:15:17.640000 +CVE-2025-1813,0,1,0ccc1df866acf56ff6c5b733815ab4efd276bfa9d53ad19f31e98850ad0b4fea,2025-03-03T22:15:37.400000 +CVE-2025-1814,0,1,7e65ae0884d753b0489aef3c4fb7062113acbddf5a5c51c43e7a8ad4565bdf55,2025-03-02T11:15:10.133000 +CVE-2025-1815,0,1,cb8516a4bd1acad3269d8ebad1c2d004a0689886e960eaa6015183a95860e2a0,2025-03-03T21:15:17.830000 +CVE-2025-1816,0,1,f4578693941cf8da5298d82df5830cba65a548f716ea6b502c4092ab08cafc73,2025-03-03T20:15:44.383000 +CVE-2025-1817,0,1,5b085351aea3e67a9ec2334e328f827eefdd51e76e4d700b4c0ae480052f0445,2025-03-03T22:15:37.520000 +CVE-2025-1818,0,1,37447926f9841734f2812c1740f60067b78922f1e49cdd900fb1888b830ace99,2025-03-03T20:15:44.530000 +CVE-2025-1819,0,1,30aaf321bf598a632d335efe867dfbf1c954d81c19dbf59077d00052427f6e82,2025-03-02T17:15:11.483000 +CVE-2025-1820,0,1,de7c6baac78093b7f0e7c2343af2d32bf8e1894ea47cf7930dd387f103a53ed8,2025-03-03T19:15:33.900000 +CVE-2025-1821,0,1,b3349008b31943d36983f65c5b6d573a651ca8d675ec056cb33951299f02ed59,2025-03-03T19:15:34.030000 +CVE-2025-1829,0,1,cdfa3e67c0c277a6177da9bd34f08d7ed678dd9267ec9b77fb630e0d887cc4f0,2025-03-03T18:15:31.937000 +CVE-2025-1830,0,1,b7d520c7dab1ad06ab8077ecd612df524f731c0cd8662ed0f43d61b14b168f12,2025-03-03T22:15:37.637000 +CVE-2025-1831,0,1,df633658ed50bfe4aae872b54c5326e5accc4a7746409c9cf665f4b4ab647254,2025-03-03T18:15:32.520000 +CVE-2025-1832,0,1,2cda7aab2e0a4e2691e36d9c66c6b6d46de601c4f3bd0034cdf55df659119f88,2025-03-03T18:15:32.950000 +CVE-2025-1833,0,1,a9d0cbabff71e7e9ef5d9bc0529ede3be006be7fde961ae12c41920332ce689c,2025-03-03T18:15:33.763000 +CVE-2025-1834,0,1,f820bda20e1e7a1fb2fbc97f90cb666c20906496299f828ebe420513fa79aedf,2025-03-03T20:15:44.740000 +CVE-2025-1835,0,1,aee1b4a486da841c7db8143deed10ae556bf311d96bdf0dba2c0ead166fcb14b,2025-03-03T20:15:44.867000 +CVE-2025-1836,0,1,e55d8c1ad6c532ca23d15111c1e742b84846f7f3c67ac8b9d72b2a3b7fffafce,2025-03-02T23:15:10.993000 +CVE-2025-1840,0,1,b4438c2b4152145fea4bcfacbb830c193fec082648ecc39928100b759a441887,2025-03-03T20:15:45.073000 +CVE-2025-1841,0,1,a640ad368332bd3d3cbc149a3607fb3cceca241dd6d59a119c0d42ff0d2ac1df,2025-03-03T20:15:45.197000 +CVE-2025-1842,0,1,7ccd0ad08d0d8734df889044267fd3c6cfe4c03c4a27d4282f875e8799119511,2025-03-03T01:15:10.023000 +CVE-2025-1843,0,1,b6acf8256986f4d81d9dc0aa341dcd2b222099446bdc75e0a94764752196a841,2025-03-03T18:15:34.290000 +CVE-2025-1844,0,1,cec694288415482dec9f95dfc4b5c7a4280d5f97c869a182b151433c316fc8b7,2025-03-03T18:15:34.773000 +CVE-2025-1845,0,1,10100bfc9b1433fdb7baaa3165f0834cc1a1038ef412240e37525404914cfcd6,2025-03-03T18:15:35.840000 +CVE-2025-1846,0,1,a62b0ed535e2a5232c3635ce6629b88ae8acc4efef341d1b110161b231ec1b64,2025-03-03T18:15:36.340000 +CVE-2025-1847,0,1,ec0e6a8320e426514c9188308ee4e761c20c9a2d723bf22132b181d1278bf01f,2025-03-03T18:15:36.537000 +CVE-2025-1848,0,1,5ab5fd2d0b5fa78c5a97d7cfd5adf624e7bd356e62a20add19ac1bed4fd36c3c,2025-03-03T18:15:36.720000 +CVE-2025-1849,0,1,6cbdc0c1a27398724a4a1e8bdcd861e48e0b12f2e0ceb284ec86f592081f9271,2025-03-03T18:15:36.893000 +CVE-2025-1850,0,1,b532501daa12d56997d0a0fcd39817da6330c515cd24886d5c1adf9b1fc2d476,2025-03-03T18:15:37.077000 +CVE-2025-1851,0,1,21bb6ce5ae51442f18eb0cd84c8788b0eb252ebb94f0d62e136bbc46266f0de7,2025-03-03T18:15:37.277000 +CVE-2025-1852,0,1,4f38d679a1dd3c1fb650831fd6750652564237abe1322f266f658a0ff1fc2b59,2025-03-03T18:15:37.447000 +CVE-2025-1853,0,1,44fac29d6de6cf81aea5ccebbd273ac3e066118b8b5c8bde906d2e59e415afbd,2025-03-03T06:15:21.697000 +CVE-2025-1854,0,1,3fa7ed33d66eec62bd1a346c1e199dbe216908f1cd4f380289da002758300100,2025-03-03T07:15:35.030000 +CVE-2025-1855,0,1,1cf630f5ab9f3b96d91861473ab53eb3bff534fe9a9749fd6e561c08caf5ac26,2025-03-03T07:15:35.277000 +CVE-2025-1856,0,1,b1ac28470f3f43f9bc8e0058382bf2f5bdf4a3a8af762c9efcf71661baee04a2,2025-03-03T08:15:16.303000 +CVE-2025-1857,0,1,818488625417d8af4a65dda3d70be6b5611a94debd81aafcadaaa8f15a86f4fe,2025-03-03T08:15:16.823000 +CVE-2025-1858,0,1,d219d72b5d3e367e984fc9a00844c02aab063afaf214c90b6e3c689da36b22a1,2025-03-03T09:15:38.857000 +CVE-2025-1859,0,1,270c3e0b7102a7be6bcb05220dff2051f7a3ec0c2f795d1caadee66d4fc343a4,2025-03-03T09:15:39.037000 +CVE-2025-1864,0,1,c92fc87cd84b99acae49e648c1289b46612421f948d2c6533ab7724af225a718,2025-03-03T09:15:39.210000 +CVE-2025-1866,0,1,6d645070e86ae70b91e6d45d95a260c1e9eb1ae7937ef173d0ea19de235adb52,2025-03-03T09:15:39.370000 +CVE-2025-1867,0,1,a65a0cea20f97468944d29f6ba9795de8029e0ca08dd1a9572fb100876a713fb,2025-03-03T09:15:39.520000 +CVE-2025-1868,0,1,1341a4358a058625d7ea533efb329813ebece09f52451fda18abf15262969adb,2025-03-03T12:15:34.610000 CVE-2025-1869,0,0,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000 CVE-2025-1870,0,0,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000 CVE-2025-1871,0,0,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000 @@ -281211,33 +281211,33 @@ CVE-2025-1872,0,0,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae8 CVE-2025-1873,0,0,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000 CVE-2025-1874,0,0,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000 CVE-2025-1875,0,0,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000 -CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000 -CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000 +CVE-2025-1876,0,1,9c59ab81fca4784c8c0c5e2a68637a618286832255466c3fc0aff08d3457946f,2025-03-04T17:15:14.313000 +CVE-2025-1877,0,1,7ec42c6ebfa10ae4f90a0022ece32e0b4be1b29cd4fdb60f2dfbe914c19c721f,2025-03-06T12:21:35.360000 CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000 CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9ad,2025-03-05T14:05:15.387000 CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000 CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000 -CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000 -CVE-2025-1886,0,0,f0a38ebe50c8aa5bac13ea6f6283c328a91bfe4ed7648ad3a2350cb502c7b0ef,2025-03-07T11:15:15.843000 -CVE-2025-1887,0,0,ec3f27fd0c1634c1d00f398d1c606eb23ec655b93967f5a0ddee0891a891f50a,2025-03-07T11:15:16.040000 +CVE-2025-1882,0,1,ebf4f5ae8bb5c249aabef6e1ac11f207a28b8ccb8ec27be5c803a46e24cf81da,2025-03-05T14:05:15.387000 +CVE-2025-1886,0,1,bebd8cccb1caa8ae74819e15983130e90d3c9c66b4200706c90e106dec502309,2025-03-07T11:15:15.843000 +CVE-2025-1887,0,1,e5814b5c5c26330a8b5ab32534d24c81f4e735885967aeac5ee04647239b09b9,2025-03-07T11:15:16.040000 CVE-2025-1889,0,0,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000 -CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000 +CVE-2025-1890,0,1,5616aba635a75972d09fe386045f2bfecc4c71e084a83b91abd60faddd9d9f99,2025-03-05T14:05:15.387000 CVE-2025-1891,0,0,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000 -CVE-2025-1892,0,0,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000 -CVE-2025-1893,0,0,b2d203b613f27dbac4f37dcede36fc006d1bdec55036de6db0319aba9208eaa8,2025-03-06T12:21:35.360000 -CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000 -CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000 -CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 -CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000 -CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000 -CVE-2025-1899,0,0,a77691b4c448ef2bbbe9d4136b221ec0c7528d9c510c1bc782c445389d323e3c,2025-03-05T18:47:21.313000 -CVE-2025-1900,0,0,2bb4415842bd144755e10d37e7bdda984b10b0e407943e93eb4e77d1b80545fa,2025-03-06T12:21:35.360000 -CVE-2025-1901,0,0,39502d1ad733af26c8353312629d13298f6f85261490cede3884982e164f6103,2025-03-06T12:21:35.360000 -CVE-2025-1902,0,0,6642b45a5b9d0157dbcbfe7ed8407322ac885c09e239452506eca1dd8061d1d4,2025-03-06T12:21:35.360000 +CVE-2025-1892,0,1,8269a3412b29b0f2252aa04f9047efb09811a98d79ffef88a772f0a1a64183dc,2025-03-05T20:16:46.363000 +CVE-2025-1893,0,1,0c154db2f84220a343e13e8e6469bd76f879640e2b182da24577f73502a5b7ae,2025-03-06T12:21:35.360000 +CVE-2025-1894,0,1,acf83d695fef09558382e74ce49a37a4e77f887a2dee2b6e74470b345ce923e1,2025-03-05T15:18:38.660000 +CVE-2025-1895,0,1,974df0177e26370b050e51066f677d4cbf5e8aee8df74419465335a54a993e91,2025-03-05T15:18:38.660000 +CVE-2025-1896,0,1,cb3ef0e9c35486fc4945038f865523a5464139eaa0f5c9036b760ef3b2a57244,2025-03-05T16:39:15.917000 +CVE-2025-1897,0,1,449accc1a933e90d65ac728d536b96d8887715e707f9172861fe9f13b0ee64df,2025-03-05T16:39:15.917000 +CVE-2025-1898,0,1,3e98ca474231291a12f5251615b9ad685a371ffeb4c9e7a19c2f4f3cbe606d6b,2025-03-05T16:39:15.917000 +CVE-2025-1899,0,1,4af119b02d312f950428f343b8e6f3f0e115081e4e1104b58ed8dc9552f6783e,2025-03-05T18:47:21.313000 +CVE-2025-1900,0,1,7b258ba3dd25d8b3fd17a82ed7803bc3bda6d5da95c4c711d37581824ae9aba1,2025-03-06T12:21:35.360000 +CVE-2025-1901,0,1,9bae34810c5aaf43a82ead4197c721a0b0eabce119d8082b4f49fdef7d223400,2025-03-06T12:21:35.360000 +CVE-2025-1902,0,1,fb0a6cae5ec83e32b579bb070e6825febdaddd795d446cacdd6d844b04deb200,2025-03-06T12:21:35.360000 CVE-2025-1903,0,0,c97c725b330640c2eb326cf708d9cdba957f8bee8128cf210d90507df4f160cd,2025-03-06T12:21:35.360000 CVE-2025-1904,0,0,5982f191697594854129a95e84a87d047a15fabc77030ebb45046f4ce2b93e2a,2025-03-06T12:17:33.710000 -CVE-2025-1905,0,0,f6cb8f547b222722f8a05ade71066d34df308515521c260f6830f7a0901183d4,2025-03-06T12:17:33.710000 -CVE-2025-1906,0,0,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000 +CVE-2025-1905,0,1,451783af8acabcb7c118bb5fc74f91645793e68ee8779bf983f2c675a12040fb,2025-03-06T12:17:33.710000 +CVE-2025-1906,0,1,65ab148f432035293be1efb832dae7571324b8a828cf0fdfe674a2e53e3a4578,2025-03-04T15:15:24.233000 CVE-2025-1914,0,0,26644d87f7ea78754e61afdf88af3b53e637cc322d9c410d45452411107b6199,2025-03-05T15:15:15.560000 CVE-2025-1915,0,0,87990d884ed6a1cf9c53cbb9074aeaf50ed7455c17bcda3f0fc14c8f3723c450,2025-03-05T15:15:15.743000 CVE-2025-1916,0,0,62cbf7d0baf3b65340e1dd71d636637dffa9fe88a30cf5f1b31df7c201565e56,2025-03-05T15:15:15.900000 @@ -281247,73 +281247,73 @@ CVE-2025-1919,0,0,fdbf01b21cd0a0a7341c004e74c5a0f8896d5fa9b9090a1373c391c776ac09 CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca5e,2025-03-05T15:15:16.537000 CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 -CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 +CVE-2025-1925,0,1,89ec5e399eff8562ba7e03e6894b43f8413799ce819ad10dde1cb15895d5ace1,2025-03-04T14:15:36.717000 CVE-2025-1930,0,0,e0eeca60a40599b41d4e2503f5a7e0f6e6ab961d2b56420baaf24ed1ff9b0d96,2025-03-05T17:15:13.583000 -CVE-2025-1931,0,0,b5e38c0da3bd8580a8ad8790659a66faed6e8c8f7d9210cfe046349c16f0890a,2025-03-05T00:15:36.227000 -CVE-2025-1932,0,0,3b32c1102832d0715d404745294706e7b7d7e3b874c1ef4c9ed7f047a9dcc442,2025-03-05T00:15:36.320000 -CVE-2025-1933,0,0,04dc26cfd0f75d21b5341faee8a41387b97852f82dfb1cd03c11f7e09550a4b7,2025-03-05T00:15:36.470000 -CVE-2025-1934,0,0,cd5eff38b24f1fa502035f9e79330314aca9fb79b8724cccecf4d68784b92f14,2025-03-05T00:15:36.617000 -CVE-2025-1935,0,0,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997f4,2025-03-05T00:15:36.770000 -CVE-2025-1936,0,0,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000 -CVE-2025-1937,0,0,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000 -CVE-2025-1938,0,0,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000 +CVE-2025-1931,0,1,f3d2bb31d03f02113b6a4ed220650cd525ede36c0527a7d65dba0bfc00331a6b,2025-03-05T00:15:36.227000 +CVE-2025-1932,0,1,7d5e9706440df74109c0e84082a12ded8a21dcc94be932d0427a55e38803d4ce,2025-03-05T00:15:36.320000 +CVE-2025-1933,0,1,3e5005e8a9c650ec4f2f811a22521c8ad0490eb69bc64f511f300de34c9c44d4,2025-03-05T00:15:36.470000 +CVE-2025-1934,0,1,62d5877cb0a6bc1c29a9ae6dc05c446ff5aa98cc30731b480267f540b52e058d,2025-03-05T00:15:36.617000 +CVE-2025-1935,0,1,f5c41a093a13f86f7817460f81aad5f90e557b8b8cedf9cda6848a41a28cc99c,2025-03-05T00:15:36.770000 +CVE-2025-1936,0,1,5aeb3954667ffde00751af15da91ac949e3b09e154211a4ee43408b06f4ab0ea,2025-03-05T00:15:36.913000 +CVE-2025-1937,0,1,a6b3c24a6de45af4378bf960f2cc01b66f16d07b2cb1aecb2232b9413c558b72,2025-03-05T00:15:37.010000 +CVE-2025-1938,0,1,a3d2c5e41b6927e626441d453303cede8a435a27378e2cbc19add8fd6b6df97b,2025-03-05T00:15:37.097000 CVE-2025-1939,0,0,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000 -CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 -CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 -CVE-2025-1942,0,0,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000 +CVE-2025-1940,0,1,3afeb38944a20fc07b896bfe1f1ad2c69e4bbbb599fa0f218233eafca8c83765,2025-03-04T16:15:38.310000 +CVE-2025-1941,0,1,77bb28988fb79932cc7a6d25527281bccd5e2df757d0288a237c300de86f223d,2025-03-04T16:15:38.457000 +CVE-2025-1942,0,1,299e196feae52175634c3230dd9f286f74b073667bc01e303b39d6ba3984f83f,2025-03-05T00:15:37.247000 CVE-2025-1943,0,0,93769e7b2931514f0c8b90f2e9734aa6535ce40ff2146635c764b984a51ce726,2025-03-05T00:15:37.400000 -CVE-2025-1946,0,0,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000 -CVE-2025-1947,0,0,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000 -CVE-2025-1949,0,0,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000 -CVE-2025-1952,0,0,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f438a,2025-03-04T20:15:37.533000 -CVE-2025-1953,0,0,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000 -CVE-2025-1954,0,0,3f34d4e968cd36d80c9294c76386f7fccfdd6b744481da9a458dbc8dc7f57722,2025-03-04T21:15:12.750000 -CVE-2025-1955,0,0,37a5842ab02dcbdf807bbf6b0629cfaa7bc44f4f542caddab49f2045e2592b24,2025-03-04T21:15:12.940000 +CVE-2025-1946,0,1,0de17715782358449ec68a782d98dcc69ef152eac8394041a60b56a2fa8f0187,2025-03-04T19:15:37.583000 +CVE-2025-1947,0,1,73c8778878afaeb22edb06443b6c16c3391f0a9c85f0e77f77cc3c8b1b4eedf7,2025-03-04T19:15:37.760000 +CVE-2025-1949,0,1,c8d2667ece9c458e6c08d32deed78599dc8198a4c183e23797d5a5fbed3c959f,2025-03-04T20:15:37.410000 +CVE-2025-1952,0,1,8045aba2e1b12d022759d218039fc392e8f13f29f66dd62b78e3ffdbd275d56e,2025-03-04T20:15:37.533000 +CVE-2025-1953,0,1,a0bc36ba62b0b06716079649b0fdc46bcfb04fb4099ccef53c3d36507d964740,2025-03-04T20:15:37.657000 +CVE-2025-1954,0,1,7850a02af1ddb9cc3d8cd18fe4e2d9012029e9dca679a321cc516d8eb98cda2b,2025-03-04T21:15:12.750000 +CVE-2025-1955,0,1,669507c4db01e79fd9bbe6989a0a3403193361f3e5e8fa01c70799e759983413,2025-03-04T21:15:12.940000 CVE-2025-1956,0,0,f0a904af2ab36cc78e6f3ccc8c53add0b2dee0e784cd212da1dec839459a2817,2025-03-05T17:15:13.737000 CVE-2025-1957,0,0,b2496b85ba41c4ab1b02cd0cc0fb17abfffe8fc3453c13480490893f07df6d0d,2025-03-05T17:15:13.860000 -CVE-2025-1958,0,0,a6ea7a774774a955bd844f163cea508be42ab5b7c91820027ccf4422256f7ae3,2025-03-05T17:15:13.980000 +CVE-2025-1958,0,1,2ce851c02da627fdfc7f14b2f1b2ec5de2a45d5eb8618bab14aaa7637f67dae7,2025-03-05T17:15:13.980000 CVE-2025-1959,0,0,903168fc67c7c5275c7c2870d1ac319422187d69065abf239ddb565e47d12776,2025-03-05T17:15:14.100000 -CVE-2025-1961,0,0,bca97fcfdd845552ca69481196a8059555d85ff9de4d132aae90bef8f0351f80,2025-03-05T17:15:14.220000 -CVE-2025-1962,0,0,710aa406891e8653130d6958a046896a88ec2343aa771ea2ce2bf76c55db1d00,2025-03-05T17:15:14.337000 -CVE-2025-1963,0,0,e716dc9db11e4c1f600581dc5831d63020e89d0b334c585d4ffe68d4995bcc15,2025-03-05T16:15:37.307000 -CVE-2025-1964,0,0,07710436d9e737e6da480fa71767564d9bba5024aeb8fd1d210868a19af62be9,2025-03-05T01:15:10.020000 +CVE-2025-1961,0,1,816aa718a0ef1e6a95486dacaaf57ab9e02d6e3cdb0f959f5654a889fdeed2f9,2025-03-05T17:15:14.220000 +CVE-2025-1962,0,1,6fbabae6bef955a0f585e8ce4e5664a98fb92c445b5dafd2bff8834f435dc890,2025-03-05T17:15:14.337000 +CVE-2025-1963,0,1,865639584983e0df7a00e519679395bdea70add5f3bff535cbdc61cbf3296bd1,2025-03-05T16:15:37.307000 +CVE-2025-1964,0,1,bcef87c58b68ec5ca28c518df4e6e1b934969feb9d4d5e8acb5f56e6fc408e7d,2025-03-05T01:15:10.020000 CVE-2025-1965,0,0,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b78855204,2025-03-05T15:15:17.107000 CVE-2025-1966,0,0,6ccd782fa14c79bfb085da504344a1de6f9901dce1ffefcf87ba1c9f56a60487,2025-03-05T15:15:17.260000 -CVE-2025-1967,0,0,42e655fe49f6762d0d9e1e0fe0e87e8caffe391f86ae92c278c36c149b534595,2025-03-05T15:15:17.410000 -CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 +CVE-2025-1967,0,1,37ef6ee5daab67cef78e39409d5a4af89028c0c027dc29d14f4d4c29694f8c5c,2025-03-05T15:15:17.410000 +CVE-2025-1969,0,1,1328a17fcef13e3f7c739c1a0ee8c221ba5eb1bbd63c3ffa42284acc83661832,2025-03-04T19:15:38.290000 CVE-2025-1979,0,0,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000 -CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 -CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 +CVE-2025-20002,0,1,83af4d7c8d248743227569634040cdf61d921b36110cc72523762157833f7339,2025-03-05T00:15:37.910000 +CVE-2025-20011,0,1,02e748d5ab9b04e037fb7d7fc747247640974b2f8f897d97b664a1d3813bbc00,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000 CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000 -CVE-2025-2003,0,0,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000 +CVE-2025-2003,0,1,0fec70e78315dc78063e0f700c356baf74c7b1ddc553823eee42252103d587dc,2025-03-05T20:16:06.380000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000 CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000 -CVE-2025-20049,0,0,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000 +CVE-2025-20049,0,1,5147cf342586e050754516438965bcd2818b726f9780fae2382ab9e034df3bfc,2025-02-28T17:15:16.277000 CVE-2025-20051,0,0,f5960a6a14861956075cfae09439ba801517edcedfe4aa263146ae0b9ad313be,2025-02-24T08:15:10.087000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,a2ea91888888075f752b50af5aee3c115e146a56d4937cf3383a107d5b150fd6,2025-02-05T18:15:29.943000 CVE-2025-20059,0,0,c1084330f3b962fb98956ad8984d49c0102f6bb9f804c9bde4130df15f4fe94b,2025-02-20T15:15:13.957000 -CVE-2025-20060,0,0,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5bbf,2025-02-28T17:15:16.440000 +CVE-2025-20060,0,1,ef26af373b8c1500801575569870314eee69d6fc265fd3cd0ef2de4362a965d5,2025-02-28T17:15:16.440000 CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68bfc3,2025-02-18T00:15:21.107000 CVE-2025-20081,0,0,5ed57b6d9702389a4c481cb0e2de09aaa2b16ad08213a3133d046dfff5a5061a,2025-03-04T19:08:18.957000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 -CVE-2025-20091,0,0,b9d1dce1ed45549e77916a09d472eab7dad5c2ee97791200be71edbb8dfee1dd,2025-03-04T04:15:13.253000 +CVE-2025-20091,0,1,0e217884eda9db3c13ec29347078f93c70b4e3c8dd8750523b88ae7977a65af5,2025-03-04T17:41:14.237000 CVE-2025-20094,0,0,cc9826181bf1f83e2cac160833fefdc5cca091c7fe9a0c6abd476a3468c0bc65,2025-02-06T08:15:29.837000 CVE-2025-20097,0,0,44f65a5475190446e165a44597504f8f11f3d766148b58ad519cc1d02d7b02f9,2025-02-12T22:15:41.850000 -CVE-2025-20111,0,0,b7e309cf82d57f91e316b45a9e015a8043e3dd714b1d240577557215ada70862,2025-02-26T17:15:22.240000 -CVE-2025-20116,0,0,8c6300d2d990122a7ef10387053ffdeec283c886545b27e681ea6cb020a1204c,2025-02-26T17:15:22.403000 -CVE-2025-20117,0,0,c3493efa24f0b35e9b92e642c7480955777f16e73cba96209271487cc2633724,2025-02-26T17:15:22.567000 -CVE-2025-20118,0,0,fd45ebcd6e66444c81c1cd18dabca2025b46a33b40891450355c4d2ffd3c588d,2025-02-26T18:15:14.353000 -CVE-2025-20119,0,0,4f3311dcb2ead23afa7e7ecba604bc892d3c6195e1bd3ac01a1861301d77c317,2025-02-26T18:15:14.570000 +CVE-2025-20111,0,1,6391ddcc468022bb5b0876cd963ba13857ff5b6053a32d09804ada2b33e51a96,2025-02-26T17:15:22.240000 +CVE-2025-20116,0,1,e4cdee04c63ba8b30e4d110a057a94f13fab9101bf1e187e91d3f4a6d2b10028,2025-02-26T17:15:22.403000 +CVE-2025-20117,0,1,2053053b56b8f1aa0d0acba098fb798db7a7270aa19587e8ca443ec37048b70e,2025-02-26T17:15:22.567000 +CVE-2025-20118,0,1,46ee44de51b9da02bd8d432dfa199efdea3d4009128ccc31daf3be958d7ba228,2025-02-26T18:15:14.353000 +CVE-2025-20119,0,1,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 CVE-2025-20124,0,0,3b222e4debebf19647313be14570cd157d1c9b474f2f1fb6db3f2d02720f9909,2025-02-05T17:15:22.457000 CVE-2025-20125,0,0,4c965c93b17f55e1ee6990c432e90b6f767d7217d5ca1f99810949fadd043cf7,2025-02-05T17:15:22.610000 @@ -281322,7 +281322,7 @@ CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb50730 CVE-2025-20153,0,0,098e687a2fdeac65358a6c699600d0f5e3c1f5b2fbaf0064e89b7cfb7a04e1de,2025-02-19T16:15:40.860000 CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 CVE-2025-20158,0,0,c927026648bc86ce92405c3e7af8f648a782a73264b5a45f04f488b108d75474,2025-02-19T16:15:41.017000 -CVE-2025-20161,0,0,49312577e6b7c26e5152716de865e5258f5df0c1e1c3a3799d578154f18c701c,2025-02-26T17:15:23.053000 +CVE-2025-20161,0,1,bf8e449c68d51cf7b65f2f4b9fa306d0a30db4fed258121e641b0088c9f03857,2025-02-26T17:15:23.053000 CVE-2025-20165,0,0,9f7b026247b5eae4a58783714ebe8eb2d48f865473657f5e720d75dccad8e306,2025-02-18T20:15:25.050000 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 @@ -281342,28 +281342,28 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-20204,0,0,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000 CVE-2025-20205,0,0,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000 -CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb36866f3,2025-03-05T17:15:14.450000 +CVE-2025-20206,0,1,7eac930456211ecb1f572a07a1300be3925df6e2f8f44c27a0138351d2481c69,2025-03-05T17:15:14.450000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 -CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 +CVE-2025-20208,0,1,1dba31708947f0b7dca30112bb6add1340ccdac1898cf64bb899cff2c905f6ab,2025-03-05T17:15:14.610000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 CVE-2025-2024,0,0,75cfaab8b65dff5d975a0b56e229eaec536c96c4441c3d1fb60716f5d1f62b9c,2025-03-07T20:15:39.023000 -CVE-2025-2029,0,0,93023c22912987564123e39309d24758527c12f0e9ccb8c0c3ff604f1965ea96,2025-03-06T15:15:17.943000 -CVE-2025-2030,0,0,45c9009752edf05edc8391d031a81451ba0bee5f88f8e7315cd270279d6ba239,2025-03-06T16:15:55.593000 -CVE-2025-2031,0,0,5d7168f995fac2cab500af0410060e80ff271f06a0fc111270c45267a1b51cb4,2025-03-06T17:15:24.153000 -CVE-2025-2032,0,0,87651d4114c21c653ae66312bcfd16b6cc53059907a14bac1fe2bfc7cef78ab9,2025-03-06T17:15:24.297000 +CVE-2025-2029,0,1,9912e19fe47f7d188961387a6c0b865a7aecf5ff404ea1967730181d7c80ca4f,2025-03-06T15:15:17.943000 +CVE-2025-2030,0,1,9d3ca014c2cbdd0f3fee5987738ba77f6ec67b576eca6b9c42c160b2be0231a4,2025-03-06T16:15:55.593000 +CVE-2025-2031,0,1,dce624b010eeacc43b1e4cf156805ac2bc0f212d05221d32ac1dc4cbb4ae0e23,2025-03-06T17:15:24.153000 +CVE-2025-2032,0,1,5ed73860b2dfdd2b63a0278ec4bf58bd501d5a253672f34c06d7e31cb25d6a0b,2025-03-06T17:15:24.297000 CVE-2025-2033,0,0,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000 -CVE-2025-2034,0,0,7e09b40d8d5a9b9e58f6982b85a86c374e9be1daceb370522cd6b32725c7f889,2025-03-06T18:15:43.230000 -CVE-2025-2035,0,0,b0efa60056ad785ecb86b50f239ca2d1bd151941c88e0523d6aaad336bc0b51b,2025-03-06T18:15:43.457000 -CVE-2025-2036,0,0,f3489ea667e662fab3178088dd832969cc1b9422b6a3b1239d861788bf10172a,2025-03-06T19:15:28.373000 -CVE-2025-2037,0,0,b92bcfa0abb7e17a83db53e791d9663e4edd62b805978b3db76a293acfdf1d1c,2025-03-06T19:15:28.540000 -CVE-2025-2038,0,0,2271724b1f005285850f3f1195201d86cca4f380c3c280127fe4a8a63bef7f51,2025-03-06T20:15:38.583000 -CVE-2025-2039,0,0,0c70a175e47b2d67392cc26ee1e5102912074eb08bc629dae498524f54077aa8,2025-03-06T20:15:38.753000 -CVE-2025-2040,0,0,62465f73ef399ccbd582deb5961c1f9a6ef4e9fe1de22af0c2a399f13fca6466,2025-03-06T20:15:38.920000 -CVE-2025-2041,0,0,1ded9b29e4acc31e9338e2ae61c82a955decb5e13c73efcb1b0fb2581c06a828,2025-03-06T21:15:16.220000 -CVE-2025-2042,0,0,67f720d4def48407f34c01c6d1c7140513d95df6c15685ae0dbd84bb897d922a,2025-03-06T21:15:16.397000 -CVE-2025-2043,0,0,fb5c1380f860d9e82da03871294c93a245c25dd0627778aa495f980d83fb7627,2025-03-06T22:15:35.773000 -CVE-2025-2044,0,0,2ac6e9ca0ba76df30dc26150d1f971d40c5a094f979dd9d27e5de012f75bf052,2025-03-06T22:15:35.957000 -CVE-2025-2045,0,0,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000 +CVE-2025-2034,0,1,3c3f5695cbed6b5bcbccba65acbbc37a061713d3d22ab780aef25b5de628f147,2025-03-06T18:15:43.230000 +CVE-2025-2035,0,1,5daa57051a066ad107543c8155f2d343f9ac767c495ad06cd5b6a246f53e8a19,2025-03-06T18:15:43.457000 +CVE-2025-2036,0,1,89940c316e947670d50a4d1cf797b2dfc38f84ce4f19a6e1a65491a886cb9c84,2025-03-06T19:15:28.373000 +CVE-2025-2037,0,1,875474b8d8479fe3aea112b7fab4bc49434538a3b55de6c8917c3e1fb33660c6,2025-03-06T19:15:28.540000 +CVE-2025-2038,0,1,558a6e3521556bef8f5a900e6608764f186b155ebf036fe06490c9cdff695307,2025-03-06T20:15:38.583000 +CVE-2025-2039,0,1,88a00137828f4fc8d411844a5ffae20c7be76b6b4fc6a1aee36f578c5efbd6ed,2025-03-06T20:15:38.753000 +CVE-2025-2040,0,1,2bf4a134705a254d4623d166a418f9f3af219ef069ee046f69a1717355f6e074,2025-03-06T20:15:38.920000 +CVE-2025-2041,0,1,bcfe3277afb229693da84992930bb3baedf4ac0e73e0c462e62ed2d0b239ff7f,2025-03-06T21:15:16.220000 +CVE-2025-2042,0,1,ecfe4a53e0f5bc365d0416ed7a82cd8785b675accab257825c58cebe048f9756,2025-03-06T21:15:16.397000 +CVE-2025-2043,0,1,bf91cf8f7f9099706750b45b0956a762628d471b4234444b5c760cbde5c03ef3,2025-03-06T22:15:35.773000 +CVE-2025-2044,0,1,144ec1b277147ec057101b0f5608b838448f5fbe5a6e35d03492bbde691941cc,2025-03-06T22:15:35.957000 +CVE-2025-2045,0,1,18467dc4cdcbfa9d60a6e1214c6dfdbe00238bff50a4cc807efd1bcc5690c546,2025-03-06T13:15:12.553000 CVE-2025-2046,0,0,aba5514c859814c520c97b00701c54a6d9a6664a23a1b58788a2285a109ef652,2025-03-07T20:15:39.177000 CVE-2025-2047,0,0,5fba40ffb3f5e5e4e902c9f72d70dd326a9babe7831c65c2667604ee232195ac,2025-03-07T20:15:39.300000 CVE-2025-2049,0,0,261905fb3a71c23252a05799990e537ad82a6fda18421948d4c9f964371ee42d,2025-03-07T20:15:39.427000 @@ -281377,12 +281377,12 @@ CVE-2025-2058,0,0,b8c0ed4c6c9a30dd784843b19947dfc086e37f9bd6154d2b78254e871b3218 CVE-2025-2059,0,0,5b6795d03e7b228aaf929737773f90cae866266639b998d7652a8491cad7d1dc,2025-03-07T02:15:38.600000 CVE-2025-2060,0,0,d01ac5a2e76f95dc006c3de804d9b9de8352f26529c158d0cb75e033b8abb605,2025-03-07T03:15:33.457000 CVE-2025-2061,0,0,1c1aced5f125c86a7f091487720fd95d47e58279f5298eeec0acb353fe0ffe5e,2025-03-07T03:15:33.630000 -CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000 +CVE-2025-20615,0,1,d699879cde223b1df6955ee31029ea24c46a6f3851ffea4d24d91204543bf695,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 CVE-2025-2062,0,0,db41a2a17bac6fa9c9820e6c0c2eb675578aa0e4d36f527836b39376c86a28a3,2025-03-07T04:15:08.933000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000 -CVE-2025-20626,0,0,11d2c1166da72a9729a40d211579b4896bbbd70d36c79dcb79c1739952b5245f,2025-03-04T04:15:13.393000 +CVE-2025-20626,0,1,283ebc496e92ea9492dae4617125ad1c57c6c06d1c8d8471ba3492cc51c5d016,2025-03-04T17:41:14.237000 CVE-2025-2063,0,0,c0b83f6c0c4eb79049083d36c7be5e01446d5f1bf6cd724f412c92558b39d4eb,2025-03-07T04:15:10.060000 CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000 CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000 @@ -281402,14 +281402,14 @@ CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892 CVE-2025-20644,0,0,36fe45487698c38b084c19e27dd2a6a54d47d97b62c0a820afad7c659a338360,2025-03-04T17:15:16.493000 CVE-2025-20645,0,0,e73b14ddd1a35f5495a8566186ab64fa8e029ae7479f97e94d9a40a7fd29751e,2025-03-04T17:15:16.650000 CVE-2025-20646,0,0,a6481196a444de54518e6b2858a02b34acb7ed12a172ec1c376727a8e58a1116,2025-03-04T17:15:16.803000 -CVE-2025-20647,0,0,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000 +CVE-2025-20647,0,1,0df6fe2f8cc747fa7a78197b8fa2f49a91c5405ae50efe8ab5f050f71cceb944,2025-03-03T15:15:16.880000 CVE-2025-20648,0,0,c46df21f1209c3ff238046d1ba22eabca91fd50b76bec446eef99f2da50f6b27,2025-03-04T17:15:16.960000 CVE-2025-20649,0,0,ad4f0f122ba16e08327b5ecac761a81e21676479957237b3040e3e5a614e3454,2025-03-04T17:15:17.130000 CVE-2025-2065,0,0,e108647b827f5aae79ca8b3a984e39927958d68ced28c0ae9be2ca4a6a7a9f09,2025-03-07T04:15:10.447000 CVE-2025-20650,0,0,4839c3a5cbb4aeb9330b5312101e579111320a345dc24a6ab22be3803767178c,2025-03-04T17:15:17.287000 -CVE-2025-20651,0,0,d0b2f57cefd6b14fe4ec9b006d4611fde15e3d9c3f09f4bb055081eee93fabc8,2025-03-03T19:15:34.823000 +CVE-2025-20651,0,1,ceca1abbe321244e95f52f7c0e364b2a5ac98d67119c4a4a7e3366e47c16ab0a,2025-03-03T19:15:34.823000 CVE-2025-20652,0,0,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458755,2025-03-04T17:15:17.497000 -CVE-2025-20653,0,0,b2968adfcae86c06be703d17e416c9128a6d8c15cde3e34e7292e056ebacb491,2025-03-03T03:15:10.170000 +CVE-2025-20653,0,1,10a8cea4b8c1ccc068072024007c444ff7d2ceef126747513723a7cf953de00b,2025-03-03T03:15:10.170000 CVE-2025-2066,0,0,5dca3a37881c3080b5ed7399cf07d794623bec104102f99020f28f3358b971ab,2025-03-07T05:15:17.293000 CVE-2025-2067,0,0,3e39862fd040dc0c3c929624d43984557b3839cb6c47b4edad23eed5ac7ebc44,2025-03-07T05:15:17.527000 CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e863,2025-03-07T12:15:34.260000 @@ -281441,52 +281441,52 @@ CVE-2025-2090,0,0,3b4f174c4f1b56912de6a54781e155024a410909b1f372d74b24e500436f4f CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 -CVE-2025-20903,0,0,e6de6e0786fabbd61c6bd9213d37b2911630c09b38b3dbfc4fe2ee023225e67f,2025-03-06T05:15:16.977000 +CVE-2025-20903,0,1,126325c34b8081b38fe2f25d26926430ff147b86c8fb24b255ec7799ab2a7f69,2025-03-06T05:15:16.977000 CVE-2025-20904,0,0,e64372ca9753518166d5d1484c4b77aaccc9ceef13997ee92c25077a814f1ec5,2025-02-12T13:48:47.607000 CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8c03,2025-02-12T13:49:26.310000 CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000 CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 -CVE-2025-20908,0,0,cdd16c5f2a8b406c1a35a1f3f4bb4dabb289605a74b59ea8e98551412e416f2f,2025-03-06T05:15:17.150000 -CVE-2025-20909,0,0,b2c6099ab5458167997f0f666fc93748e67670d51d094993e13883929a1691f3,2025-03-06T05:15:17.307000 -CVE-2025-20910,0,0,6aa0678b65cc17902a07d2e24a3710740c20d68cfc7aad727e04273e0eb39320,2025-03-06T05:15:17.480000 -CVE-2025-20911,0,0,8a605c713889c830090292428e557fc940d2352b115c3bdf3980b6f3b7a14821,2025-03-06T05:15:17.653000 -CVE-2025-20912,0,0,210cdeb2c4a03759c922510e8ce6889f6e2e3ab0540a9eeb7b979d21d9406c40,2025-03-06T05:15:17.860000 -CVE-2025-20913,0,0,dc18939858db4a9dabaa35d3591b5a676ffa9a82b67f92f7515d7c9f2e58f2c4,2025-03-06T05:15:18.037000 -CVE-2025-20914,0,0,b3c681a324204be876ca2bea2b93b62698d43635f22105ad6617ff757a2c47ea,2025-03-06T05:15:18.210000 -CVE-2025-20915,0,0,7e0aaa10504b9f6431708e5d3c2a03cf19b4e9bb97c57cddd95a398396118c76,2025-03-06T05:15:18.387000 -CVE-2025-20916,0,0,a3ccdb6e5f7216dd9620777c14810228a99c108ebbd357e01034541061a8cd8f,2025-03-06T05:15:18.527000 -CVE-2025-20917,0,0,891c495a84fb4f080761d9c0ce277e7f0b005b198b7d9b787822ad5e3f0f5df2,2025-03-06T05:15:18.683000 -CVE-2025-20918,0,0,546c0a12bf01fab2f53897b868cfda60be7a0122eca9ff933a870647f693fa78,2025-03-06T05:15:18.883000 -CVE-2025-20919,0,0,1812aa8cfcfc5333cffeb298b89555dab225eb40a4eaca5f4d0a431aebcc0f39,2025-03-06T05:15:19.050000 -CVE-2025-20920,0,0,08676ad132da64a11d1a6a857a0611e26c1babe338eb248077300512e5f97acc,2025-03-06T05:15:19.203000 -CVE-2025-20921,0,0,fd1fd95d82d1189544e61726dfcac3b6663e8a89a439f2951f6b4ddb250c6543,2025-03-06T05:15:19.347000 -CVE-2025-20922,0,0,3ad36465ea53683d6c24419f2d57a9924498c7d5eb8a386e3e60fe9f98fe4226,2025-03-06T05:15:19.533000 -CVE-2025-20923,0,0,a22e990ccdfa1497f700e265dac8f4f5d75cec773ba22e3f62bae353d567c6b7,2025-03-06T05:15:19.690000 -CVE-2025-20924,0,0,39db03778b4bc36516af3cb47462ef4e5b140a73f0e7f01701125d6ac5484830,2025-03-06T05:15:19.870000 -CVE-2025-20925,0,0,97882705f9b81e2b2ab97f6c2749d117a0edaca217671aa9a23b2c024671de48,2025-03-06T05:15:20.093000 -CVE-2025-20926,0,0,888fde423793e6049271d2f28dd33f1061aedc60ff9ecb9dba38d065204c4aa1,2025-03-06T05:15:20.383000 -CVE-2025-20927,0,0,a91be5515495a3d34d196829d47903c1893510322e01e578f39c3bba75d9c24f,2025-03-06T05:15:20.547000 -CVE-2025-20928,0,0,da9f49ea75ced231fac5c30669418edbea8d3153111bf8477e5f66cb40641f4e,2025-03-06T05:15:20.703000 -CVE-2025-20929,0,0,2dce13ec28c6ed5e496045ee2a31327f1fce4e10348c2c287649e719a2844a69,2025-03-06T05:15:20.900000 +CVE-2025-20908,0,1,08f5985da5920c543fec8bfb554c999b902c4c8649522b7becce201eccadcc34,2025-03-06T05:15:17.150000 +CVE-2025-20909,0,1,111fd387c791c549d623bd9a78326cc159c57d74665efc535f509728bd06735d,2025-03-06T05:15:17.307000 +CVE-2025-20910,0,1,dc16a0dc3ea4743499ae879fd93a06bf966240a95cc4f93722bb5d329131b4cb,2025-03-06T05:15:17.480000 +CVE-2025-20911,0,1,0a3ac665127300cc958a7529eef2bc350d39042505d0de27d79655d728516a94,2025-03-06T05:15:17.653000 +CVE-2025-20912,0,1,7dddd01a41b6c54b89c1da8d6b76d079bedcc812efcd125fad5b2fdcb2b331a2,2025-03-06T05:15:17.860000 +CVE-2025-20913,0,1,59126dfa4d28d85ebd1e4d84e4db82d1299d4b85097566404f9a030e705cb381,2025-03-06T05:15:18.037000 +CVE-2025-20914,0,1,10a5d3b219f73cf258edf304b338865b14132ec6d9ee449857258dbdcb7425ce,2025-03-06T05:15:18.210000 +CVE-2025-20915,0,1,f4020d08626b61e904118b3fa50fd117eb33570f3095269c3e4acfdd7f441ded,2025-03-06T05:15:18.387000 +CVE-2025-20916,0,1,a009e8325ca63744645e1de4063f9278891e0c166efb245c0a9f239d04c860fc,2025-03-06T05:15:18.527000 +CVE-2025-20917,0,1,f3a23d7236fa6f543c1ce517f3e0d6e15a274c4097ef474e28e3e224abbec537,2025-03-06T05:15:18.683000 +CVE-2025-20918,0,1,5170cfb09072d7e82fe4ee3c553f80d7318a5f230f8c4dd3899a9f3146a74d67,2025-03-06T05:15:18.883000 +CVE-2025-20919,0,1,e99b7f28c2ae771f8b622aede25d1d7cb87576ead3211cb1275636c860dea02a,2025-03-06T05:15:19.050000 +CVE-2025-20920,0,1,b609908aae3439c7df614c5e51731b421e5db3e146b885450e82865ea2f5e81c,2025-03-06T05:15:19.203000 +CVE-2025-20921,0,1,c037b977058d04b98d9b62ad02619eec0015dd861bfad93c945cb5383195b76b,2025-03-06T05:15:19.347000 +CVE-2025-20922,0,1,6e7aaae058ec62ce44071582a0e924189da95f37fe1313eb3024148ed5325eec,2025-03-06T05:15:19.533000 +CVE-2025-20923,0,1,2d704d40f44b2f60e0f933b810c72af87fc1090e627fdfd563d6ceb30fe623e5,2025-03-06T05:15:19.690000 +CVE-2025-20924,0,1,e908237ba303fccbb27544466cc7c1c8521a274ba3f9b7f566faa150c4c4c4c5,2025-03-06T05:15:19.870000 +CVE-2025-20925,0,1,98dcc2fe3dde6c30aee09087122ca8d81dd7e71d78677ef8d57029f96a7cd078,2025-03-06T05:15:20.093000 +CVE-2025-20926,0,1,63c02097285606b27bb7c4d3d7cac51562ea2a605c80884cb281fdd49e69a7a6,2025-03-06T05:15:20.383000 +CVE-2025-20927,0,1,adef44f0597e1ae9610f119d860f7a01bf55875cc58ae841b4cc110234eef13c,2025-03-06T05:15:20.547000 +CVE-2025-20928,0,1,8e73b5b1981898e1d07771e2c6a36a674cf090edeff817976962891dee63f136,2025-03-06T05:15:20.703000 +CVE-2025-20929,0,1,d06bb18f2a2fff29e6ca98473731e53b5b668fb1a9fa3260d74efb04ec9c4e25,2025-03-06T05:15:20.900000 CVE-2025-2093,0,0,bd00618b68ebf9c4d99e3894edcfdd8f64e1f74eeeb53d884dd048429f9c5656,2025-03-07T23:15:15.747000 -CVE-2025-20930,0,0,bab4c083da011ea0367ed0226c007ad7a6239b4ffdd12dbc6f7212f68a5c25c5,2025-03-06T05:15:21.063000 -CVE-2025-20931,0,0,b15093c52baa75c84a98d672b6f6a3cd23e07c961fb2a36b02824adf054c2662,2025-03-06T05:15:21.210000 -CVE-2025-20932,0,0,81815a0a786eaf533d780b376fc38d3bfe12c02cf7f75e867f04a83384938f1b,2025-03-06T05:15:21.440000 -CVE-2025-20933,0,0,4d27621d6c7c64c672d5a5becfc0ae215b76265ce07a5a1bfdec129c6401322c,2025-03-06T05:15:21.607000 +CVE-2025-20930,0,1,4fa0cb05dbbb5e5b2f4cbeab02f90d05ad0d37fd45dd6adaf44c3b117737ae40,2025-03-06T05:15:21.063000 +CVE-2025-20931,0,1,a7c6de7751c5cb95c3adfccfa1d228ab09000efdc59aa85ef628ef22f75bcdde,2025-03-06T05:15:21.210000 +CVE-2025-20932,0,1,3b061aced1a02aa055e005b9923f05032bba8d4493f8412b15fc7c9186d2ee2b,2025-03-06T05:15:21.440000 +CVE-2025-20933,0,1,78c769f64ec13bb740e2a7da07ade5ae850d040aa51ab886eedfde7cdb9d5e88,2025-03-06T05:15:21.607000 CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c08362,2025-03-07T23:15:15.883000 CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000 CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000 CVE-2025-2097,0,0,68c84023337b97410a8b6aa3f0f9b646081950a0047f7800baaccbd9cece30f4,2025-03-07T23:15:16.263000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 -CVE-2025-21084,0,0,ace7c6554080c25439589c0a6a78bc459d9093293af90dc6240cc40f99cc164e,2025-03-04T17:41:14.237000 +CVE-2025-21084,0,1,7b324472a45e5386cabb4c5492ab3928131f338a2d61662b2da75c2b9ab26744,2025-03-04T17:41:14.237000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 -CVE-2025-21089,0,0,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000 +CVE-2025-21089,0,1,07db8bd36817bab07cc11d5adecf38d8832725bb538dec4ca35516cc5edaa96e,2025-03-04T17:41:14.237000 CVE-2025-21091,0,0,c802a7b25882d42a090b27badb1537fcdda8854c4d36451323648d734d1e16cc,2025-02-05T18:15:30.613000 -CVE-2025-21092,0,0,140b3fe8a31460f6705b94bca92c1cb8e7389d9fdc0b822b07be6f1b43759d3a,2025-03-05T00:15:38.080000 -CVE-2025-21095,0,0,347be251bc2554322848b77faa7397784ae841c11ccccb8f061e410d0514029d,2025-03-05T16:15:37.487000 -CVE-2025-21097,0,0,da0506b0f8f381393fdc99df275174ef6f455eaaace2f30a63e7d5c90c865651,2025-03-04T04:15:13.813000 -CVE-2025-21098,0,0,a193a406b493161331e8c0047ba76e17ef891d131b44cddf900c465d6f51a0c8,2025-03-04T04:15:13.953000 +CVE-2025-21092,0,1,d30f08cef361dbb83e64f172da688d32d1a53fa91ba62eaea995eba4043126c8,2025-03-05T00:15:38.080000 +CVE-2025-21095,0,1,a664f8c982b75198f2e5bdcc999d53be109cf5b33bc29bd64844c4fd14ce631b,2025-03-05T16:15:37.487000 +CVE-2025-21097,0,1,52aa36b477bae692d7650a0ea549b360215d0e9a81584c6b2716b341f166ea7e,2025-03-04T17:22:39.620000 +CVE-2025-21098,0,1,72864b796e49e91150ec3499ac6a65ea228520af1053bf5eea74dd57f82abbce,2025-03-04T17:22:39.620000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 CVE-2025-21103,0,0,e47eb06001984d8500d168dff51756d65a465cd5cf145d2cfc8ed0911d350714,2025-02-17T14:15:08.597000 @@ -281516,20 +281516,20 @@ CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372f CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000 CVE-2025-21155,0,0,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000 -CVE-2025-21156,0,0,3dee0f6c65f1bd094a761214b4f97ccdafcdcd8576589694bb708cf58dce07fd,2025-02-11T18:15:27.787000 +CVE-2025-21156,0,1,27b960f0b5b6864477f57a25e5df52b68937946efa0b6d1473b660f8b7066f80,2025-02-19T22:54:41.513000 CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000 CVE-2025-21158,0,0,68d9b59f620ec5478dd99f17f5a82d6ee9d79b9f8dce8ee154ea0f44bd83c1b3,2025-03-03T14:54:17.487000 -CVE-2025-21159,0,0,a9ac97f778d3919ed16980e049dcd2cfb997abee99305add810e8411b6f150c8,2025-02-11T18:15:27.977000 -CVE-2025-21160,0,0,b298e9dead90b56d68690fe8f94f6532c5140473ae9644b8fc7d33c5fbd6d42e,2025-02-11T18:15:28.163000 -CVE-2025-21161,0,0,1b902802049c73c55ff4a183777bbf90477f90dc91e3054767f24f30480cd2e1,2025-02-11T18:15:28.347000 +CVE-2025-21159,0,1,75b81232e76a92c2406023a42299b2d80a3265bf969ddf7c23ff5875e97010cb,2025-02-19T23:05:19.987000 +CVE-2025-21160,0,1,862a1ab6d16666907185ea583ef8abbee75c3f385bb77ad9385a3d5ed46eef75,2025-02-19T23:10:32.813000 +CVE-2025-21161,0,1,dc98f450f7090ac4cd4a639e59b5d7f88758fc138feafd7efe5d6027c5043e86,2025-02-19T23:12:47.180000 CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 -CVE-2025-21163,0,0,a8e834f1ce087f417f4c36cbfcd18f99636cddb18ced97873a9e42cb60c639d9,2025-02-11T18:15:28.747000 -CVE-2025-21171,0,0,3c9f6942085918a90e9231b06b07eff9b6bf5a4b6913504e83e61dbac7d978ef,2025-02-05T20:07:01.797000 -CVE-2025-21172,0,0,c4b86213875e6603d2ee53fd6b46e908496cb95e2ca90c3d8db30a098c51eef2,2025-02-05T20:03:33.053000 -CVE-2025-21173,0,0,ad7a0687adbbd12bea1660d0b0ef666d021874e57d663931aea070a6cab1470b,2025-02-05T18:56:08.103000 -CVE-2025-21176,0,0,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd896c8,2025-02-05T19:12:24.030000 +CVE-2025-21163,0,1,e26246ff0281e90ae86c0be76f49aa0531c32701df080849dd0c8c5912fa53e9,2025-02-19T23:11:21.383000 +CVE-2025-21171,0,1,2ad53d6d5d0803fb4c8aaf281e1d8978f4a504076700f4a844166f5f5c037cc2,2025-02-05T20:07:01.797000 +CVE-2025-21172,0,1,2752dda13ef4b5444713f530f6b1dbc287b8cc852b11521802b533a0d95a9bbd,2025-02-05T20:03:33.053000 +CVE-2025-21173,0,1,0d0b1ae8deb458c653548eac4fb7e3ee80963ca3f4c83c5e84749f00abaffddc,2025-02-05T18:56:08.103000 +CVE-2025-21176,0,1,d03f69dcb3b1e51b711d4c41d6bfccaba1562702f0aaad28329089c8f50b7198,2025-02-05T19:12:24.030000 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 -CVE-2025-21178,0,0,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000 +CVE-2025-21178,0,1,c7959eb5f27aa12e423969f2bfc0eb3fb196cb3a2af9c2f656ceade14ab294a1,2025-01-27T18:42:39.560000 CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000 CVE-2025-21181,0,0,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000 CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000 @@ -281543,7 +281543,7 @@ CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e CVE-2025-21190,0,0,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49d1c,2025-02-28T16:02:50.353000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 -CVE-2025-21198,0,0,222e32f01b9e38e4737a53b6906c9486a61c90514139fa02b4604a18d9475dfb,2025-02-28T16:02:50.353000 +CVE-2025-21198,0,1,409f66843b554eefbda1b14eaef7f0d6b61447a101bf7413282917ca002ecb4d,2025-02-28T16:02:50.353000 CVE-2025-21200,0,0,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000 CVE-2025-21201,0,0,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 @@ -281661,7 +281661,7 @@ CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7d CVE-2025-21322,0,0,a36700e623b7042775efcb047c6ac1b4f686ce001f46283148f214e3a99ff95a,2025-02-28T16:02:50.353000 CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000 CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000 -CVE-2025-21325,0,0,1e9ac8e59ea270ba0213d9228cab1f528312c5bc6be8058bf3244a2b7017b22f,2025-02-07T15:21:31.407000 +CVE-2025-21325,0,1,0fbc15afb730f814e2912bbd7919d5fee3c4e45c57de7dbef7efad54060f8615,2025-02-07T15:21:31.407000 CVE-2025-21326,0,0,a5e6f1ef9b9a2944d2bea648da839845d2d7762f68463063bd25e92cfb364e2b,2025-01-22T14:48:07.620000 CVE-2025-21327,0,0,6bd622b4cb196ab3d63971ece1faaac22132cd2a79e6a25e00781b3735394834,2025-01-22T14:59:37.587000 CVE-2025-21328,0,0,c55b285a694d6e2b58155292638f31c2f5766a335ddfa572448875697271530a,2025-01-22T14:59:12.047000 @@ -281728,7 +281728,7 @@ CVE-2025-21391,0,0,83d419fda69ced06d53cbd61e13158fe3e31c56b8681059f3bb731201858f CVE-2025-21392,0,0,4ca4bc447faac23408047fddb928e8cd1a78cc7fe770afbf9e1ff1128a22010e,2025-02-26T15:23:31.897000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21394,0,0,4ccc160d26f412d0660db2820673933d53f9e960ede3214b61aa7e3d64874628,2025-02-19T17:29:42.907000 -CVE-2025-21395,0,0,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000 +CVE-2025-21395,0,1,4e42d4885b86d64845c4506e4f0440b5a8d9ad4a831b3ccde601e72a2e36b465,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000 @@ -281736,7 +281736,7 @@ CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1 CVE-2025-21401,0,0,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 -CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000 +CVE-2025-21404,0,1,6afa74a6cbfab3e370d8f53b7484dfe2af794937357195185d4fecd567911366,2025-02-11T22:00:00.150000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 CVE-2025-21406,0,0,6c291d888693effc4c704398bf9fe1ea90097879dc039825d7dbe20016f09a5f,2025-02-14T17:37:19.737000 CVE-2025-21407,0,0,75fede06292d95a8c42cb27cc3f5b2257526d05517ed0aab3f9eb96bcb3fd2e6,2025-02-14T17:36:43.997000 @@ -281751,7 +281751,7 @@ CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a0554555 CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000 CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 -CVE-2025-21424,0,0,5c9471e28234dbab18e927efd99e742958314e8bc729f87158cd8358d147a526,2025-03-03T11:15:15.810000 +CVE-2025-21424,0,1,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000 CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000 @@ -281939,145 +281939,145 @@ CVE-2025-21701,0,0,d7c054d565dcf2a6e8d7012de1892a0a2fe63adaff9755c9d55124b93699e CVE-2025-21702,0,0,295a0e49717454cc39c315053488b66f87a86e159e62fafe9cfc381cb821411c,2025-03-07T18:15:47.370000 CVE-2025-21703,0,0,1b70a75eeb992a0cedbee9d2af799a85c7fa5ad6d64038ed6ea31d816ef224ad,2025-02-21T14:15:56.627000 CVE-2025-21704,0,0,9a86e02d9fb8c5baad271d9c9853ec1586b3eb8ed9ce0a3de54fa8b76bfb26a0,2025-02-22T10:15:11.263000 -CVE-2025-21705,0,0,2467d79f909fb2b3c476b851a8fb43c3d27c899ca736969d71f4984f2c4ea275,2025-02-27T02:15:14.137000 -CVE-2025-21706,0,0,f2251c170f7fc73d461134d5690afe1c1fe22a22c2c5933ede77bf2e11b84d25,2025-02-27T02:15:14.237000 +CVE-2025-21705,0,1,1b24466c4fcbeb3153e4ccbbe0804757b355304b517da4f2d6fa85bf296bedcb,2025-02-27T02:15:14.137000 +CVE-2025-21706,0,1,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e614995d7,2025-02-27T02:15:14.237000 CVE-2025-21707,0,0,18171d667d157c63f200c4a3d8ce63df602826691bf95caa2676137d962331d3,2025-03-07T12:30:28.963000 -CVE-2025-21708,0,0,70bef15eb629c71a7c7afc009d0349c18f7b5709bb6199a7d97913b37e48b721,2025-02-27T02:15:14.447000 -CVE-2025-21709,0,0,44d922fbf11b96fa3e8079490f77a83bf9c187d3dfdbafefd95f19de9384caca,2025-02-27T02:15:14.560000 -CVE-2025-21710,0,0,ad1ac658b3da7bd5fe6c6ae0ece92eb2ca2472ae6a28a64d02e88b70117f1cab,2025-02-27T02:15:14.657000 +CVE-2025-21708,0,1,4680b6029cdb7a17214583125daf38e07e5c974891a964fbf823750912ea5576,2025-02-27T02:15:14.447000 +CVE-2025-21709,0,1,a14e7b079991c2dff834a4c134806b146fad3426c8ee00bb7e36d413c6c5e076,2025-02-27T02:15:14.560000 +CVE-2025-21710,0,1,7d577fdeeae7df2e8f9e47f3e4aa9e890b8b043c8f557f4e9316ece7be82aa42,2025-02-27T02:15:14.657000 CVE-2025-21711,0,0,cf13ec528d96da9ae0e87fafb4c97741efa997ed948d0a3082efb2148163b1a3,2025-03-07T12:30:28.963000 CVE-2025-21712,0,0,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000 CVE-2025-21713,0,0,7c581c2faa371aaa484ee1f08d6f34bd30d17480a8c9dcbd1ac4ebd0bef8b279,2025-03-07T12:30:28.963000 -CVE-2025-21714,0,0,b84f2d3cd3971aa8d897029bf67e816ffa7bfda27b2568647ef8ebb4293771b1,2025-02-27T19:15:49.637000 -CVE-2025-21715,0,0,ef47aa883e62901a193ae5a74d7d9fdf8a378adb5672814422ac32cf6dd0950f,2025-02-27T18:15:28.153000 +CVE-2025-21714,0,1,65fe4de0007cf9946d57d0fc0a5a2c93461a3e50f07acbebc0ecc51ca2db2056,2025-02-27T19:15:49.637000 +CVE-2025-21715,0,1,b8cbbcf0d17db5828790cc56d8a521e850b4b838aa73d3a2a9264ae5e1753151,2025-02-27T18:15:28.153000 CVE-2025-21716,0,0,17acae1c0f28ccffc5d283efa02a6ac02840d87ad2933a99a7ffd1c49a7da368,2025-03-07T12:30:28.963000 -CVE-2025-21717,0,0,5aac15c2133fb66e521e14536ed89562c8532f97d8bf50408c4c44f1190a9f94,2025-02-27T02:15:15.373000 +CVE-2025-21717,0,1,75c35fa7fba42e24f73abff9b53b1952419e1ddad8d4143bf10c80475ee6ece3,2025-02-27T02:15:15.373000 CVE-2025-21718,0,0,3c7e689fca00e6751887a2d0bf32914748926749a03234f94921ada3d916a006,2025-03-07T12:30:28.963000 -CVE-2025-21719,0,0,90435d28717df384d11924d26ebf523c4bb53806006e6d55f70338d4d75af7ce,2025-02-27T02:15:15.580000 -CVE-2025-21720,0,0,e8816a3dc75d1809a30ac29789490f377408af1fc8fd620a1baf15c320143775,2025-02-27T02:15:15.683000 -CVE-2025-21721,0,0,468eb53a5c4d6ac628e3e977da66c76fc35686e179f5aedbea1e5c3b4bf4c17b,2025-02-27T13:15:12.150000 -CVE-2025-21722,0,0,41fd52bc3c3322c9509e29a774cd0115ad95b37e6a145a872bf66a3e1f0fac5b,2025-02-27T19:15:49.780000 +CVE-2025-21719,0,1,9df96da3631513db322f0160af94cc38364e54f705b4c11913afe651f5592035,2025-02-27T02:15:15.580000 +CVE-2025-21720,0,1,0a0c8dead69b88fdb48e05feff8e64e2e34f9199f277d44d9b715abac576f042,2025-02-27T02:15:15.683000 +CVE-2025-21721,0,1,8b298fbbf449e3b51a209a005c5f3c3a5ed65531d7634ba45ff0f0dfd00a66d5,2025-02-27T13:15:12.150000 +CVE-2025-21722,0,1,fe0b0f9ff9605e16da6623092094c0efaaa505936b54c28c45e5137d0a4bc334,2025-02-27T19:15:49.780000 CVE-2025-21723,0,0,57bff2f755dd7e9cb8dc14b8a783a017a341dabe0144b7bbb36453dd4591e657,2025-03-07T12:30:28.963000 -CVE-2025-21724,0,0,b0f62606ccde8527f5db351397905fb8fd66158b7905e19f5ce2184ac78f35b1,2025-02-27T02:15:16.113000 -CVE-2025-21725,0,0,4009c155b64c0dd8f3bd5c765c1603cfb3d2b559aefc113ee3107ecdd234c1f4,2025-02-27T02:15:16.220000 -CVE-2025-21726,0,0,77532012930d82fac0c5169da3bd4f96c4860da993c15b762eb409186874a623,2025-02-27T18:15:28.350000 -CVE-2025-21727,0,0,12dcad9ea7d37b5d1898b6527bfce88dd35a6a88191b66a8397d07d17894ea4c,2025-02-27T18:15:28.547000 -CVE-2025-21728,0,0,be41ecfef43d4ddaed0300db06944ca56f0a83e018f2470fc1a8993373c0eb11,2025-02-27T02:15:16.530000 -CVE-2025-21729,0,0,f3cf868bc5186b6a9249caaa29da727a425eca11e2f32be2e0c65405ef3f97a8,2025-02-27T19:15:49.920000 -CVE-2025-21730,0,0,255b1383b32da76b3e627a9b26e46f8ee1bd5400017e4fb99c7b5f4a5455e0bb,2025-02-27T02:15:16.733000 -CVE-2025-21731,0,0,7c1b8af4bebbeff1dfc9fae4f71bc7c3973872aeed99474f1f0af7f7a91ef6b5,2025-02-27T18:15:28.727000 -CVE-2025-21732,0,0,3b60bb445ae2b0c463604586ead7cd7b0115346717e34f71b063126e52774df3,2025-02-27T03:15:13.820000 -CVE-2025-21733,0,0,f431674ee055b07860a3ac39c72dd3c08e4e4c04f40b001135cbbbbb35e430d4,2025-02-27T03:15:13.923000 -CVE-2025-21734,0,0,d9f8314f03451f7ef65c7d0edb09eb5d3aed3906394ae2705f0dbf091413da63,2025-02-27T03:15:14.030000 +CVE-2025-21724,0,1,ffc69114d2836f1884b0c7e27617bd0efe9b2b05798948e0653c098fbe19c202,2025-02-27T02:15:16.113000 +CVE-2025-21725,0,1,0566c664389638a49555cbb862dd9597c3c041a07aef4caf5f04a2f5ce2e600f,2025-02-27T02:15:16.220000 +CVE-2025-21726,0,1,35bac4ae50bdf17f8da1b8679dfc6c00e992ed3e08c439d4178a918e82fd916d,2025-02-27T18:15:28.350000 +CVE-2025-21727,0,1,fae7126db5bef46b65b9c87ad0126bf80c01544323a03e322813b09308b2496a,2025-02-27T18:15:28.547000 +CVE-2025-21728,0,1,27f07bda6544e2fdde6b201b0e8bd26b32bd2eca72b9ed167b2cac448dd21d6f,2025-02-27T02:15:16.530000 +CVE-2025-21729,0,1,908e2c61ef9417444eaf6c40395e171c0d5536992dadace9840202f898b09cb8,2025-02-27T19:15:49.920000 +CVE-2025-21730,0,1,d43aa4affa9fc91e45d56bfc5cc8f5737a9d303f60be429fe7c2e8fbe3b8a9e3,2025-02-27T02:15:16.733000 +CVE-2025-21731,0,1,cc3585da619a4b1055158f76c9624d5ff9de83650000298075c7cc2b60c6166f,2025-02-27T18:15:28.727000 +CVE-2025-21732,0,1,4f8c0aee918472637ddac16b363ffbd3a3ed06383ffac0b747e65e4dc0756262,2025-02-27T03:15:13.820000 +CVE-2025-21733,0,1,2169fbddfaa3299480040215746cb4189c541b3386106a8e760ba24d31681988,2025-02-27T03:15:13.923000 +CVE-2025-21734,0,1,a1ca6870c8ab7386e769e43c9223647ef924ab440380e27b4f29866f41851e59,2025-02-27T03:15:14.030000 CVE-2025-21735,0,0,9447e89c5d3f0e8239c27fb7722fcbae09018357fec71126d259ef460ed6c98d,2025-03-06T12:21:35.360000 CVE-2025-21736,0,0,95b5d003bb740dbf9be6a52daa32d7623c068f24bfe6d5597bc9ed5c0178fb53,2025-03-06T12:21:35.360000 CVE-2025-21737,0,0,adbd37458e33d4b47282f1ae2cdaa9237f3384c7ef422beb49ae5c4d15493f31,2025-03-06T12:21:35.360000 -CVE-2025-21738,0,0,be77dcc026730be68ea4112c0fa30198339fe27d884a1a08600eb0bb1db551ea,2025-02-27T03:15:14.427000 -CVE-2025-21739,0,0,744890e3cb1b9afcafda7c757903b6daa82212d794f0c9620286b179d883b7a1,2025-02-27T19:15:50.067000 +CVE-2025-21738,0,1,093ee763ae1cb586d8b1dcacd419104229c8dfeecc738985e1c2082b049fd838,2025-02-27T03:15:14.427000 +CVE-2025-21739,0,1,d67ff5f67c5b4f3919dd5b67fbf0f1a782042e17fa87a05ad8243effa297eec9,2025-02-27T19:15:50.067000 CVE-2025-21740,0,0,22d267932c0c117f2bd6c851facd5454bb12998f423d0c9d7180bce46944d5ed,2025-03-06T12:21:35.360000 CVE-2025-21741,0,0,865a61ef696dae829a575967cdb4ff384cea015538d94f81eb0d0bf40d9dc881,2025-03-06T12:21:35.360000 CVE-2025-21742,0,0,b7fdadee381668e0eb92c87e1e70c39135d4fab66863f67fa8e359a4c75a4348,2025-03-06T12:21:35.360000 CVE-2025-21743,0,0,9a9acf545dda075999a27b2c6861db1133404fa1f33a76b52eb77a04cdf73400,2025-03-05T18:47:21.313000 CVE-2025-21744,0,0,4b24b592f92e54ef2bc8ba435c4dc52efe3ad202fb9364b0c791aa7b879e6019,2025-03-05T18:47:21.313000 CVE-2025-21745,0,0,bacd274e8d326f43626f4106545cf6113091b8569b7bec5b3c07f641bfe243d8,2025-03-05T18:47:21.313000 -CVE-2025-21746,0,0,1ee314b044325cb6832b9024139b545954b150d19940e994adf048b94f49bbe9,2025-02-27T13:15:12.240000 -CVE-2025-21747,0,0,6400bcce395bf84c52fa3436092d751ea5fa058f369becb0959f791181b26ec2,2025-02-27T03:15:15.337000 +CVE-2025-21746,0,1,abebf8b27a554f56da2c3af963591a3741ad6c9701a2f24e94fd1f3fb8c83aed,2025-02-27T13:15:12.240000 +CVE-2025-21747,0,1,6945cf96acfa2f3325a6d802909fdcce17cdddd800a95eae51d0eda13c3f37c4,2025-02-27T03:15:15.337000 CVE-2025-21748,0,0,b964a4b0ac576b01a488115cdaa0d4697dc2ef94e6ae097aa4d58183b75b70ee,2025-03-05T18:47:21.313000 -CVE-2025-21749,0,0,eaa9fd0414462e5b49890035dc4e954753ea87ebaa27652098bda7dd71dd80a1,2025-02-27T03:15:15.543000 -CVE-2025-21750,0,0,3f89ce029b33cfaec565a43f99a0525c2420236592fa5889e24afe1f380aa9a7,2025-02-27T03:15:15.647000 -CVE-2025-21751,0,0,8a197ae6782df801e2a541438b33ed82eebbce4090ab110a58cdcee46734dd2e,2025-02-27T19:15:50.220000 -CVE-2025-21752,0,0,c2974074e387a328c8499c10426a3da35c790fc55dbe59575556eba739344dd1,2025-02-27T03:15:15.853000 -CVE-2025-21753,0,0,0f56054fada13f570a10fe8b6dd42a0dc420d6c19af58c463804e1b3a3ba75fd,2025-02-27T19:15:50.360000 -CVE-2025-21754,0,0,9e143d4e1cc862ca1a82cdd8bdbad7c857fe073fd85407cb24bd1b95b213770f,2025-02-27T03:15:16.050000 +CVE-2025-21749,0,1,f0d4efd59a04725c30de76843b6761684275277e6d1b66872cb6540d2501fb76,2025-02-27T03:15:15.543000 +CVE-2025-21750,0,1,f15dc29516045c828911aed313d0a5391b811b58339e2f47eb3626921007ec0c,2025-02-27T03:15:15.647000 +CVE-2025-21751,0,1,a4263acce68f299231e1924acb19040e55e4636da2293b92ca77bea16f1010ee,2025-02-27T19:15:50.220000 +CVE-2025-21752,0,1,c6005c7571dda61e561f600bc36d34c4336c7e7f09eef390b43a73c7d523bc51,2025-02-27T03:15:15.853000 +CVE-2025-21753,0,1,85433759c6d60b96c2fec6c0f5c01fa29a97c2340366fef2381ca856f9031fa4,2025-02-27T19:15:50.360000 +CVE-2025-21754,0,1,1b750cbe41c9b3bbcc7f63c20e66c80f94709b9489678aac8e0d85f9304ce084,2025-02-27T03:15:16.050000 CVE-2025-21755,0,0,7cc3ec63f6725242273f8cbc23eebb3420db3097c40b5fa3bf11ed8a61085403,2025-03-05T18:47:21.313000 -CVE-2025-21756,0,0,dc188990e3b8c70a37078365ed81a0191bca4f32ab383180d9de6da4b4bb1c62,2025-02-27T19:15:50.513000 -CVE-2025-21757,0,0,0c50a7fe6d1a998d76dd3b3b4c166df239e2743c19dcb58f99495712b43a4902,2025-02-27T03:15:16.353000 -CVE-2025-21758,0,0,c2d6cf4c3d839362a58ddb1e93fe02e57279379ea402cdc5a026ab2807420329,2025-02-27T03:15:16.450000 -CVE-2025-21759,0,0,ceb9744336a0a02ee9793dc160c2cf336c2bc677e4a623fc5159cc1d882d89c5,2025-02-27T18:15:28.927000 -CVE-2025-21760,0,0,03d31e6a051462802e9cfe4389b13f50dfb56d99b77f8a29afc27edd4d1adfad,2025-02-27T18:15:29.127000 -CVE-2025-21761,0,0,91d57acc8e4f879a99c8dec5ea2c426bfb153787aa82fef46be933b75af2c775,2025-02-27T18:15:29.327000 -CVE-2025-21762,0,0,7e9ecb008317f158c559adee7b5f60548537d0a18029829e2b7aba4bf56f311e,2025-02-27T18:15:29.503000 -CVE-2025-21763,0,0,9a8e86832fe3f4b6181708b6a5156f35b8db5b1d5a3f6ab9c26d05d771a3aef4,2025-02-27T18:15:29.673000 -CVE-2025-21764,0,0,1f3aeaa8f89267d235c9573c492c2721e883e1d139aa7b23c18f8500fafdbe20,2025-02-27T18:15:29.903000 -CVE-2025-21765,0,0,91fa7695367ef2a1292f9af15cfffbcc0b7b3e439b4e1dae435b7f14cd84e0c1,2025-02-27T03:15:17.173000 -CVE-2025-21766,0,0,d0367d7cb1d8f614c3b30e8079ee2d659aac2d6d2e7ceb4602ff5eba3167e29e,2025-02-27T03:15:17.273000 -CVE-2025-21767,0,0,398faf27cd714380eddf109a4a4ee7ca071cf733f34f2f483126f60537563dda,2025-02-27T03:15:17.383000 -CVE-2025-21768,0,0,fab85da59464054a0c06d6abf9fe27a81bd38e6519833028624744556f6d799c,2025-02-27T03:15:17.480000 +CVE-2025-21756,0,1,3c40c115a47f1f308b809660b3b97ea9cb91b31dc5055443697e68384f685eb7,2025-02-27T19:15:50.513000 +CVE-2025-21757,0,1,a49d70b5e6e0916112c459f31069cd9f0a6d280decb30907c6f5731b6f860772,2025-02-27T03:15:16.353000 +CVE-2025-21758,0,1,752f1ce0ddb5ded93b32512ee22f20dafd3a7b616bf3e31f4657f30d1933de37,2025-02-27T03:15:16.450000 +CVE-2025-21759,0,1,39cc4318012775f32803a875083b5406b58edd11f3a2a1fc210702efdb03fb5d,2025-02-27T18:15:28.927000 +CVE-2025-21760,0,1,ac98c6b3c47468ca7488be9ff075f17d5edc457a9a852f9527baa5072be0e071,2025-02-27T18:15:29.127000 +CVE-2025-21761,0,1,4c0fd6a7193a8e28a3d59f74b806b4b6c220bf91909d0901010bffd72ef15467,2025-02-27T18:15:29.327000 +CVE-2025-21762,0,1,7a39df80f1d5a95654db9c2387160099e2838a731cfd6a8e41713f738c650aef,2025-02-27T18:15:29.503000 +CVE-2025-21763,0,1,ea4390a1091d80de1b88c005ac96abf036e86ec7860d41e65f05a7c04a5e23c5,2025-02-27T18:15:29.673000 +CVE-2025-21764,0,1,e3c32215f28879e760ae589e472e66e6d5aeaa5e8b618da73b2ba54cd708b348,2025-02-27T18:15:29.903000 +CVE-2025-21765,0,1,e14fe95d1a1b99489118b9c6af8d868807995f03acbc87398ea740565a5ff058,2025-02-27T03:15:17.173000 +CVE-2025-21766,0,1,bc44bf2376366c533c75930e82dfac202f885bfdcb2c7a96e4a838914dd6f335,2025-02-27T03:15:17.273000 +CVE-2025-21767,0,1,53ed0e0e48d3b33fe0e0f804f30110c9c659089d7917923b16fca261d8ccf263,2025-02-27T03:15:17.383000 +CVE-2025-21768,0,1,fc643bd8709269969bc948419c8b4ae2dfcce2f3be64e8628189728a9184334a,2025-02-27T03:15:17.480000 CVE-2025-21769,0,0,465a0fd3da4b598eff2632f2705705ae4f861bf8e098c888236f0515d394acfe,2025-03-05T18:47:21.313000 CVE-2025-21770,0,0,2865c184890e78724cefdb4f589fabf53b5957b5dd3e00eb0e011be22f7f235a,2025-03-05T18:47:21.313000 -CVE-2025-21771,0,0,3818d138b8d1343bf0f49f29d7fa35cdcfaf6c6ff91dcd7ac6ca07c094f2ec44,2025-02-27T03:15:17.767000 -CVE-2025-21772,0,0,7b5cfa08778d8cc41745844b9b53cf8178cd6b0966cd03b1d4f08be11167b183,2025-02-27T03:15:17.867000 +CVE-2025-21771,0,1,c91809ecb025a626a15de34623cf44629dfac343cd37afacfe0caa429de2bdd7,2025-02-27T03:15:17.767000 +CVE-2025-21772,0,1,3c1b738e6fa983ca6238e13a04fefa7a8da501e365e62b9163d9fc4a91971a57,2025-02-27T03:15:17.867000 CVE-2025-21773,0,0,ab430056760c36e1695c5fa9c00fcaaed1b3ab0fb08b952fadd4ec297216523d,2025-03-05T18:47:21.313000 CVE-2025-21774,0,0,858931aaea3796764a62d299f99fabcd2d9796c2ddaf6dbfa78e3dab0cbfaba7,2025-03-05T18:47:21.313000 CVE-2025-21775,0,0,21bff2c4f59b589cf6579f23a9a0708f2e5369d184b5e68c20da450df9b049cc,2025-03-05T18:47:21.313000 CVE-2025-21776,0,0,2285f9f4f1f0489f10c97509d1529eff5f7414a56148324b0566091a37814911,2025-03-05T18:47:21.313000 -CVE-2025-21777,0,0,69b31dc4b94ebf20c66ca6a7fcca7c6a0932ed8d76b3b0b3e936bc24f9114624,2025-02-27T03:15:18.377000 -CVE-2025-21778,0,0,f05defc3851911043287d6d6d9a4c2180235c847c966c21650ef64ffb301376e,2025-02-27T03:15:18.533000 -CVE-2025-21779,0,0,7f2262822b8af8b72c1f5561d2448abb42a1390f002983fa85f8130af6592d54,2025-02-27T03:15:18.690000 -CVE-2025-21780,0,0,34e4153011eb35d97635ffc6a9b297737ed0761109c6e25cc4fe573b5517aa56,2025-02-27T03:15:18.827000 -CVE-2025-21781,0,0,e97b259e6752f708d80cb2be77ad551db88f0ecede1fa2311a8607e7580a03d7,2025-02-27T03:15:18.947000 -CVE-2025-21782,0,0,0d2cc5e25a8632a5a22e45fa7567913dbccaf592bda2e19ed03a02a71825dead,2025-02-27T03:15:19.050000 -CVE-2025-21783,0,0,df7cea84e2bf4d6cebd01a34d9df47f0157cd69d087528e820d58534382acfe5,2025-02-27T03:15:19.150000 -CVE-2025-21784,0,0,e194d6b58cf43e9d9607b94ef61d6fa58e4a9402a7efd6d0ffc2865ed67724b3,2025-02-27T03:15:19.247000 -CVE-2025-21785,0,0,56cbec547f229a112a790cab1b666d00a69ebc4372a10558241fbce48d4dcdff,2025-02-27T03:15:19.350000 -CVE-2025-21786,0,0,f7cceac4253683590ccf57f7c54ee5b629b661d4b97ec24f597e898d377bda18,2025-02-27T19:15:50.660000 -CVE-2025-21787,0,0,2a87978e9fd58f78281b7b9c5a2b6b93d8f2dfd20845213cff62c5dc80fa9375,2025-02-27T03:15:19.553000 -CVE-2025-21788,0,0,c38c14d2d9c311503dd523a3e311a96fd0f1f409bc22e4cd47f90b2a97647b27,2025-02-27T03:15:19.663000 -CVE-2025-21789,0,0,e477523ebf1c25bff34233693c1301cb500a0cc650ece9680b705605ac450dac,2025-02-27T03:15:19.763000 -CVE-2025-21790,0,0,c20bf732c4cb238a8dedc4b5703caa71b82947fa16283e41cd9ceb2902ed25d4,2025-02-27T03:15:19.870000 -CVE-2025-21791,0,0,8cd3044e2974ddbe5ec4d845888ae202de59370c264d374cccc339066a7a4834,2025-02-27T18:15:30.053000 -CVE-2025-21792,0,0,30ce74f4157cc4d72041564941a761e9bab427028f9dbc41bf824055385783d0,2025-02-27T03:15:20.080000 +CVE-2025-21777,0,1,7b78680346abf8713ba33d8ac2e09aa65789813ca4da1d487df84ad030b784f2,2025-02-27T03:15:18.377000 +CVE-2025-21778,0,1,0c802a465cafec7b0cf75bd3642bc281bc51b491d7eaffcb0778a0688d330462,2025-02-27T03:15:18.533000 +CVE-2025-21779,0,1,ce2832e70cb84010c434b519f31dddf4f05a7f6fdfd2f4b992f18ddb3cd26e85,2025-02-27T03:15:18.690000 +CVE-2025-21780,0,1,a08f826e070825a190944ee3137660d36c931fc52b760e99a867e171ef7dbb64,2025-02-27T03:15:18.827000 +CVE-2025-21781,0,1,12becb1b79770f9e2177ac21857da9b50aa18b411f92143e4a880d3046a69aa6,2025-02-27T03:15:18.947000 +CVE-2025-21782,0,1,71470d5eef09f8a831e5612c5ab89d53daacc2238423be2994deca2a3d2b1f2c,2025-02-27T03:15:19.050000 +CVE-2025-21783,0,1,733ee1e5fb4d0c1c224fe96522fc303770b1cdc50d4986d1dd77fb82b28f3aa2,2025-02-27T03:15:19.150000 +CVE-2025-21784,0,1,45ff73a81a2d77f223f24a345bd3797bd65afcb92ab691f045cec0adf817a5fd,2025-02-27T03:15:19.247000 +CVE-2025-21785,0,1,cd9898c2ff76d9db54e958065834c7c8af184390e25fe721cad8f7c9e1d6ee1a,2025-02-27T03:15:19.350000 +CVE-2025-21786,0,1,dd8bd6c0bf399aa7cc09b7d7caa9b76df635a00f74a2f2ab86c133c9afcd1787,2025-02-27T19:15:50.660000 +CVE-2025-21787,0,1,9f17074a6ad67b4cfbc0d1454d9cd54adce80849374f2e4da863b6650c8522fc,2025-02-27T03:15:19.553000 +CVE-2025-21788,0,1,11c767606c72dda0aa20c4f9ca649685dab5a34472257c01a530c190720d421f,2025-02-27T03:15:19.663000 +CVE-2025-21789,0,1,a673fbec651f9dd545c962cffb6cfb10452f358280d85c46118f7b2bda8285ea,2025-02-27T03:15:19.763000 +CVE-2025-21790,0,1,2a51a8b29b42736d889389a5faaa064e1103bf99c047058ee626bc8b00f16469,2025-02-27T03:15:19.870000 +CVE-2025-21791,0,1,47c3dc0a603e7ce7ef4b377f1eb3c79765eff5c4f3f28fc857c13a087b5cd063,2025-02-27T18:15:30.053000 +CVE-2025-21792,0,1,2353246102894a08e6d346b8bddc15595a22115e1a98cc24e0ef3b41e00e214f,2025-02-27T03:15:20.080000 CVE-2025-21793,0,0,9a7861c245a7b4cd4548bb2065778b0ee3c1b4414d4337450e9ba3cca6d8f72c,2025-03-05T14:05:15.387000 CVE-2025-21794,0,0,f6647e49bb9908d17a4c6de9f144258688ff3128fb4a245ba073f55b15aa9f22,2025-03-05T14:05:15.387000 -CVE-2025-21795,0,0,815676136ff167ea211ac85d264a3129527371a209d25217b76d438c3f52fe9e,2025-02-27T03:15:20.390000 -CVE-2025-21796,0,0,cec6654841982f5711d9d5a48f2c05b5c7cd88ea8da091f7dfce5e709904e74c,2025-02-27T18:15:30.210000 -CVE-2025-21797,0,0,88445ee18da910ef5bfc7791d96ceef61083d17beebbb47d3aa8d3a13e039286,2025-02-27T19:15:50.807000 +CVE-2025-21795,0,1,57054de789d5f9b414272f35e61b3c3365b898cd8a55d4fdf4ef9e6fe93a63f7,2025-02-27T03:15:20.390000 +CVE-2025-21796,0,1,9c1fbc5c346bb583ee61e216052ec2c42b554e12c95813f923ae0ca0e0f401af,2025-02-27T18:15:30.210000 +CVE-2025-21797,0,1,5367423b5fc05506ebb73e3f82fca4bdcda9ae01ac24f8561fa31473177c8722,2025-02-27T19:15:50.807000 CVE-2025-21798,0,0,9fc961c2dc8a958e3699d87d565c8d3ee8d8054c582027e79f5a5b359595ecf4,2025-03-05T14:05:15.387000 -CVE-2025-21799,0,0,3b8abdf6a148f43cbe7e5379c90405bbe9907485b65e459fe464395b6e077c85,2025-02-27T20:16:02.563000 -CVE-2025-21800,0,0,b85c240f364818c80483c72d4d3b4ccf3c37b4c6eb0ab94e0c189b5f91261cfa,2025-02-27T20:16:02.660000 -CVE-2025-21801,0,0,b2091f0a15d88754e84fef2b4a29fc94ad76a536a4b85fa75af7b434f485c543,2025-02-27T20:16:02.753000 -CVE-2025-21802,0,0,38ffec74205f80676678c7a3fb00538e78f26ec72b7129daa44531a44d4e4148,2025-02-27T20:16:02.847000 -CVE-2025-21803,0,0,a8ad4e85eb3ed2ef2c1fe465cdcbc82862c8f37e789e2d5ec574fde0b6c250f9,2025-02-27T20:16:02.937000 -CVE-2025-21804,0,0,993e623c1b5709e658928b0ea6215460c857ebb592335855870108a5f2c33d04,2025-02-27T20:16:03.030000 -CVE-2025-21805,0,0,130755634bdbdf0e26144dc48e041cd2d3c9091da9f673a936a266c576aee51f,2025-02-27T20:16:03.127000 -CVE-2025-21806,0,0,4b9664d0226df4067eaf096dd2e1d1d56c6473f10b7d359a25481dd598c88e9e,2025-02-27T20:16:03.220000 -CVE-2025-21807,0,0,839061c416ed53205346020cb397a0da118a6b3431eca5e326eaa2d635936dde,2025-02-27T20:16:03.317000 -CVE-2025-21808,0,0,84bce3df420f8d3db785caf233d71bd40ee3985bd8337dd2a9b820e6bd0a408e,2025-02-27T20:16:03.410000 +CVE-2025-21799,0,1,ffbcd5f0277248974f180eec8a6cf70aedacff21fa5d9756d004c033a0e01abf,2025-02-27T20:16:02.563000 +CVE-2025-21800,0,1,4260e92732f8c6a7f6518189e662300cd8f506b5f184419a48f61f4ec395049c,2025-02-27T20:16:02.660000 +CVE-2025-21801,0,1,da81985e783faa2502ae07010a07eb3d8778ced799720ff14748e2ac34975864,2025-02-27T20:16:02.753000 +CVE-2025-21802,0,1,4ff1ccadf65956494c25eeba897c97ba3afda8df500e325fbdc1444f4b1a028a,2025-02-27T20:16:02.847000 +CVE-2025-21803,0,1,ec728f4d0d800d7ac464ae4a902785dcd9012c574fba29e6eae1c245ebd252ad,2025-02-27T20:16:02.937000 +CVE-2025-21804,0,1,40397a5314593b565d20f3cef5efbc576a1f2459d54aafcd6f423df7b9146426,2025-02-27T20:16:03.030000 +CVE-2025-21805,0,1,83015512429d1ce1bc9049e55ec1e37bf6b8af5c9ad9c2b1958bd205ed1b0fdc,2025-02-27T20:16:03.127000 +CVE-2025-21806,0,1,6f398d755a498f76961aef0d8c1435119fd341f642b8c4606a79ef7e3eccc02a,2025-02-27T20:16:03.220000 +CVE-2025-21807,0,1,a1c6c5da4ae7a1154ac6f72155c4981e355672fd4d8fe121288e8a2f5ff5d904,2025-02-27T20:16:03.317000 +CVE-2025-21808,0,1,9ceae351a95e7f48e3b731421082f24bc9aedc33279bc458c69eafbad1c046f0,2025-02-27T20:16:03.410000 CVE-2025-21809,0,0,2f4cb5efc653aac40b44d3818284785d3141db6e56217af95575ded45f9f2b5c,2025-03-05T14:05:15.387000 -CVE-2025-21810,0,0,a6c30e94287c9c8d86b20b52c523e8b0de4fba5b3ecf6bbcb1e02bf3205e74bd,2025-02-27T20:16:03.587000 +CVE-2025-21810,0,1,1992f049e00c8bf3aede3d6b0b1f239950c0a2280d3810b236fa997a0ca8e658,2025-02-27T20:16:03.587000 CVE-2025-21811,0,0,f4cf837d733fe9c7f89ff20c50a9b1b21bfae5f9fa68f7560bb7735d2ba8c602,2025-03-04T18:15:24.840000 CVE-2025-21812,0,0,7ab1e2667db13e9301bf6dc8371a94bc370eac4d101187c6481cc0bd898c0a20,2025-03-04T18:15:25.100000 -CVE-2025-21813,0,0,796169d7100b9f68cc3cae340072c0f90bd1f5da53f6ec3d5de4f6f96ffe2fff,2025-02-27T20:16:03.883000 +CVE-2025-21813,0,1,78df5f168bcf407ef8d0541d43d53e4fe129ebc6e2716e4b36acef01df61f61a,2025-02-27T20:16:03.883000 CVE-2025-21814,0,0,03224a2dbb88c92b5106851fa0282460b832d59a0233255531097ac847c68eda,2025-03-05T14:05:15.387000 -CVE-2025-21815,0,0,505081b931ce8b8c7648642e1759e5d2b9d854ed396415c4f32376b2124b935f,2025-02-27T20:16:04.063000 -CVE-2025-21816,0,0,c528fc8128c19bc0bd15f68d6d374b8163180d99f68610bfa350a8bd45cfeffe,2025-02-27T20:16:04.150000 -CVE-2025-21817,0,0,fb75e4ad84b34fea43e1625612ef1f6ef9314f907dcd5da0b3430bf5a489cbce,2025-02-27T20:16:04.243000 +CVE-2025-21815,0,1,f4e2c12cd4a4edabd0c8b0bd958ad46a201e53ff9da54eb242d285bf4d2e973d,2025-02-27T20:16:04.063000 +CVE-2025-21816,0,1,77e8315616cfd3295c24347d715bde3ac86c88872cfb41bfdd021a900f0796df,2025-02-27T20:16:04.150000 +CVE-2025-21817,0,1,c1a7c26d0ccafcef71ad51858a2ffb9b84072383a4f0223ff11f842c70b97e93,2025-02-27T20:16:04.243000 CVE-2025-21818,0,0,68cb1db63634248e0d05be36e88289887b47df3d3a20d0885cc9e5401cfe2ddb,2025-03-02T15:15:12.043000 -CVE-2025-21819,0,0,94bfba28f3d8b661ffc0c813899c721c943da294e0b08f1f347068f2b89e6225,2025-02-27T20:16:04.430000 +CVE-2025-21819,0,1,fffb2ad585acacb7750de724d03060958e0008c1da6ee25489543c037e67d048,2025-02-27T20:16:04.430000 CVE-2025-21820,0,0,23c9cab68146fb0b910784e5d7f00192179f8dd92cced412d25a48d0e33f3c7b,2025-03-05T14:05:15.387000 -CVE-2025-21821,0,0,fd6efc5d1ffad2a00aa09e345a704277d9daeb9e6fddc1a42c293b6132b6a1e2,2025-02-27T20:16:04.613000 -CVE-2025-21822,0,0,20ef27da51fd71ed1bc2f3085ac0746fabc8aa34de630fd5cf985e239376c55c,2025-02-27T20:16:04.707000 -CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e2065204cc,2025-02-27T20:16:04.793000 +CVE-2025-21821,0,1,8ec4be0b45b5548c264fe1bb9d0e85477b77cff40287ec4ffc1d89f6ff178de8,2025-02-27T20:16:04.613000 +CVE-2025-21822,0,1,0b2049d3a83a0a3b63ea7cde4011204e2b4aff429701272520b7ec68b2bcf811,2025-02-27T20:16:04.707000 +CVE-2025-21823,0,1,7348221012a1b015c358834c6bcb13bb75e1f27674e3e9266dc1d2c767b7574d,2025-02-27T20:16:04.793000 CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 CVE-2025-21825,0,0,8870dfd89a416f2d4819ebc7dda8e31caac49b07c149c21ec32a3a7d987beda7,2025-03-06T16:15:54.753000 -CVE-2025-21826,0,0,d8d55921ef1e36df7091e5de134407839b84b0822bba50536183d3f97f7ce0cf,2025-03-06T16:15:54.863000 -CVE-2025-21827,0,0,798ad67445b56cee9d7e2654d461c72d1706e81ca338689a6a6b575e66e62661,2025-03-06T16:15:54.967000 -CVE-2025-21828,0,0,1d423c38cfc3b27519324f42fcfede2fa1caf4961cb465a838aa6e06d0f9b7b8,2025-03-06T16:15:55.070000 -CVE-2025-21829,0,0,565eb8245bf46ec2e8aea4da181586644cadcf072d0e6c514e0c828dc274ac61,2025-03-06T17:15:22.820000 -CVE-2025-21830,0,0,305117e9f901262e313c4c6a00e95c29dffd65f2d4dc9ad7dbea30d015c9cfc8,2025-03-06T17:15:22.943000 -CVE-2025-21831,0,0,02e7212ed4caf03d5b4e694a67d7e4c69f77a56f55cdaa5770166dd4f4d6bdd9,2025-03-06T17:15:23.060000 -CVE-2025-21832,0,0,e0629aa46decd0ab7966c3eb122fc42ab87700e1c595ae30430876b531e02ab0,2025-03-06T17:15:23.177000 -CVE-2025-21833,0,0,06865424bb811f3a4d3c7108ae185516bc9999aacbe2f3e2364847e7bebe4c01,2025-03-06T17:15:23.293000 -CVE-2025-21834,0,0,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32cb76,2025-03-06T17:15:23.397000 -CVE-2025-21835,0,0,78792f5e0a0fc396121255e44d86498bf71f7b17f11fbf08ffdd550ea81440ba,2025-03-07T09:15:16.473000 -CVE-2025-21836,0,0,0c96d33aa4ba09e5132941f84daaf21d3a8de4d459f5c3f80ca7fb04c000f41f,2025-03-07T09:15:16.600000 -CVE-2025-21837,0,0,d71f7670b9f3de6bab1a766e0565d97c4b19cdacaebfbf655b97ae2c2428104f,2025-03-07T09:15:16.710000 +CVE-2025-21826,0,1,f2f401475fe4cd48036bb1c4243730f96751f928ca9a4dc67f6b239e4ed2e57a,2025-03-06T16:15:54.863000 +CVE-2025-21827,0,1,1ebcfa7a2f0effd1dbeea1c011f01f393f543b7e0d705f3539fc709dea3cc66a,2025-03-06T16:15:54.967000 +CVE-2025-21828,0,1,514a83f0d2c5f8d53337238d779bfe36a480d8317915f685e103dde8d9de586b,2025-03-06T16:15:55.070000 +CVE-2025-21829,0,1,a747a8b89fd0b8638eb6cee04d1bf26798ceb704f61f88741fead6992537641a,2025-03-06T17:15:22.820000 +CVE-2025-21830,0,1,af50cb67c1cad93d3c0ddfdea0aef6faaa3c385bdd5be888c7122746b845f189,2025-03-06T17:15:22.943000 +CVE-2025-21831,0,1,e9e016bfc3b93066131e238b0869f3ba3ef9dc874f330e6c624a309ea87de119,2025-03-06T17:15:23.060000 +CVE-2025-21832,0,1,dd683c8987cfe025f29fd3da3989243a1aca49fdcf077732775a112f0f19ddfb,2025-03-06T17:15:23.177000 +CVE-2025-21833,0,1,442997513119528c02cabd8ba272df909e69d36c78444fe0e4b29214300ec606,2025-03-06T17:15:23.293000 +CVE-2025-21834,0,1,f516cd65e968f2bee276422aff2c17cd2145afe218b6965623ed8466de9500e3,2025-03-06T17:15:23.397000 +CVE-2025-21835,0,1,1ea0f7347c54f194016e73e3344d02c3fc7bd147238b7856499e7a76106d6cbd,2025-03-07T09:15:16.473000 +CVE-2025-21836,0,1,de1b525b199ad8395b78917bc5fd3191a20a66ddcd701fa9e24d3831ca35ec50,2025-03-07T09:15:16.600000 +CVE-2025-21837,0,1,1bcbcdfc1e6b13a703491afd4c73f741146a7c3c340d3664f90b5d169a4ab0cb,2025-03-07T09:15:16.710000 CVE-2025-21838,0,0,c3ce5f80630165d59b68bdf67b00f3ac2acff4fb25dc7c433d137ffea7bbff7b,2025-03-07T18:15:47.713000 -CVE-2025-21839,0,0,73960dd2df31123c2ce4caa2af112eb496473962b756cba9905bed564b371cfc,2025-03-07T09:15:16.923000 -CVE-2025-21840,0,0,f7a54e15cb3fc24ad92d37cb06eba5f72f4005541c2a332b47cf70e0a8758a64,2025-03-07T09:15:17.033000 -CVE-2025-21841,0,0,9c7a1022d9f429220d2416fff9a1e040611d0aac489e05d5f694d8a693548a17,2025-03-07T09:15:17.137000 -CVE-2025-21842,0,0,3081e7ebea54f24e874e6586734c0193c6554754b61be867d969f17f495a84a2,2025-03-07T09:15:17.237000 -CVE-2025-21843,0,0,c32ec2fd6a246a6230bb8be05b9c9106ef13a644f48a5a5137fab813e4c7a749,2025-03-07T09:15:17.343000 +CVE-2025-21839,0,1,98f1b2f1c5a24c58d40127a7553d64d535f12aab47cf506771b576adc157206a,2025-03-07T09:15:16.923000 +CVE-2025-21840,0,1,79e0fdabfbd29cc80f75cdf397a49e5d1ecc594978efa8294abd14922129d563,2025-03-07T09:15:17.033000 +CVE-2025-21841,0,1,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d787,2025-03-07T09:15:17.137000 +CVE-2025-21842,0,1,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000 +CVE-2025-21843,0,1,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 @@ -282107,8 +282107,8 @@ CVE-2025-22207,0,0,227e1dd024a03046d5aad9d73b27b2d6f23b1761e7c90a962fa1e9e855255 CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000 CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000 CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000 -CVE-2025-22211,0,0,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000 -CVE-2025-22212,0,0,22155226abb26c66fd05b97bb0fbe3d0fcc9563c5101aa93e68ce4d0d83f7665,2025-03-05T16:15:37.643000 +CVE-2025-22211,0,1,701fcba8693972a604c82eb97a96bbdace18ebf7fb6001a7afd61c15a8dd5788,2025-03-03T16:15:39.843000 +CVE-2025-22212,0,1,587f2bcb35f24add109a85302f7771cf3c9f55817e236b14182bc2f7d7261bea,2025-03-05T16:15:37.643000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000 @@ -282118,9 +282118,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000 CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000 -CVE-2025-22224,0,0,c2403c2742a159c1e2c9973786ad605e2d5c93ca94ab1632e7681ce44569f865,2025-03-05T02:00:02.390000 -CVE-2025-22225,0,0,71cc694e144dc30a95b6d0305971776ba2edb9e51c96b4e9a8d6d9ff16755ab7,2025-03-05T02:00:02.390000 -CVE-2025-22226,0,0,a50659e22e83e1afe376a7ef22a5f190dea0a173759444c6e00ed23a4b662b87,2025-03-05T02:00:02.390000 +CVE-2025-22224,0,1,c948834af9a4905173ccb01e7d9a869514a01ec3c7b24270d5cbc18431c8de80,2025-03-05T02:00:02.390000 +CVE-2025-22225,0,1,c08a72000b5d3deecf46a62f7ce5f8f14ed5c29bfe3edf4eee4d09def04ff668,2025-03-05T02:00:02.390000 +CVE-2025-22226,0,1,13c079400ace8fff8e84d107ece13d82a1820b799f13d06483f71d9a4e7448a9,2025-03-05T02:00:02.390000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -282134,7 +282134,7 @@ CVE-2025-22273,0,0,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb76 CVE-2025-22274,0,0,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 -CVE-2025-22280,0,0,03c8e21f54ef26562b39bddfb4ae4d0ca65ee88cfe32d5d2b87b9048402bb26b,2025-02-27T14:15:36.033000 +CVE-2025-22280,0,1,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000 CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000 CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000 CVE-2025-22289,0,0,c3fff7c693f7011a88fe12ae53f3272daabbb7eaba44f91bdfbd8cb84b6200ee,2025-02-16T23:15:09.567000 @@ -282224,17 +282224,17 @@ CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911 CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000 CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000 CVE-2025-22402,0,0,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000 -CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000 +CVE-2025-22443,0,1,cc0052a1796d1337b70b04afe2b7520d3d4b23f7a516fa5402c29ca3aaf91607,2025-03-04T17:22:39.620000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 -CVE-2025-22447,0,0,1dc2397a53cfe52ad816d66f9dd4c94aeefe8cb87da6f114917e51315593ccf4,2025-03-06T04:15:25.377000 +CVE-2025-22447,0,1,a09e9c6c341148275cdf7848d50c90872c1118351a20ee6b95f2dabdacf4dbd2,2025-03-06T04:15:25.377000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 -CVE-2025-22491,0,0,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000 -CVE-2025-22492,0,0,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000 -CVE-2025-22493,0,0,3fd8c45326186b19600084db23ec5bee27e935681d6364607bb1969dbbc7ba96,2025-03-05T09:15:10.443000 +CVE-2025-22491,0,1,ad85f2f60683d1b1d15d527fe2b105a5594d84c0da0f697daa4684f44b948c2e,2025-02-28T09:15:12.540000 +CVE-2025-22492,0,1,6675658809687c830ee351f78ca107f7df64e972ba8ef72f245dee116e840551,2025-02-28T09:15:12.680000 +CVE-2025-22493,0,1,92899ea872137434654690dbd7494b714efbc1b6581910e1588009f9dd181467,2025-03-05T09:15:10.443000 CVE-2025-22495,0,0,8392620cb3f5289df4103c4151ecb349dfb461cd09122f2d139b36566f51370b,2025-02-24T17:15:13.723000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 @@ -282353,8 +282353,8 @@ CVE-2025-22619,0,0,d515e7076865e4f01be05b309607c7d226293e7a0f8bc68ef1e74f170971f CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 CVE-2025-22622,0,0,0a67f003bf728be4e0886c35c47488ba14ce354a6aa44e3a32da5ad98803d9bf,2025-02-19T04:15:10.550000 -CVE-2025-22623,0,0,20d6283ace4a04a12b28905e821d2ab26d0d4a26370a914557bf0a67bd8cf554,2025-03-06T05:15:21.790000 -CVE-2025-22624,0,0,99f67b51b4924176c5d13d7970c078d5eee1a532ddb11bde6592626dbf4b6321,2025-02-27T19:15:50.940000 +CVE-2025-22623,0,1,ceb26a9f660e1cb7e36f5d2a604531760532e5dcac2e29e4972c1239b5f11c97,2025-03-06T05:15:21.790000 +CVE-2025-22624,0,1,3150de4f7a54951c23cb3cffadbaece2b77c163f8f3e2c796c2351f5c75a26cc,2025-02-27T19:15:50.940000 CVE-2025-22630,0,0,593d04dbe4592bbbd0e67cbe1d1c9339c2fd794f2c49ac1ded1166dba2e072b6,2025-02-14T07:15:32.750000 CVE-2025-22631,0,0,698f5af7c231ca612ef49b5c9557ed0a6275cc603aec3b288e67c713c264419b,2025-02-23T23:15:10.290000 CVE-2025-22632,0,0,a00ccfb79a24fc13a5dc854108dab7b330a127a143f3348ecdc06f096bf01241,2025-02-23T23:15:10.440000 @@ -282503,24 +282503,24 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 -CVE-2025-22835,0,0,65f8f025b66dc12096c15d5621dd955024f35c23b59c4c3cde6816f0a58a7344,2025-03-04T04:15:14.250000 -CVE-2025-22837,0,0,e57642ce15dc85ed16a5b7cbd6696ad4126ef4965787c2ebed6a51995632507a,2025-03-04T17:12:06.513000 -CVE-2025-22841,0,0,615d4dc7c3c3366e6714052cabf0106fd722824d53f6174e31c8e2ef78bc8959,2025-03-04T17:12:06.513000 +CVE-2025-22835,0,1,8a5e1afe0f315c9b8bcb3480e5be59c7afe10bf07430c568a4ac5f3d1c11f18e,2025-03-04T17:22:39.620000 +CVE-2025-22837,0,1,c525b2d2d8bb2beb81bae953bbf7becc3297a22186de59948935e5747a21e53e,2025-03-04T17:12:06.513000 +CVE-2025-22841,0,1,7c8f0ac8d586d1f0ed68e2528345212a886063b589f7818162d1b6d7402ec964,2025-03-04T17:12:06.513000 CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31 -CVE-2025-22847,0,0,2381a8fdabd9e5f9ab5087c91d81dca24291b4fc388ea1e391e50b3cdc3703d7,2025-03-04T17:12:06.513000 +CVE-2025-22847,0,1,9c9acdb20b19d48110d25941a9af953d788ae9b63a6314f9b946b4986649eccc,2025-03-04T17:12:06.513000 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 -CVE-2025-22868,0,0,73ef45a50ca45b6daf2dceef2991710fca1ac5382112acfcfc374b832a6fec27,2025-02-26T15:15:24.993000 -CVE-2025-22869,0,0,8a26f065b7e8cecdcf13ea7f6fb2a55e89b7f271323d622456bec1325d950401,2025-02-26T15:15:25.160000 +CVE-2025-22868,0,1,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387aa98,2025-02-26T15:15:24.993000 +CVE-2025-22869,0,1,5fcceae088032b557e3959982bed74e41a764f7c84c3726bffbbd6756b1cca25,2025-02-26T15:15:25.160000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 -CVE-2025-22881,0,0,03ea703e186425803948d56feb42a7a4bf49aa8bf5ef7eeaee0c98360196e327,2025-02-26T08:14:25.137000 +CVE-2025-22881,0,1,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc51d1,2025-02-19T06:15:21.687000 CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000 CVE-2025-22896,0,0,291a4adaa89bdcc150dac503f60db0675c03727130ace5fe68815e30173b8003,2025-03-04T20:59:05.417000 -CVE-2025-22897,0,0,a295222b6163a7e71540804650907cffe2d3c82432401321f3950139acc1d17a,2025-03-04T17:12:06.513000 +CVE-2025-22897,0,1,7b9eca5536e5bde05b8b5e666f4f9babb9d89d199b67d0a8885a79c7d7b21b05,2025-03-04T17:12:06.513000 CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000 CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000 CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000 @@ -282536,7 +282536,7 @@ CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b97620 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 -CVE-2025-22952,0,0,81f6e17717edc94ecbde92b279584adc65afdde56cad155ba2ae5a67cb261723,2025-03-03T16:15:40.010000 +CVE-2025-22952,0,1,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000 CVE-2025-22960,0,0,03dbe017a43731b62764513a5831ed79527b3dffb6d1c2c75f2395befe9bee6b,2025-02-13T23:15:10.960000 CVE-2025-22961,0,0,a8d7599115f6e6df511a78a0281bfd773eeeaf5f1ff31bc5878e314826477a78,2025-02-13T23:15:11.047000 @@ -282628,7 +282628,7 @@ CVE-2025-23111,0,0,bee2b37690105f94a2919f948d33470ba27eac7a0501ea5db580d8c336b4a CVE-2025-23112,0,0,5295af5f2d972260409bf6e8ddb1e42cd398e210c99c068cbfdfd18c1a2f69a7,2025-02-25T16:14:20.857000 CVE-2025-23113,0,0,e6cccd37793f33004af385d66a450da8db2860bda0bd7d1ee76256a1a29e87d5,2025-02-25T16:11:55.610000 CVE-2025-23114,0,0,76dcd1ec6e101307de60d1efade8dc8b1885e30638a84718a1a37bbecd49b630,2025-02-05T02:15:28.610000 -CVE-2025-23115,0,0,d809baa250bb6271b2b24f5db83bcfb12be4dc10edc0be309139d3eeaccfa95c,2025-03-01T03:15:23.263000 +CVE-2025-23115,0,1,308447f383ab19daad9284d1f058b71389f4a86fdd9d9612714d838cb6c98982,2025-03-01T03:15:23.263000 CVE-2025-23116,0,0,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000 CVE-2025-23117,0,0,3b650561fcfb78dd195d3496b028d41feef3a20547a31675fb51a8efff748de1,2025-03-05T16:15:38.340000 CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000 @@ -282670,41 +282670,41 @@ CVE-2025-23219,0,0,3f14cf0c503ac3e85dd03ec372abe9f306eb735a2b09170206a08c523c952 CVE-2025-23220,0,0,f2a5803bc6ad9096282895d3b0200952d53255eccbb857151afcd4187a638ed3,2025-02-28T19:18:34.167000 CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000 CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 -CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000 +CVE-2025-23225,0,1,e7172a29691256f5cd7802e83d2f56fad7175879b765e935ded8f42967016101,2025-02-28T03:15:10.807000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 -CVE-2025-23234,0,0,441581b32d61def6dc5b91d1bd69f15e8f9e5be2090cbd6276efe420a180eab0,2025-03-04T17:12:06.513000 +CVE-2025-23234,0,1,28eae5c285e0b7c70dd1e0e8817490059142719912f52af555ddd2cd78558510,2025-03-04T17:12:06.513000 CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23239,0,0,73761053f1cf486225f31cfbe2c5d7282e449e2379e63bc42bc6b88358fef062,2025-02-05T18:15:31.373000 -CVE-2025-23240,0,0,f959b4feefe49b9ec7c7051fe72c68f17ca44d34dc9b7b29b0371d3261c83518,2025-03-04T17:12:06.513000 +CVE-2025-23240,0,1,cc75ce891b393f48204ae1bee9d1c6ebb0570ce0b6fca2a588e96d25da4e228c,2025-03-04T17:12:06.513000 CVE-2025-23359,0,0,078a2b254b9542e7cfbdc0b2539045b6c597acb96680d65380627cec160e1602,2025-02-12T01:15:09.230000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 -CVE-2025-23368,0,0,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000 +CVE-2025-23368,0,1,00e9644e0b4255977b827774346f9ad5e1026c53e751b04cf87dac22d94838f0,2025-03-04T16:15:39.270000 CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442a91,2025-02-11T11:15:16.420000 -CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000 +CVE-2025-23405,0,1,ddeb2b5db57c9fcee267274617b0df7ed66e371a7704cf175d824eede48f6b9a,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000 -CVE-2025-23409,0,0,06262ad791ce570937296bcb697070013ba33b5198b3c057b85c061f90b04a2b,2025-03-04T17:12:06.513000 -CVE-2025-23410,0,0,ecd8d3e44f5447663b8e3b5eb2bf22d89443e28b7e8e3ad33afc602f84c50835,2025-03-05T00:15:38.250000 +CVE-2025-23409,0,1,c61658c7993e2f937fb297db8fd051efad99a9f4e423f63f4c01ca9f8cabea8e,2025-03-04T17:12:06.513000 +CVE-2025-23410,0,1,64351eddad4c043b4956a3980b30b2c0732360a649abec634f24226fa482fe9f,2025-03-05T00:15:38.250000 CVE-2025-23411,0,0,873449632c5f07c04f0012ee0ce445b82ec9d7b013c9b4a2a560f053a421fd92,2025-03-04T20:59:05.417000 CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000 CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000 -CVE-2025-23414,0,0,2c9de769450c672cb0ed8621be68efc7fb4031b86902dc24212f40994c2669ef,2025-03-04T17:12:06.513000 +CVE-2025-23414,0,1,1cf070da4a0c7dd565c67c41deab2d261ad10b2272855a85a594e3722590a55b,2025-03-04T17:12:06.513000 CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711bd88,2025-02-05T18:15:32.573000 -CVE-2025-23416,0,0,5966c7694a2936faba0ed713c4fa6c38da0a8673adfedd49a71129e2115ac5d2,2025-03-05T16:15:38.530000 -CVE-2025-23418,0,0,b560b331a0d6c1d64f53a311d14d0150022927a9bccc490bdea6a032ad9aa775,2025-03-04T17:12:06.513000 +CVE-2025-23416,0,1,338e85eab5551b9744ec4fa13fcbf0a6b8806c51c58fbe25c93b3fd50ef2492c,2025-03-05T16:15:38.530000 +CVE-2025-23418,0,1,64358ebdf1aa2435dd393d7fe8c4b310e97e038f70b78ac05a77fb21d10b3784,2025-03-04T17:12:06.513000 CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000 -CVE-2025-23420,0,0,e40880a9b24585d5dfdcb427a281a44babdfcb41db4c12310ab309bdd9fe6cba,2025-03-04T17:12:06.513000 -CVE-2025-23421,0,0,00e828297d8c47e57ba7a8d1a3f41d7d51541a2cde4acbd6d1a3d704f1af2297,2025-02-13T22:15:12.073000 +CVE-2025-23420,0,1,f01eb0fdcdeaca28b8bda3b9a575752c3b8b0575f45213db3952b2141066d261,2025-03-04T17:12:06.513000 +CVE-2025-23421,0,1,e43dea6eba9dd389189f164d376c83ee3800e2f7fb6bbdb2086d590d848a63d6,2025-02-13T22:15:12.073000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 -CVE-2025-23425,0,0,776ef5cd2699d91e4c54da1588612f90cb247cc5e70e1b80bdb21610657b8c25,2025-03-03T14:15:34.600000 +CVE-2025-23425,0,1,8a8fabb17477976b3b0df06dc4190a417d384acd73f045cb4e4c144ba0a80f42,2025-03-03T14:15:34.600000 CVE-2025-23426,0,0,2229e7d1ff76d0c5e969c3251982ab349229fc474aaf0fa42cebd6f9eb1f7a85,2025-01-16T20:15:33.877000 CVE-2025-23427,0,0,1ab1fc81c6d9ecd522651b87bcc6522c6506303e1906de8f32583cb95508df8d,2025-01-24T11:15:10.140000 CVE-2025-23428,0,0,0933c655ffc4826ad6a9bae1408067074f41d57f71628a4f0c9688d55f588b8a,2025-02-14T13:15:43.160000 @@ -282712,23 +282712,23 @@ CVE-2025-23429,0,0,2e8256da44ff61177c4f2a5d237cc05baadd69659454e348a75499c81473e CVE-2025-23430,0,0,d6a6f32e23dfcc5842a2f98f2cef617f4db5d83551088778a76b915d16293a79,2025-01-16T20:15:34.287000 CVE-2025-23431,0,0,7bf90ba4dc8c9a49a35700f3e925d5c3fe575a48b0411f9f0ff3561fc0ae270b,2025-02-14T13:15:43.300000 CVE-2025-23432,0,0,e754a47d3de4a683f85700167b4d6315e5e70c68f0936fe6c95c5e783cb9730f,2025-01-16T20:15:34.467000 -CVE-2025-23433,0,0,859e940e5ed2a0c28c2b4a9152cdb27f3cb3e08d849db99b9876de69ee7dcd97,2025-03-03T14:15:34.750000 +CVE-2025-23433,0,1,bbd0aa210b2e20b6a8029497ec36144492c85c5ebe80ed4d036a278ef266cbfc,2025-03-03T14:15:34.750000 CVE-2025-23434,0,0,f44f7ad85e29b672c8bca7ccf3a8ff077acd5c80e8883e15c08b84c2d2d93953,2025-01-16T20:15:34.607000 CVE-2025-23435,0,0,6945949396459e98e52f3a5c95f90747ab0b3d87702a11bee1fbbbd38b17e9e7,2025-01-16T20:15:34.770000 CVE-2025-23436,0,0,08242c4461d18884c3a6e4bd2512fa98787dc7ff698cde97d27e848859dd0948,2025-01-16T20:15:34.920000 -CVE-2025-23437,0,0,1dba3f4017d14d54bc85372e3f9a2970291cdaa6036ab2d22149a1778040d687,2025-03-03T14:15:34.890000 +CVE-2025-23437,0,1,d95f7248ff8befee805416d52d11dc00fce167efe31ea5ed1611d5df5e8c01b0,2025-03-03T14:15:34.890000 CVE-2025-23438,0,0,d5b99d41ae258b81c318d76badc751e3c16a7fbfb5848a85ee9570d47579e418,2025-01-16T20:15:35.067000 -CVE-2025-23439,0,0,8a6105272fe8a9231d3cbd32e9e2742fbaee8e992e9c9ee023be5e59d55e724b,2025-03-03T14:15:35.047000 -CVE-2025-23440,0,0,b107a4accc82a611bc39d34fa1902f9a2b64f7bdb9fd4acff6c23a05ef368878,2025-03-03T14:15:35.217000 -CVE-2025-23441,0,0,7a8215af6b3c4481d445066d256aeb3798a416549be84ce621fd4a671e5eba9c,2025-03-03T14:15:35.360000 +CVE-2025-23439,0,1,2aa0a643b351d0c05161919469d3d04499068eccb32da7f9c74f6d499f96d87c,2025-03-03T14:15:35.047000 +CVE-2025-23440,0,1,beff568a4a345f14aabca3baf637ba469d0ee24b5f969b032dde5cd35e74773a,2025-03-03T14:15:35.217000 +CVE-2025-23441,0,1,fb1bd9fbb669ae04cc0d28d5b88102ee89f1552c510147295df2b7f610bbe58b,2025-03-03T14:15:35.360000 CVE-2025-23442,0,0,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000 CVE-2025-23444,0,0,bd139aa5f0d5452b293e56da4268a8dc616b5f5ec3a0335035b071fc8609deb1,2025-01-16T20:15:35.360000 CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec309f9,2025-01-16T20:15:35.513000 -CVE-2025-23446,0,0,8e1f03e8ce7e99a635690667d9ce1eb994ed62ee78b58873adc50f38726c1fd8,2025-03-03T14:15:35.500000 -CVE-2025-23447,0,0,d227f79c46843b7194a6085aa00d372f650b2d1351072fa04c3d617464b938ae,2025-03-03T14:15:35.637000 +CVE-2025-23446,0,1,e6f9e978833a7871e5161c7568ac19d4275eea8b1b6a93cc3e1abd71a8d20aed,2025-03-03T14:15:35.500000 +CVE-2025-23447,0,1,eb5ca7ad3f4a8ae4ae11ec7bdaa46eb4cce3b1511628fa2b58ed43f7b495f6df,2025-03-03T14:15:35.637000 CVE-2025-23449,0,0,9861de2bb02130e19fdbef202b482545d141110bfd57643033355d06e9dabdca,2025-01-22T15:15:15.650000 -CVE-2025-23450,0,0,8e79e74aad39485efe37c99e8f276cdd147b952b9b4d3411f26200daf0d82f1c,2025-03-03T14:15:35.780000 -CVE-2025-23451,0,0,61c2997ec25a5c44d3f2247f7d867750e0cd13f52958f08bc6bf0d727c03b556,2025-03-03T14:15:35.920000 +CVE-2025-23450,0,1,ffde507d42dc6c5721d5d8f203b57f84d570a6fa59f6007c92ef432b218ca44b,2025-03-03T14:15:35.780000 +CVE-2025-23451,0,1,a313555798bd3856c6ce8808f0153b1b43635388cd9badfe1b4d9f9c2ddc80d9,2025-03-03T14:15:35.920000 CVE-2025-23452,0,0,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000 CVE-2025-23453,0,0,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b854694c,2025-01-16T20:15:35.883000 CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda747b,2025-01-21T18:15:16.223000 @@ -282738,45 +282738,45 @@ CVE-2025-23457,0,0,986871805bb278c802f2d565eaf70f336dd71bac5bf52dcdc838d471378e5 CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000 CVE-2025-23462,0,0,f1d946acd1b6b97ba142139f225fbf51751f08a101be4aaf7927889e6462f843,2025-01-22T15:15:15.800000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 -CVE-2025-23464,0,0,51275e059d100e8eeb35bb095aabb54f2ab1cf74895a3ada90d11d49346a29ca,2025-03-03T14:15:36.070000 -CVE-2025-23465,0,0,a24e893a8d415e3d4a72405bab4da32daf81cd1cdf1e89e4475a41bb768b0257,2025-03-03T14:15:36.213000 +CVE-2025-23464,0,1,2d2dec24b28420bd0cc62f320b0cd789ea9ec6fe1293ce5d1d92b41bfb20ab9c,2025-03-03T14:15:36.070000 +CVE-2025-23465,0,1,5453b3fbdaaf8a6c6dae1cf225d47e064bf67f3d39cf8a5f667393b17cc9666c,2025-03-03T14:15:36.213000 CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 -CVE-2025-23468,0,0,021e63170f574343a035a9f83f4b3bacb0e6d978549f5df13f2b7b7ac5cb8a16,2025-03-03T14:15:36.357000 +CVE-2025-23468,0,1,146612e9c0cde7fecc23e59a0f5a84ad09e5f947fb41b9a85847d1878aa53ed4,2025-03-03T14:15:36.357000 CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000 CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000 -CVE-2025-23472,0,0,d36de8d4b5fc3f88b41ab0c424997ed66584e93d282bba5f3148107452609ad6,2025-03-03T14:15:36.497000 -CVE-2025-23473,0,0,80ee5781728700cb844e63c908ff0288d1b010432d5f573abc635ae52cf731cd,2025-03-03T14:15:36.633000 +CVE-2025-23472,0,1,6bff6916383e657faa5792ff801452713358809d9c8eb7837e6db20971dbe26b,2025-03-03T14:15:36.497000 +CVE-2025-23473,0,1,eab90f5d8643e13fc0e87e5b265971a576937dac781a25bb65de7d04d9629fd7,2025-03-03T14:15:36.633000 CVE-2025-23474,0,0,a02808e4c68d13b02d1616048eddca8fc77a2c4ef44943542d39c6eb994f3379,2025-02-14T13:15:43.437000 CVE-2025-23475,0,0,bee00c7417c73e1b37a63fcab4cee0ea39305a10e2073977017caf018a8c6266,2025-01-22T15:15:15.950000 CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934c03,2025-01-16T20:15:36.990000 CVE-2025-23477,0,0,5c6098808319de4505951baebf1a586e4793ae0be4627c3cf65438e22beac475,2025-01-21T18:15:16.570000 -CVE-2025-23478,0,0,28404eaf90a198352782f14695a607dd56ce6fff7fdeaf7f59f269bc7ee9e022,2025-03-03T14:15:36.777000 -CVE-2025-23479,0,0,0cee4dc76a1a131d5be29ad339cc849c04ded1fcde4663831f1b232293ff4b71,2025-03-03T14:15:36.920000 -CVE-2025-23480,0,0,0edfc246655fab231ff561c54ff3810b8403f4ae865e4f60d98a084bced56671,2025-03-03T14:15:37.060000 -CVE-2025-23481,0,0,6337cf0e0bee41261fa6fab7e6dc6d0985c31984e401f62a13750d94f439d57d,2025-03-03T14:15:37.207000 -CVE-2025-23482,0,0,031725e3e6a371e698fd503678e379913ef813dcf0d0061fbe350d946a2cfa6a,2025-03-03T14:15:37.367000 +CVE-2025-23478,0,1,7816e5f1a295946efb2ccc23f508bf79e3db4e9b2c3901a72fa3ffbf972b8770,2025-03-03T14:15:36.777000 +CVE-2025-23479,0,1,cdcb9a9761a2d09c079e487aee389b609788690d2b6aacadc7127bf962e5326a,2025-03-03T14:15:36.920000 +CVE-2025-23480,0,1,da73376d49c59465468f55e3dad692b0ad87164665dc8c174e57f224c1a91b58,2025-03-03T14:15:37.060000 +CVE-2025-23481,0,1,7735e60f515443d36a8e8421ee1c9666bc06bd0c0a7fa56464454e844755b02c,2025-03-03T14:15:37.207000 +CVE-2025-23482,0,1,c17caebb775970fa58c03f48c04f5b353183bc0a916a66355b8dea35fcb084f2,2025-03-03T14:15:37.367000 CVE-2025-23483,0,0,4bc6ad2f14d9de9a0797c4da2efee9475ed740963c9329c34f76f07dc090372d,2025-01-16T20:15:37.133000 -CVE-2025-23484,0,0,7b4eefdf5d05168d8b9202303a976bbc03aae78101bd1b787055f419973df825,2025-03-03T14:15:37.507000 -CVE-2025-23485,0,0,d718690a709e48da13eb0f78f78144f120d95c456b0fe72d6e2676784c5233ab,2025-03-03T14:15:37.647000 +CVE-2025-23484,0,1,057cebd4b8f7a00e0b7c450f2e586d84eb4315d95eb830d5a6ae508059b8a380,2025-03-03T14:15:37.507000 +CVE-2025-23485,0,1,440635a9efdd233c3be9fd4ff8d182c67beeb15e745d58d1f07380c1f1d9a442,2025-03-03T14:15:37.647000 CVE-2025-23486,0,0,db15fe8e353e3dbb641397d86d33ed6d64f36b2de802bd430384278f6b43f617,2025-01-22T15:15:16.093000 -CVE-2025-23487,0,0,3803ff4c3e9d5b0fc23ad0a571b40c9e9b7e8a9b85989b4f2d386948a14ca28f,2025-03-03T14:15:37.787000 -CVE-2025-23488,0,0,420329744a3c03e031d46b9cfd3e8fac65a6ec0c08f29ba6183d1334eb8af38c,2025-03-03T14:15:37.930000 +CVE-2025-23487,0,1,16345e2992279b3ef951f4bbc770e2fed59e7af149e5bf1b0a21dc98e22382df,2025-03-03T14:15:37.787000 +CVE-2025-23488,0,1,a39c51053c4ec97bbc9699aebd5caaea319e89cf525bb91db78b6079b8e31071,2025-03-03T14:15:37.930000 CVE-2025-23489,0,0,a8502fb4e83bb7ba28297e2543a85c84c18f12fcd380f120406bbfcdc0815675,2025-01-21T18:15:16.740000 -CVE-2025-23490,0,0,05cc7d73facbc0155b65e66b857d679feb2a92fc93155630e71e8d1225a1f7d8,2025-03-03T14:15:38.077000 +CVE-2025-23490,0,1,8b8bb0e45d151766ce75bb2cd7b73b6e4f35c9dbbdf35d395780a7869ad64947,2025-03-03T14:15:38.077000 CVE-2025-23491,0,0,b6e04909bb37731409bf7190d1070864f039d5a61566e683ba212ff3dd649d05,2025-02-03T15:15:20.640000 CVE-2025-23492,0,0,acff49799bed9b05d17cef1cd5fc93691c99856666ac52115fd66570fdfffd16,2025-02-14T13:15:43.573000 -CVE-2025-23493,0,0,dde86509a03016b635d6349083e602831d193cdcfbede15cafed2eaac6c88e83,2025-03-03T14:15:38.213000 -CVE-2025-23494,0,0,e6827600b96471245e97b6a2c41a235a0a7ed51ebc11a27e5b1b1ac10c0e1584,2025-03-03T14:15:38.353000 +CVE-2025-23493,0,1,7341d903aefd8273f64afbc2b13e65fd545f4cef970776fd4dad786a70604a0b,2025-03-03T14:15:38.213000 +CVE-2025-23494,0,1,5ac2e56f624d214a71b9869cf211f67c73626e9572e04bd6b54f06fda1fe3cd8,2025-03-03T14:15:38.353000 CVE-2025-23495,0,0,d9a0cdbb453046f78521503adb7f92c01ed64245a1eea664c6e0347d070f697f,2025-01-22T15:15:16.230000 -CVE-2025-23496,0,0,96a139c7901e37fff7ad92b3a4c105313d054312033d4732b97941c055afde82,2025-03-03T14:15:38.497000 +CVE-2025-23496,0,1,099f95bf73114288ca27feea3bf546897da191376f2d3f822c90194deb630046,2025-03-03T14:15:38.497000 CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000 CVE-2025-23498,0,0,636b120a74cbfb3524538ea103d8fb93424975cb4826227d74647c0da497f2d4,2025-01-22T15:15:16.370000 CVE-2025-23499,0,0,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000 CVE-2025-23500,0,0,194d70a41828aed88d1340c39622c2eea4fe93a355a56d82c66d50fb6a7ee75a,2025-01-22T15:15:16.500000 CVE-2025-23501,0,0,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000 -CVE-2025-23502,0,0,57210c137bd00a4d8992b795277f9fdfc995f1b161fcaf6308ccf7861c508e12,2025-03-03T14:15:38.633000 +CVE-2025-23502,0,1,57675ab4eb277e81bf38525805d9f7acfc03203c7f00a1ad5ad7431af0fcaa90,2025-03-03T14:15:38.633000 CVE-2025-23503,0,0,a685c9c4f4927638af5f76c715cedef873e7bce61122e0cbd7eb951b30bf668b,2025-01-22T15:15:16.633000 -CVE-2025-23505,0,0,16479f29363a7a3bc51bcd828cf2876b659d18d041a115a945609df3d96ca313,2025-03-03T14:15:38.777000 +CVE-2025-23505,0,1,8798c93b008253bf219809881b52caa20466e63d373953c45ad66f75f549d5eb,2025-03-03T14:15:38.777000 CVE-2025-23506,0,0,c9be5e900dced29876558d61ddea6e32ebbb9837210e04e3dd647c22153b41cc,2025-01-22T15:15:16.777000 CVE-2025-23507,0,0,0a853cedf08af37edfc3da70bdfadfbb2e39c9a98cf9dd3c61a677732671878f,2025-01-22T15:15:16.910000 CVE-2025-23508,0,0,790c1f1efcbcf318bf4001598b0da1f3fe803cd0e7ef29b63714b6cf9d49876c,2025-01-16T20:15:37.737000 @@ -282786,18 +282786,18 @@ CVE-2025-23511,0,0,996d3c261b7453d558ae9e3bf08bfd98e9228b013a71ca7506bf459ee4c52 CVE-2025-23512,0,0,e86f11dc0e50a02bdc0d99b58f1ba83ef676ca0586a75df06c6165a1959d5ab0,2025-01-22T15:15:17.160000 CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4f06,2025-01-16T20:15:38.193000 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 -CVE-2025-23515,0,0,fe6d287120ad0cb188646d0f0839423cb0e43dbe8feb1859185a14a633362a41,2025-03-03T14:15:38.920000 -CVE-2025-23516,0,0,a229db43ffc0cd6bba919f1ede5efa9ed55384409e7e64c99869f0da4562dcec,2025-03-03T14:15:39.057000 -CVE-2025-23517,0,0,31e399fa5b5893537ca3a9c9f6cd97aee184eeeb15461d71d8d3a89122ad1c7b,2025-03-03T14:15:39.200000 -CVE-2025-23518,0,0,f47212f95df7cf1432b4d31f6bf53417148934b240b3f5e13f1f7e7224663633,2025-03-03T14:15:39.347000 -CVE-2025-23519,0,0,cd5226645f1061eb52d93a137d0e6ade79a5c5edd1a54587d2ef491bb9b55a11,2025-03-03T14:15:39.487000 -CVE-2025-23520,0,0,aaee63397f060d2a32ee69d64b6bdc97d138d2e01a27c178de74e9cea91e5c37,2025-03-03T14:15:39.630000 -CVE-2025-23521,0,0,3366c51bee7f83232d0088707c4975d9044ceb7e53c96466c829afb3ebc3a909,2025-03-03T14:15:39.767000 +CVE-2025-23515,0,1,1a07e71e5185d063d730b9089321cfc2cc3319528af325d28fcbb1f44322a8fc,2025-03-03T14:15:38.920000 +CVE-2025-23516,0,1,f297d30197ab80dba0c0089d220264676fcdcff9e37cc955accee17a111d08ac,2025-03-03T14:15:39.057000 +CVE-2025-23517,0,1,5611b052afc1eff825ef8ad9d0288905fdefc281795be461f225d16c9f070b1e,2025-03-03T14:15:39.200000 +CVE-2025-23518,0,1,1940133dca5ccb1a2c3b8121ac9ab31968d3fcd7f81d430754c861dd0eee57f3,2025-03-03T14:15:39.347000 +CVE-2025-23519,0,1,a5ec00fe5f7d1523e58f644a2b5c859a2f60f8074f20542fa4c42ff7a2798832,2025-03-03T14:15:39.487000 +CVE-2025-23520,0,1,e0bf400e50e8845bd87da3435da3191757c4f632a7d0b8fa8d58cad3f930d54e,2025-03-03T14:15:39.630000 +CVE-2025-23521,0,1,672439953c2ec03362220d8b13907ba05769f62f678600aa0588bd1f0ee0cc02,2025-03-03T14:15:39.767000 CVE-2025-23522,0,0,5852e7950af307e368eaa84dbad2a68c2fcedda8bde1f4b6e5689bc8014fb4d2,2025-01-24T11:15:10.290000 CVE-2025-23523,0,0,3182753044790694a251a399f6c27271978feff5b7992ca7831b3cc9ed976dda,2025-02-14T13:15:43.703000 -CVE-2025-23524,0,0,d215b4a502c5532289b76f024819f85fa0c5f686cf68dc85f2959c1757e5d43f,2025-03-03T14:15:39.900000 +CVE-2025-23524,0,1,54d947b1136cce7f77d8faa618ba122f85c51759c1dc07b95a87f008d888945c,2025-03-03T14:15:39.900000 CVE-2025-23525,0,0,11d096f9acc047ed466a27477b08ef538eb7233eb59544741a419c468fe20c80,2025-02-14T13:15:43.840000 -CVE-2025-23526,0,0,433401119f55d7169d86f762b2acd9a87f6c34d352c3f8f05677f0c9e280bd4e,2025-03-03T14:15:40.043000 +CVE-2025-23526,0,1,63eeb24fdb4bf5b0706923dc677f03850eb4479a2082007c86f601e4685b0634,2025-03-03T14:15:40.043000 CVE-2025-23527,0,0,2616a2828036793cafecf099ff69e00f486a89855e414df730486d37d346642d,2025-02-03T15:15:20.807000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 CVE-2025-23529,0,0,b38c5bcca5430635b24ab570fbf9d55781bea0bd4a1b3b85f466b119ace5bddf,2025-01-27T15:15:11.813000 @@ -282807,53 +282807,53 @@ CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 CVE-2025-23534,0,0,88cd0535228a3872a7f2afe91715d13ee88adf4da45dd7ccb84fc0b2164e48f7,2025-02-14T13:15:43.980000 CVE-2025-23535,0,0,c4c4e7b4c3cb9320eaf3f6bf1ebb93064af87ea92072de8b0d212ee5158c55d2,2025-01-22T15:15:17.290000 -CVE-2025-23536,0,0,da84362109a9757d3d8e6e0fcf57b81bd74307bd67a4456669c394b58bb9e191,2025-03-03T14:15:40.187000 +CVE-2025-23536,0,1,11134f4833eaa58c0dcd345f188fbc61d5ec62ebe6ad298a0d6c66511cfe1497,2025-03-03T14:15:40.187000 CVE-2025-23537,0,0,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000 -CVE-2025-23538,0,0,eac0017601d71eb5f0e1f5f27df8c53345c83326e5228d8b84082777f18712e3,2025-03-03T14:15:40.327000 -CVE-2025-23539,0,0,2ddf234c0ebe439db2abc4da0776fc159d9a68695cfb165cd1cde4d4974d637f,2025-03-03T14:15:40.470000 +CVE-2025-23538,0,1,8004df7a0baaeb18663817b1caf84bf5e2536f858dfb283acfa5c260e6512608,2025-03-03T14:15:40.327000 +CVE-2025-23539,0,1,be303a20cbc7b1d2e02eab06e0eadfd1f1526947724f5c4802f240539d3fdf7f,2025-03-03T14:15:40.470000 CVE-2025-23540,0,0,575604080a7e41dafefd577008aef472e583d091e6d52248a1f21517385238a3,2025-01-23T16:15:37.577000 CVE-2025-23541,0,0,a1bc5006e3c889ba7c285bf5fa18384216ad56e7a9867f658d1b550cc20b4769,2025-01-23T16:15:37.737000 CVE-2025-23544,0,0,4ed653671a235a9aa2508fedc1a9b552630d378203557455d39060521497ae62,2025-01-23T16:15:37.897000 CVE-2025-23545,0,0,a51f95b294effe458db270d2606087be8df680dcb349024e6c23e9e2892cfe53,2025-01-23T16:15:38.070000 CVE-2025-23547,0,0,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000 CVE-2025-23548,0,0,e905040ef039a1c5ad85c3aa19f245ea1e7bac617283c354a7559da726c93724,2025-01-22T15:15:17.423000 -CVE-2025-23549,0,0,acffed497da37a07f5e7caf819d05355996e07afcfb9b6f545f3d8a5337215d9,2025-03-03T14:15:40.613000 +CVE-2025-23549,0,1,0e187ab3540cad4ff05c9de83d915cce040ddf22d69d0f1c7a4c1b6a45a3bdb6,2025-03-03T14:15:40.613000 CVE-2025-23551,0,0,e7126fb359d3cea65f3db6ed81dd450c90fcbee9b0dcd4eb99275aedc003ef05,2025-01-21T18:15:16.927000 -CVE-2025-23552,0,0,1bc4356567d261353e4d025cd70ef3ac00b81769f4afaf050903f6befd4c07e3,2025-03-03T14:15:40.760000 -CVE-2025-23553,0,0,e5bfd149325424aeee4a48bfdef7e05e1adae689b7e5ae5ccd3e4f8a96a6dcf5,2025-03-03T14:15:40.900000 -CVE-2025-23555,0,0,d7554dca3578a0661b61efd76e259ad4f0c153dc48a59729dae42069882b1022,2025-03-03T14:15:41.040000 -CVE-2025-23556,0,0,032b593f6c73c5ea0cc8280db0293ea41236fede98356ce5f8dbbdfccf696897,2025-03-03T14:15:41.180000 +CVE-2025-23552,0,1,85daf97d12909cbb74f7a6cbeaddf89b520ab8b197fb8e0c293bcf3a3eed3e7a,2025-03-03T14:15:40.760000 +CVE-2025-23553,0,1,cd0e545136f28fae2fbed7b33d90a175b666bf31a6c84c3dfedc7ba3dea70cf0,2025-03-03T14:15:40.900000 +CVE-2025-23555,0,1,0e1056fb04abad39d2d81eeb530e80b415cc8742473703b889947c007e3b7a20,2025-03-03T14:15:41.040000 +CVE-2025-23556,0,1,1fd82bfbf042fc760c0f089b899fc4b34bbf2e58c93ae3afd82a24ff87d11434,2025-03-03T14:15:41.180000 CVE-2025-23557,0,0,4948e4f74dc87131949549d056234a4050a760fc1ac3fba66738bd84c832aa2e,2025-01-16T20:15:39.363000 CVE-2025-23558,0,0,4291468aaa8c22c74e0bbb0da124051b4e99d0d01c1849f5de31eebeb38c94a6,2025-01-16T20:15:39.503000 CVE-2025-23559,0,0,f107280d0e32fb23f5905ab5f11f98c3b724795adfc26ea0537d5d8ff93e33a0,2025-01-16T20:15:39.650000 CVE-2025-23560,0,0,19b166e58f91145a20070e52b1a91deda6a79a11328a651eb2f155e7b5e396b0,2025-01-16T20:15:39.797000 CVE-2025-23561,0,0,dab2762c1dcf37050b4bf31dc30aa603b8a241d893f00d9a37f79c0f4ffda778,2025-02-03T15:15:20.957000 CVE-2025-23562,0,0,6516913ed80f1c2cc88fcb4ddf0a4ad7854ee1cade6aaf482ce8507c93182fe7,2025-01-22T15:15:17.557000 -CVE-2025-23563,0,0,e629bff27047ea8794be26c83e13bf4b4da1c5489e68f523eb37ce81d790de61,2025-03-03T14:15:41.330000 -CVE-2025-23564,0,0,68c232271bbedbf670ec90017b17d251cfe3f5490d28404b175cbdb5101c6153,2025-03-03T14:15:41.470000 -CVE-2025-23565,0,0,4743f5e4395637bed4805ce5f7a8284bc18263ebca93d4dae9328762d97d698c,2025-03-03T14:15:41.617000 +CVE-2025-23563,0,1,fc0b3e083a6453e81916d30bbdf69a454e288c631fd931e8813de00f07bcfc17,2025-03-03T14:15:41.330000 +CVE-2025-23564,0,1,db5c5c6b5d3fddd0bc0547e330e01af4a2606fe5973edeab105747472aa8e83e,2025-03-03T14:15:41.470000 +CVE-2025-23565,0,1,29a28bb9c8508164d16cbc6414ad57dc6da0e2cb0286bd58c523c9d63bcc7b73,2025-03-03T14:15:41.617000 CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf8fd,2025-01-16T20:15:39.947000 CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 CVE-2025-23568,0,0,541d6e4ad43f8dba765299393aac14407144d095e5c8f6fed5ce69f6ad16e1ea,2025-02-14T13:15:44.123000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 -CVE-2025-23570,0,0,ca0ce94e7c8465d0446c544895307aa53561fb5c84097fd9a25b24c0f1ec5dc0,2025-03-03T14:15:42.437000 +CVE-2025-23570,0,1,c339e33fe57ee43e67044cf27eb7b67a55d9ba70ad791589ea878809139d8a71,2025-03-03T14:15:42.437000 CVE-2025-23571,0,0,3c56bf3d57cf36665f942829237cdd5ae4a799e329add61ae4a156fa2555e187,2025-02-14T13:15:44.330000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 CVE-2025-23574,0,0,693be34be21aa389e45f03519c1745c4eff22d58bf3f0cdd7ea8e91da34e3735,2025-01-27T15:15:12.123000 -CVE-2025-23575,0,0,a7035a5d332f1f8748762d43d71a8894880494c3768533a40bcdf92f8909a820,2025-03-03T14:15:42.583000 -CVE-2025-23576,0,0,387867185296d8ce21db4b977516d686563e9e63b7fe349b99670c19a24faf36,2025-03-03T14:15:42.723000 +CVE-2025-23575,0,1,7b05ba41f250ddcbecbf74abc1692502dc080941d9a776e17cc1448a7275b960,2025-03-03T14:15:42.583000 +CVE-2025-23576,0,1,6eb8fbc30dea3b57b664c21b56d95b873f41748c121b596bb9ab5fddf9e242cc,2025-03-03T14:15:42.723000 CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 CVE-2025-23578,0,0,ee4ac9c3f52bf3e6828c8c864df14edec5078c7df3f3b76d6589f390ffa3203c,2025-01-22T15:15:17.687000 -CVE-2025-23579,0,0,c104acf041e129106f4acd3689a26ba7d78d4d81b35dd4c8481fb47420853b66,2025-03-03T14:15:42.870000 +CVE-2025-23579,0,1,b09b62cae85791e8a289750cbb32e6588ce5d45d24f0b2c5e20253171571309a,2025-03-03T14:15:42.870000 CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000 CVE-2025-23581,0,0,bc35ed047d5786198f6e128d27e7b196ca682c0b368829b214432cb7ace93e7e,2025-02-03T15:15:21.107000 CVE-2025-23582,0,0,bcf56c1128fe5fb16f6f62e87cab58a793b9ab7e1fa5b5a80aac7c3d8e216d4e,2025-02-03T15:15:21.247000 CVE-2025-23583,0,0,e21f7ebc8eadc98fa31158db089c466226187c1b0b465dd4d4999f0dc6169f33,2025-01-22T15:15:17.820000 -CVE-2025-23584,0,0,4910a2b8b1b6aa4f797e55681d0c14de0699cfba3e4eace7b7cb2c635f03fc46,2025-03-03T14:15:43.010000 -CVE-2025-23585,0,0,5f1f18cc3603b4a0e8e8d65bbef0949c7d09daf389aaedb4af3efe0df5529865,2025-03-03T14:15:43.153000 -CVE-2025-23586,0,0,517f8bd089415e5aa845e36c9134315425142115e952e2c4ef0aaf9f7531f0bc,2025-03-03T14:15:43.293000 -CVE-2025-23587,0,0,0fa0855ea9516df92d85dc94726b8f09b0ac04b43df608cd3c831e725486aede,2025-03-03T14:15:43.437000 +CVE-2025-23584,0,1,d56379c9b68c4497a6836c525efb16d1d6115f0ceeacbb294a3455c1e1706ffe,2025-03-03T14:15:43.010000 +CVE-2025-23585,0,1,6f09d5fd87b654cf3a7313d10068a17994df135aa117432286e42c02e718527f,2025-03-03T14:15:43.153000 +CVE-2025-23586,0,1,8711e95686287772bcbcef61bbb246a90f2fb83f2658f49577fdb53d09468feb,2025-03-03T14:15:43.293000 +CVE-2025-23587,0,1,174284cc79c55a184b3ff45ea3fa8840d3892b939a229da20b0309c5bc59bee1,2025-03-03T14:15:43.437000 CVE-2025-23588,0,0,1af785b53f96b533dd98e54c9538faf12bf881f9e8326bbe76cebae0df2f2322,2025-02-03T15:15:21.387000 CVE-2025-23589,0,0,d3031a8ecc47da689c7d4aa40556ddad0607753b3fab7ef3ba59900b081a00b0,2025-01-22T15:15:17.950000 CVE-2025-23590,0,0,a1b29954928b913e5e1f3b7417373cb35c52e2e53f225fb77d38e3813eec7e4d,2025-02-03T15:15:21.530000 @@ -282861,12 +282861,12 @@ CVE-2025-23591,0,0,57144ee3b3111be5ef28bb855d873168905d6e4b6236127ce8be58efe5330 CVE-2025-23592,0,0,72113ec191c460928b32408598ed5488110be2a104138ddeee61c6f405231b43,2025-01-22T15:15:18.097000 CVE-2025-23593,0,0,aaa3e68323492fd453c38c81980209bbeabeeeb1c6f76a55c668815c2570b7d8,2025-02-03T15:15:21.827000 CVE-2025-23594,0,0,cf7f1fa31ac3cd50b92d1b9320d9426ae367e4be88f52e990dc79ec7fc8b6b6e,2025-02-03T15:15:21.980000 -CVE-2025-23595,0,0,15fea72e6fcb1e12b271fa77df3b57b43b86ed9a25a14d612a55519ab97497d4,2025-03-03T14:15:43.580000 +CVE-2025-23595,0,1,798cd7bead60318391ad1fa3957986b771cdc0fae820ef8adcdc45df75f7570a,2025-03-03T14:15:43.580000 CVE-2025-23596,0,0,c0c87db7b414295d6b37258b125c64c14eac275967c68ddf6e89f0af7a37c04d,2025-01-31T09:15:08.060000 CVE-2025-23597,0,0,cea463851f9e84dc4dd23a6193771cbf7bfb7af0f728bfc9f3248f50d515c2f7,2025-01-22T15:15:18.230000 CVE-2025-23598,0,0,87481f230259bf6caff4cdd796ec6a829051223d809c1dd41ebae2488d0f51a0,2025-02-14T13:15:44.483000 CVE-2025-23599,0,0,d05df5cc8092b2ef3ad2303b9842c8e30b1f9b745e52850641df822505ef2a9a,2025-02-03T15:15:22.127000 -CVE-2025-23600,0,0,da19dba1f4515668b580937d182a2c248e97288ea57adc733bd4172051294eb3,2025-03-03T14:15:43.717000 +CVE-2025-23600,0,1,1162c8130459cacae9a8e23e0859a5f5df2f4d77d9e7ef213c71c28c876f8ade,2025-03-03T14:15:43.717000 CVE-2025-23601,0,0,46c1fdfdf28a66086beaafaaeea851de5230b874b48166effa2de17c132d6628,2025-01-22T15:15:18.363000 CVE-2025-23602,0,0,d30be2a2699442d6075f3ffc9305b161d70bfc2cca96a60dac61452b8d1a5a89,2025-01-22T15:15:18.503000 CVE-2025-23603,0,0,03b3dfe62fdddd69f8d3397c21e27be44f84664445f86ebffe6e93d45ccfdd9f,2025-01-22T15:15:18.667000 @@ -282877,13 +282877,13 @@ CVE-2025-23607,0,0,644891006442e903fbf179ad53f57553b3ae1706983005c3775a2cd73265c CVE-2025-23609,0,0,2d1ae51d827307d5688ebafc347a4adf6cd78f47bdcd33d55e01a23dfca2ac4a,2025-01-22T15:15:19.343000 CVE-2025-23610,0,0,0bcb81d57261851ef09d1ff4eef60d378fd3132dcc27872e262fb4f82499c82e,2025-01-22T15:15:19.473000 CVE-2025-23611,0,0,d85c3eaa2a359ab1dd0cf8fc2d813b125c4ab2ba5978c80ec826f8303b177a52,2025-01-22T15:15:19.610000 -CVE-2025-23613,0,0,09d4284c8d6475423b01c4ebdeeeb05db9f5293ee2ed8410398c5d9f402e198a,2025-03-03T14:15:43.860000 +CVE-2025-23613,0,1,43926c9b1e96f0a71fe86cd36b5f0babf0459d8e1d39896f0c7bd144e4f07310,2025-03-03T14:15:43.860000 CVE-2025-23614,0,0,36691364b676964b65f6a3791ab255bbea85c7108423915a116f27407f31bc3a,2025-02-03T15:15:22.270000 -CVE-2025-23615,0,0,feaf6f854425cbddcdd30a3812aaee70f6441f1fb90174ab9993a34c1ac955a6,2025-03-03T14:15:43.997000 -CVE-2025-23616,0,0,cdfcb89939f719a8008cefb9aac6a5f424291262dd784af1e434035cd7a9cfc6,2025-03-03T14:15:44.140000 +CVE-2025-23615,0,1,ede0e0c26e76f23c55904f6cb505796accbaebe174753effb440d24cf3c99ea6,2025-03-03T14:15:43.997000 +CVE-2025-23616,0,1,78fd7be14cbd9c9ef889465da14ae42f66e53aa586fb8e21d34a660c059bd8c6,2025-03-03T14:15:44.140000 CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000 CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000 -CVE-2025-23619,0,0,4be0325bf27002e8379bbf92b516495e56cba250ce104afb34b15be3e25ab2bf,2025-03-03T14:15:44.280000 +CVE-2025-23619,0,1,a287ab8eaf1e91a0388d90721d0286c7cf5afb6907f91ab50f4fcbc818dea44f,2025-03-03T14:15:44.280000 CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000 CVE-2025-23621,0,0,76c56932aa480b0fc9415f2edd066f133dc916597ec40062485884ecf9f068be,2025-01-24T11:15:10.473000 CVE-2025-23622,0,0,b75f71cfcaa0f43b25d0e7f5273a3ee797d4eb0107e9ade598483efbf15f330b,2025-01-24T11:15:10.660000 @@ -282897,9 +282897,9 @@ CVE-2025-23629,0,0,01b9b5cb6314ff066c0384dbc296f566c2de494bce7708202e96de9eafd12 CVE-2025-23630,0,0,eeae9b548f90cb80fe09928d6af68398fad99a026c84c09866f64bbbceca5e8f,2025-01-22T15:15:19.877000 CVE-2025-23631,0,0,486c44b1477ef022b6afd511bfe7371c7a5e1239049e868a97d94bc96c8d247a,2025-01-22T15:15:20.013000 CVE-2025-23634,0,0,48e783563d53ec984be5a175a9f79a779ede5638e8c7f47318c460f317ddeb1f,2025-01-23T16:15:38.840000 -CVE-2025-23635,0,0,a5450bfd63ee5a9c819485bc47e43e408137ffbf1a5b7bb58dd41bc85c0e5120,2025-03-03T14:15:44.413000 +CVE-2025-23635,0,1,37219eaebcaf3c95cdd30f56d8e0031cbfd6f4aaee3ea55f7fbb76a80836830f,2025-03-03T14:15:44.413000 CVE-2025-23636,0,0,e471135e103e9f1102462023b0c8331f734cc9749182a76b579e62c7d60e2121,2025-01-23T16:15:38.983000 -CVE-2025-23637,0,0,dd01fb91b404fb83a25fa639041a94047db6a32609a81831e07f2768eb83f296,2025-03-03T14:15:44.553000 +CVE-2025-23637,0,1,b42ce519797a1817c2b62d7ca7bb179191fd50d636f74ef0ccaecacad055e0a9,2025-03-03T14:15:44.553000 CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000 CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000 CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000 @@ -282924,12 +282924,12 @@ CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 -CVE-2025-23663,0,0,678aed84cf5d961ed046ade58b89d44f4a75e137cba69bd82a02ac850a3540cc,2025-03-03T14:15:44.693000 +CVE-2025-23663,0,1,3b16fc5cd07873df17f7adf46ae853f4e8ae4c12979739b879112e0d5296e236,2025-03-03T14:15:44.693000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 -CVE-2025-23668,0,0,86e348c6ba5475e67c0dcd7151b45682c0abf0eca4cf9072e9d9ecc052e94b48,2025-03-03T14:15:44.833000 +CVE-2025-23668,0,1,447d6cc5f5b3f62673ad968834c74d2e9518d05227dc3654233c5c4a54f289f5,2025-03-03T14:15:44.833000 CVE-2025-23669,0,0,d1bc630e712a78731f318fb10d255700aeb84fda668fd5568dd1716510645cc3,2025-01-27T15:15:12.423000 -CVE-2025-23670,0,0,1a1d9ddf71a3af23c0fcf9e6980398b7178713815ba4d2b9609baaedd4b237d0,2025-03-03T14:15:44.970000 +CVE-2025-23670,0,1,75c342fc2ee2c426e92cef5e259a27bac2885c431e4042a31685cea50fc474b8,2025-03-03T14:15:44.970000 CVE-2025-23671,0,0,e807509054aea4938a91cc46517fc530776db152688d3d7e9ff4404f8050a084,2025-01-31T09:15:08.210000 CVE-2025-23672,0,0,ed0b60a87316bc71dff66c00e07e06614733370adc17528a90f1f5ea0631e03a,2025-01-22T15:15:20.287000 CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 @@ -282945,8 +282945,8 @@ CVE-2025-23683,0,0,11ab818cdded601704d5457da26238366cc9a2cdec8e1cfa4e95b50fb941a CVE-2025-23684,0,0,529ecfa4f2d7884c1c74d4451718ec8edc46df51f82091b8eeba652ef379906c,2025-02-18T20:15:27.947000 CVE-2025-23685,0,0,0ae9c880b577c05bd221b5d47c19ae7f8930d7d9f3014e4cbcee69e11cc74cc0,2025-02-03T15:15:22.420000 CVE-2025-23686,0,0,3faeff7525d93cc6d2031f95de86c7e21308c8342ae317b9dc855fcb527afe0f,2025-02-18T20:15:28.090000 -CVE-2025-23687,0,0,a062d47601c72b96a7b0ac661d6c70b2b4782e624ea753b9ec1d07c4535e69c5,2025-02-27T17:15:16.623000 -CVE-2025-23688,0,0,aa2e74157a39542e9e5d11ad8ba6dd45d0a354373bdf490df0d106f90376aeaf,2025-03-03T14:15:45.110000 +CVE-2025-23687,0,1,876e6d54688b44b42669275d89a8defe6e1fefe669c65559a08862a6cef41f97,2025-02-27T17:15:16.623000 +CVE-2025-23688,0,1,f434da30e858ec237146a49d4953ba99caeb27963c4d625ff5139f14c4c32c76,2025-03-03T14:15:45.110000 CVE-2025-23689,0,0,3a077a022662cdd0d4798ac2d9b9685961bbdf05d3a8d2e748b53124c3ed929b,2025-01-16T20:15:44.040000 CVE-2025-23690,0,0,b9e8b4ce7cf418df7c2c552d6aa61f7715b27609fc2dbb370252e45d7528a647,2025-01-16T20:15:44.197000 CVE-2025-23691,0,0,8bccb2407b1830314e082c5ccc8a74914d5f3fb937895330615769bfb1ba0062,2025-01-16T20:15:44.353000 @@ -282970,29 +282970,29 @@ CVE-2025-23711,0,0,2fcdef9ca63b638205dcb9063506c231a8c0b85956b4bdb5e0ed4971a8368 CVE-2025-23712,0,0,94aa96484213156f9d49bbdc6963c4fd02ab0d8cdee27a020eca5b412a516f8b,2025-01-16T20:15:45.800000 CVE-2025-23713,0,0,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e41a9,2025-01-16T20:15:45.940000 CVE-2025-23715,0,0,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000 -CVE-2025-23716,0,0,d016056c99079551abf6ed6c53c11468349496bd1e91f9fde5f489851a77be1c,2025-03-03T14:15:45.270000 +CVE-2025-23716,0,1,5171367fa24c2ec535ec8ea7104719d68a955f76a3c2d0f044290181daa866e4,2025-03-03T14:15:45.270000 CVE-2025-23717,0,0,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000 -CVE-2025-23718,0,0,f36762b75141a88ad0b9783f94bcc4f146c3498eecce8fa774a11016754ed15b,2025-03-03T14:15:45.440000 +CVE-2025-23718,0,1,7a53936f41b04505f6988d5d3234f9e8f77751c20704f456275780331b1c071f,2025-03-03T14:15:45.440000 CVE-2025-23720,0,0,4f4258f5d82ee9a1c0adeb945db0c0e48cfc2254164386bb711744a2792e3be7,2025-01-16T20:15:46.397000 -CVE-2025-23721,0,0,59f6c1ecf004b932005d6828653d280864e2bd9c4719f1601a520d393f51a961,2025-03-03T14:15:45.580000 +CVE-2025-23721,0,1,5da842c482516978c0a4c313356b5443363e4917e8de8df95e86ae14fe6cf6c0,2025-03-03T14:15:45.580000 CVE-2025-23722,0,0,c0bdf2b829d7a8bd43085e02d4e7e056c0d0ffd37b99bda77519f55464471ced,2025-01-23T16:15:39.117000 CVE-2025-23723,0,0,327ff890c66bc4f6304f57f95f2945f2096ccacf1bac80331923afdca5553d32,2025-01-23T16:15:39.260000 CVE-2025-23724,0,0,85759521dcceb6293655a1d413ae191700de02fc83895c480951d54c5ee558aa,2025-01-23T16:15:39.387000 CVE-2025-23725,0,0,b40e5b6eb6e24477dabcc116432421fc90ad60ce2752a67c8fd0c42466cd8176,2025-01-23T16:15:39.530000 -CVE-2025-23726,0,0,f80c067b07f21ef5153d90d1acf66cbd821b0b372a7e8e4ed1d798d6647bfc48,2025-03-03T14:15:45.723000 +CVE-2025-23726,0,1,a0fe614e020ba83fd462ec8b650e58782b0f231ad13d901184fdc4a3771c9110,2025-03-03T14:15:45.723000 CVE-2025-23727,0,0,06939e0ba718c2d1654b535cb4acdd19bc47301ebc0414aba09b8f3cba82ca80,2025-01-23T16:15:39.660000 CVE-2025-23729,0,0,cf1c2fd2efceda0b2319b0d4ce7dee8c6bda7b3cf825d2b54b8fdeafbe7c4d3c,2025-01-23T16:15:39.790000 CVE-2025-23730,0,0,6a3d7db8e71ff2248054b5e3980c0318785193417fad4c6b63c6b17ed4394eb7,2025-01-23T16:15:39.933000 -CVE-2025-23731,0,0,39ef42f7084553ea2dbfd30259a75dd23c120645791c3651bc23bc918ffa132d,2025-03-03T14:15:45.863000 +CVE-2025-23731,0,1,7b8447e98cf75bdd89bd1daf32a2cac60c92c405281240a88eada8c988c0634e,2025-03-03T14:15:45.863000 CVE-2025-23732,0,0,a319b2653140b4341d08717a159e17e281e96faa4531ef7eaf2b0aebc3064bd0,2025-01-22T15:15:22.640000 CVE-2025-23733,0,0,ba14d7b711147bcf408bf8e6bd2e361fbeeaf786be070e9273bee40e739e6a4d,2025-01-23T16:15:40.073000 CVE-2025-23734,0,0,d08399ebf6e8fdb4054e549d4b1f5dfafe09daa5e675446b005341c5933da542,2025-01-24T11:15:10.967000 -CVE-2025-23736,0,0,9131d7dcfcb97d0ae961a3a3097ae60a78fab64df4dca2364283395b564ae2c4,2025-03-03T14:15:46.003000 +CVE-2025-23736,0,1,493a042cb31b6b5306b02facd810c198708aca4614c0f820934b8a65f42b454b,2025-03-03T14:15:46.003000 CVE-2025-23737,0,0,607d60dbc000683cdb744c3f8a0ff459baac89a608490796576d67926bb66926,2025-01-24T11:15:11.103000 -CVE-2025-23738,0,0,f885f04b22320649373fe828cbe1e38b6411cb2a758056a6949863d8f78937f5,2025-03-03T14:15:46.157000 -CVE-2025-23739,0,0,a40abb4cc5ed4e40d3965b29fd408eea76b83ec28b89a7c72f12c0bf33697e92,2025-03-03T14:15:46.300000 -CVE-2025-23740,0,0,29d542b0f53faaef4eded198e5f7a55b8b37dd6000c3360cb9fa81ba839be310,2025-03-03T14:15:46.443000 -CVE-2025-23741,0,0,e73754a948bc07e600ba59dcfd31fef3bcbffc40b80f117ba180c8ce677acf97,2025-03-03T14:15:46.580000 +CVE-2025-23738,0,1,45681ac312c33efad51ea49920fadb51fe5ad8b4e9d1c3051a360c48a0a94bdc,2025-03-03T14:15:46.157000 +CVE-2025-23739,0,1,52760f9be6db4ab35952ccb3bf77481cfd6f2f997733e57aa402a4877942b915,2025-03-03T14:15:46.300000 +CVE-2025-23740,0,1,c532486db611b385bd47cedb9a1dd61d4702365019bd2639ebb40b627bfd5d50,2025-03-03T14:15:46.443000 +CVE-2025-23741,0,1,98bba09c19ad4a09ef1f7e3be69875a470dbb25a7ab7c4e4613e36cca844754b,2025-03-03T14:15:46.580000 CVE-2025-23742,0,0,b201c2107bf925baad36a640efc91a7c932130b1fa30126bc2ac8036c1e569f4,2025-02-14T13:15:46.033000 CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 @@ -283003,7 +283003,7 @@ CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753 CVE-2025-23750,0,0,6ea37f4f9522ca2e0280209c27b390eeef98a740a6b7dd025e33315154a79c4d,2025-02-14T13:15:46.313000 CVE-2025-23751,0,0,7cf5b5e2bcbd02d848667bb01cc756fab7e385c1a81149116d1dac297dcb5b22,2025-02-14T13:15:46.450000 CVE-2025-23752,0,0,2500631a89072de355d82cd9d0c12e88188eee2a9b43146cab8ef211fe41e0db,2025-01-27T15:15:12.570000 -CVE-2025-23753,0,0,a761fc6ddde3499da4543d00111e08d8f8091b2ee9b02127de8a14670e69701a,2025-03-03T14:15:46.720000 +CVE-2025-23753,0,1,4ebaa5c8c020dfe7091376b7f15c351c6e873d170bf0be34270dc1ff0d7d4114,2025-03-03T14:15:46.720000 CVE-2025-23754,0,0,a8976bb97c2ae00c11653e47f47011f7edf0df2e28ad66f466282475f032adde,2025-01-27T15:15:12.727000 CVE-2025-23755,0,0,25f04dc206db1f71f9a2018ea14d136fcdb89733c2fde78659dbf54e9d738404,2025-02-03T15:15:22.697000 CVE-2025-23756,0,0,16f0545268cdd6fe2d0ba6c79450b1cdbe855a937348abdf7b97b7019cbf9e0b,2025-01-27T15:15:12.877000 @@ -283011,8 +283011,8 @@ CVE-2025-23758,0,0,883e63d47bc45719a96ecb50615a8b44169717013146e3d5a21d6bf8acc18 CVE-2025-23759,0,0,44cf985abe1790da5a65f21e2773ee03c2d5bf51b4f98d8aa88b9f240167db9f,2025-01-31T09:15:08.357000 CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 -CVE-2025-23762,0,0,c5fd9de47a8ca0156402a968e52ba355b045e688cd33187a2d9414a72f9c60b4,2025-03-03T14:15:46.860000 -CVE-2025-23763,0,0,1375025b12efcb46e40594c1a809d93606976cd57b25d04791175cb724766fdc,2025-03-03T14:15:47 +CVE-2025-23762,0,1,a9af6c1812935ab7005f70117b295263911f743fc56acd476186fe10646f8fcf,2025-03-03T14:15:46.860000 +CVE-2025-23763,0,1,8f85591a5e57921e03d9e3c1f08b017ae4548d4aa6ce76dc1fe1cc83256ea90b,2025-03-03T14:15:47 CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000 CVE-2025-23765,0,0,2796d242b4e694c96282a5c8ffeecba3b80388403b475a6ae706c6a35a37e943,2025-01-16T21:15:18.700000 CVE-2025-23766,0,0,6f8788466ea1e979883e67d78e53062fd0f4dadf013cf2e27f44d7bfd409f335,2025-02-14T13:15:46.583000 @@ -283060,8 +283060,8 @@ CVE-2025-23809,0,0,e4d8ab24925754ce1ceb1aac20374346938ff78ccd5ebe9cba6a3cb39ad59 CVE-2025-23810,0,0,3d886969fb81b13e95f7725e8aa5117b9c91c9b06310f0521237e64ca9eef400,2025-01-16T21:15:22.107000 CVE-2025-23811,0,0,aeb0bca809888e8a2f8b0c81b6ebd8caf62a27a7e7c72a06995d8ae53ef2be67,2025-01-22T15:15:24.297000 CVE-2025-23812,0,0,797de7752c23e203568847ac02c79ce570616871d6f8a90a6d5cabd8571ade96,2025-01-22T15:15:24.437000 -CVE-2025-23813,0,0,4d7577beeaa62e358290c0c2be22e725ccaf6d63c0b92256c7e3b15d59e03213,2025-03-03T14:15:47.140000 -CVE-2025-23814,0,0,69e541a6b2b57e97986bfa2631f5f14573ad97d8a05b7fa803863e783bd22f2b,2025-03-03T14:15:47.280000 +CVE-2025-23813,0,1,5cfe1665137313419951e0e4c0ba94e4df46d3d4c0bf0ece582de120e4e1946c,2025-03-03T14:15:47.140000 +CVE-2025-23814,0,1,25231d81a75e118332d8f95a7d4044696066bd9868af5f35e8b3b885f77fb7bc,2025-03-03T14:15:47.280000 CVE-2025-23815,0,0,4a53eeb2a80c868296a8df4afc48475dd10d854a2810a22ebcb90f3a1fb7faf3,2025-01-16T21:15:22.257000 CVE-2025-23816,0,0,99e7a2982284cfe1c4b342546ab2ac7819e99932258e5aada2c1a28f9b0c569b,2025-01-16T21:15:22.407000 CVE-2025-23817,0,0,64c5a2eba1c8283bdb068da6e45257681009c02912f79237808c3a614cc30aa9,2025-01-16T21:15:22.560000 @@ -283076,7 +283076,7 @@ CVE-2025-23825,0,0,071b5ab2f842a4dac9b41a43284e1d60e4dd4711f28bd3ba85186d4acb27b CVE-2025-23826,0,0,31cc4f889fe54c4f547abb60cc2ead671f3ef1f0e15ebb2f69c4ac4c9eb9f183,2025-01-16T21:15:23.720000 CVE-2025-23827,0,0,2ba64e27ab682dd5ec54367bbedbdcbbff79cebacb1bc86ea6bb734008f4861b,2025-01-16T21:15:23.873000 CVE-2025-23828,0,0,5cbd4d2f58506793d3df94a0bc780e8d14ab5e4da9eff853b88189304863a098,2025-01-16T21:15:24.047000 -CVE-2025-23829,0,0,8f0c5d710512be5f21e943c4f0563e6ea867db53e1de13143a7550b9d4cf0b19,2025-03-03T14:15:47.417000 +CVE-2025-23829,0,1,a557fbf33ff63349e4bc09921080681d85de7efbc7ffd844ce82b08dc1670d31,2025-03-03T14:15:47.417000 CVE-2025-23830,0,0,b29c1dbb724e30118134483053c6856e5726b7a86f2f6d719fdcfca154e0a8a7,2025-01-16T21:15:24.213000 CVE-2025-23831,0,0,5197c9bfacc7e149482a79695ac12aead57f227753093688448b8bbc9868aa27,2025-01-16T21:15:24.360000 CVE-2025-23832,0,0,2679ff496b3a637ccd709dc676c5ecac70472f75fa8b558e60904410452695ff,2025-01-16T21:15:24.510000 @@ -283090,16 +283090,16 @@ CVE-2025-23839,0,0,c711cdfd3a6cd8df3981e46ebebb623db7f4f50ebcbba001c1ca48594578b CVE-2025-23840,0,0,f0f7548a18e4cfedb3688e9fbc7414acc68ef02d31e6af775d6a7349c3921d9c,2025-02-17T12:15:27.973000 CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 -CVE-2025-23843,0,0,29d2796343475cde388af0477385302e8f99db7121c72aeba030f5a872191576,2025-03-03T14:15:47.583000 +CVE-2025-23843,0,1,2e10533a31dc886f6dd7da20114bf8a60ee7f5c9cf0af697dbd4c55559b8485f,2025-03-03T14:15:47.583000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 CVE-2025-23845,0,0,704388ad9715a6095e5c19469c8d6736ddabb3114c3d928fbe8cb9a12e65b295,2025-02-17T12:15:28.127000 CVE-2025-23846,0,0,ea1add75e4166af75969247fd7072cf309971d9564e41b3b3aa5ab3aed42b97c,2025-01-22T15:15:24.570000 -CVE-2025-23847,0,0,543531e94e152d732bb86cfd38fe6b8a60f31a1639aa21988c1400a991303437,2025-03-03T14:15:47.730000 +CVE-2025-23847,0,1,c03a596217ee296567fddabb246e1fac08d0949a40c1551fde84a843f8749682,2025-03-03T14:15:47.730000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 CVE-2025-23849,0,0,7076f9fcf4e7216b0f5ca136c4ea4a88f8fc78bd3d3c6b722ad7847e399fd28f,2025-01-27T15:15:13.087000 -CVE-2025-23850,0,0,ca2089fdc52da0f4841e4dcbc1f0d2ee728fa0eb84085fa7f4d8f3b2783002b6,2025-03-03T14:15:47.870000 +CVE-2025-23850,0,1,7917083345489836d0b9350fb892a5392f05b010ccf87e3b6c820b24effcfb5b,2025-03-03T14:15:47.870000 CVE-2025-23851,0,0,45cd563fd26573e18f7597f8a91796eb4d7bea4673dae9c99c4f2ca6dc5dfd24,2025-02-14T13:15:47.550000 -CVE-2025-23852,0,0,be7b7af6559b099f8899470cb6cd40f9cc676209a0cca05f5d08d0086ba90a27,2025-03-03T14:15:48.013000 +CVE-2025-23852,0,1,af6161c2e1eaf6dc31b7ef696e3d279f110159ada7f456a1b82062ece30ffff6,2025-03-03T14:15:48.013000 CVE-2025-23853,0,0,ef0cda26dc0e79d1c47dc7e28d69e1254f0dace4fced367382184e4831286f9c,2025-02-14T13:15:47.700000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 @@ -283124,11 +283124,11 @@ CVE-2025-23875,0,0,16f54e792dc7d4a56ea38d4496bd3b79642a5531dd27f8c7625708b8f8972 CVE-2025-23876,0,0,f11fbcf0ce95bac97cefd73d61ac714e53732fcd35e4b468f025890b159066c2,2025-01-16T21:15:28.763000 CVE-2025-23877,0,0,67025350455285a68998b55a0ec477bcc912252817d20c216ea4c1dcc27f2fb9,2025-01-16T21:15:28.963000 CVE-2025-23878,0,0,807177fe8c69371ec7b74f4303cca26584dc822ecc32e3bde8ff81af05f082df,2025-01-16T21:15:29.140000 -CVE-2025-23879,0,0,87518c93f6f7e42391cfa41185300d2090149ee367c5f8c67af8a3d9d24104d2,2025-03-03T14:15:48.157000 +CVE-2025-23879,0,1,b2952b2b3b9f2e6d21a2b8df4b97f96ed0d03aa1f4cb7a73217e5bd448cc3ea9,2025-03-03T14:15:48.157000 CVE-2025-23880,0,0,71a75ff3204104210dc427f5d046fe7419ca87cd3fedcae98d2508e2784497e7,2025-01-16T21:15:29.310000 -CVE-2025-23881,0,0,535b4bdb5304b6854adefa2b25cdaf84a0c2d3023805271f932708856656a523,2025-03-03T14:15:48.290000 +CVE-2025-23881,0,1,7ec344d636a43c592accf1f4f4df07c193dbe96107cf8f905e8c746ee3e23207,2025-03-03T14:15:48.290000 CVE-2025-23882,0,0,8e318f93a2e3087a84cc639e5bee8fad1331e5d359fbd4910e1c30d70a6cee6f,2025-01-22T15:15:25.123000 -CVE-2025-23883,0,0,a3aded4ba7382a9ef49b463ae9c7b7ff3e68aff75af1cb09d3716b44f91071a3,2025-03-03T14:15:48.430000 +CVE-2025-23883,0,1,562fbd7a351864dc11260d6e8d6a8df2873af67fdd95a8e42e6578ff876bb361,2025-03-03T14:15:48.430000 CVE-2025-23884,0,0,2def982b7cbe8992747b18233289c0f945bb92c66265a1e1ac9f76f2473c47c3,2025-01-16T21:15:29.730000 CVE-2025-23885,0,0,093c1d452b83446d22ae9a842c82320a89ffdbec7ad459f32fc079a07cbe06ff,2025-01-24T11:15:11.660000 CVE-2025-23886,0,0,5adc366069b87d101e00a6524456b5154407eae636225dee1ada8aae236060c3,2025-01-16T21:15:29.927000 @@ -283148,8 +283148,8 @@ CVE-2025-23899,0,0,598182d1621caa24bf3c481ede2ce2b83897d5764a80f40ca9f00a668f077 CVE-2025-23900,0,0,68aba21ddce77b08fbaa0dad71c040e65c232f030b0b325ddea5744be386b9b2,2025-01-16T21:15:31.857000 CVE-2025-23901,0,0,bf3c3b7205ed6fc1b684ded669be915dd1c9b905481743bdf15fb28a8c514c0e,2025-01-16T21:15:32.027000 CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb7023083e,2025-01-16T21:15:32.173000 -CVE-2025-23903,0,0,9df018cfc6f909d32ac14192cabe32d92189655b30c0b2563327ab7c86d41d06,2025-03-03T14:15:48.573000 -CVE-2025-23904,0,0,e1b77993b871845d4b1589f5de75445e92913d5b3a0a17a4275b6a736bf63039,2025-03-03T14:15:48.720000 +CVE-2025-23903,0,1,b4be5761c29453bbb1be8ab650c68d1adbf43690b2b0f40f5f520796a30a8cf6,2025-03-03T14:15:48.573000 +CVE-2025-23904,0,1,c3ed18231b1cb7881c9bdb6b8f59dd936d9fdcbc15fd05e38bba4158006e34b7,2025-03-03T14:15:48.720000 CVE-2025-23905,0,0,e6df51fd666e2c8113ce848afa63ebc2d7c3d50c4fb01b44668236357fa834a0,2025-02-14T13:15:47.973000 CVE-2025-23907,0,0,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000 CVE-2025-23908,0,0,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000 @@ -283188,7 +283188,7 @@ CVE-2025-23941,0,0,1c0020dfccb64dc56163de9642fbb38130446635c08bc70e04e868e60ee25 CVE-2025-23942,0,0,fcd7834ddd5fcf9c8adda6d596de5dbab6d454234546c07da702feb6e1ca2a9e,2025-01-22T15:15:26.103000 CVE-2025-23943,0,0,b11e5fd30a25f84e994f31d10cb8bcc269623009eb1bca3cbe37db51ed9b30fe,2025-01-16T21:15:36.373000 CVE-2025-23944,0,0,6784fbc128279e298d8489399d1bf90d39ae34198f44be1ea34d2e37df5c705b,2025-01-22T15:15:26.240000 -CVE-2025-23945,0,0,3e4d472da12049ed59bb3026de90c4f221c8886bbc477764f20ba5e4539aeaf5,2025-03-03T14:15:48.863000 +CVE-2025-23945,0,1,9d6ca114813d6d43ad126a5126e063c39502f62bbe4b3d6318211ce7d61e5bbd,2025-03-03T14:15:48.863000 CVE-2025-23946,0,0,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115806,2025-01-16T21:15:36.520000 CVE-2025-23947,0,0,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000 CVE-2025-23948,0,0,fa217fc33fb3c65287110150a4613d620cf18c0fe66132ab121eab1307585f10,2025-01-22T15:15:26.383000 @@ -283198,7 +283198,7 @@ CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb CVE-2025-23953,0,0,f6f03bfe88f28bb6450de0d0a10e28b0ddc76002765b30baa9464de96156821e,2025-01-22T15:15:26.670000 CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144287,2025-01-16T21:15:37.133000 CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 -CVE-2025-23956,0,0,49b33ed056e081448aae8d99df9bd71034f0c97669a6a06730170a8c6033197f,2025-03-03T14:15:49.010000 +CVE-2025-23956,0,1,15f2dcb32df35e2b8473f6870c5d0b4c83cc77afd7741dc7fb30f1d524230e01,2025-03-03T14:15:49.010000 CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000 CVE-2025-23959,0,0,4d3ba4ca608a53eb6870e6e5b2be4b542170ae3caec5feb8a182291e655509aa,2025-01-22T15:15:26.810000 CVE-2025-23960,0,0,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b8298e8,2025-01-23T16:15:40.777000 @@ -283235,7 +283235,7 @@ CVE-2025-24017,0,0,4127b8a7fb48204ccdedd278270e1a824a4426e6472255b67fd4d2229bebb CVE-2025-24018,0,0,e4baea09df10b36d105667a7249c05293515d725374ccb74ed2a1fb48a8a06d4,2025-01-21T18:15:17.803000 CVE-2025-24019,0,0,2a3a6a9851c247290336c704932309ffb09f759a478660ebcaeee5a66d59a10f,2025-01-21T18:15:17.933000 CVE-2025-24020,0,0,285e20714349f7ac830f6a14f1541e73cc305a3a9f896b0ecc137956f3014986,2025-02-13T19:01:51.927000 -CVE-2025-24023,0,0,e8fdef59197c9924a10fdfa91dbf4507403955b870c2d28a819e357561bf0cd8,2025-03-03T16:15:41.820000 +CVE-2025-24023,0,1,487e59877dba3eefbd0158851f274e26cd7e9abbc70e9ae8220ee1de22a9f231,2025-03-07T19:37:57.623000 CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000 CVE-2025-24025,0,0,d0deb6cc735d18f2d50160ca3518f33216e8d39f408db984acc4bbc8bf3a9a39,2025-01-24T21:15:11.600000 CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000 @@ -283252,40 +283252,40 @@ CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5e CVE-2025-24085,0,0,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 -CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000 -CVE-2025-24093,0,0,156609491120a36cfe5d7041dab34473bf0251ce712c0d8629c02fa0184fd137,2025-02-18T20:15:29.167000 +CVE-2025-24092,0,1,3aa2d06d87ef3fdeeea46531ff97ecfdcf2ce3948ca55a1ae44601e8047b47d4,2025-02-18T20:15:29.027000 +CVE-2025-24093,0,1,fd5289633cd2e63239cc0665b23c647a80a0d565fffe703eeedce4b7fb7b841f,2025-02-18T20:15:29.167000 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 CVE-2025-24099,0,0,bf5f193f6955d17677c9bbd38a16fb2cb4d180384d904deff36c964f273c2b6e,2025-01-30T22:15:10.160000 CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 CVE-2025-24101,0,0,cfa73f025b906238e4fa3a5f8212a4ceae53770bd5f87a4a86909b9256810a91,2025-01-29T17:15:29.547000 -CVE-2025-24102,0,0,5575e1230f0a5c4bdcd475fbe3455feda8b9eb23923f585aec0a2a6f5a9dcc16,2025-02-18T20:15:29.263000 -CVE-2025-24103,0,0,c13d5489a65f348fd6fed208251f62cb04bd2fd9e55038431d761bdf310c87e5,2025-02-18T20:15:29.353000 +CVE-2025-24102,0,1,ab0a87dcd7e5a26d34ae9d675723367aebf9570c32c854472c70e95b35517f99,2025-02-18T20:15:29.263000 +CVE-2025-24103,0,1,8cfe8c7d9c992094554a7875bcc30b941a0a38281fb552ffa8fc42799062e536,2025-03-03T22:45:38.540000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 -CVE-2025-24106,0,0,c6f96e78c7dee3b7f4e7c4af9b75d1f81a616b71066fc6706b994cbcd683fac4,2025-02-18T20:15:29.460000 +CVE-2025-24106,0,1,02ccb095f0e70a7fe0c902526623505af52b8d69ff4086adf29c7bde65bd46bd,2025-03-03T22:45:38.540000 CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 -CVE-2025-24108,0,0,ca0a06c843a154828247c34a96c81561360d51d4224f49664d96d904783b4e77,2025-02-18T20:15:29.550000 -CVE-2025-24109,0,0,28657e4ddb74abfdbaa89a322eeedadd5663ba658cb00d60249ad7d170ed32d9,2025-02-18T20:15:29.650000 +CVE-2025-24108,0,1,a2ce46be7ccedbb76b63219e46d2fd3f9830cbf0723f18d89248d459dd7429d7,2025-03-03T22:45:38.540000 +CVE-2025-24109,0,1,fa02d80302792ef4ae7ed3a01023a6d32f02a8a184789233725b93eb8347d6ec,2025-03-03T22:45:38.540000 CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000 CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000 -CVE-2025-24115,0,0,178216d9d2860353402343bb9131ab27aa40ea075cfe74a3e11e6dc9d48ce7ab,2025-02-18T20:15:29.740000 +CVE-2025-24115,0,1,6333b34946e24f94687a0ef611eab70593b3781b8190e3411611c01fc36d07b5,2025-03-03T22:45:38.540000 CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000 CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000 -CVE-2025-24118,0,0,60844d516ad2a278cd76012c4ac43a96ebc850f676999de7287d3bbb08f17e9a,2025-02-18T20:15:29.843000 +CVE-2025-24118,0,1,023f443e37c6f54a8d7153e9bb637416003e9fb11314b863a8a4c4dd8ec01285,2025-03-03T22:45:38.540000 CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 -CVE-2025-24122,0,0,86654f180aaeda405a47c505a5e9a67c3cc6f7103476538f70a02764a7f3837b,2025-02-18T20:15:29.930000 -CVE-2025-24123,0,0,a4bf71fa4d7406c5c5cb3a47ce3a597906e725d458851c710a2522141a7799f9,2025-02-18T20:15:30.023000 -CVE-2025-24124,0,0,5420884f41670b95bfbaa0a5e38963a58fdcf1453a00e96b01153e77872ad5fb,2025-02-18T20:15:30.150000 -CVE-2025-24126,0,0,2596a01198a0ca07effca56c4e9107f17c36439341bc383ad1f6b455fb5c0e83,2025-02-18T19:15:27.383000 +CVE-2025-24122,0,1,8af910268ecaf17cb5f5483cea8a033ac3d1f0ecfd7199150a59976de38695b7,2025-03-03T22:45:38.540000 +CVE-2025-24123,0,1,bf9d5bdd9c5809af5421384fd9af47d31376776aebcff6ab72059ba1624c240e,2025-03-03T22:45:38.540000 +CVE-2025-24124,0,1,86138f6ad4c672744dc61a586e58238e199eee1ff8492297c72c1a05245a8544,2025-03-03T22:45:38.540000 +CVE-2025-24126,0,1,50a001a59f4bcbca75c2612554a98fc24ec331aed69d9f275d4f8c73da66a946,2025-03-03T22:45:38.540000 CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 CVE-2025-24128,0,0,b692dd6c3705d2f67ed46ab7eedb7af0c180ec823dc1f4569da7249148d6fcf7,2025-01-31T22:15:13.607000 CVE-2025-24129,0,0,f1e90fe08a69d64c55e11da92a9b3bc28db0dd31ae84f052c11f85bf5bf81c15,2025-01-31T22:15:13.773000 -CVE-2025-24130,0,0,703b882944cd20f1f7fb460e50541fa0623a83c84be4923580397243fc7f08d2,2025-02-18T19:15:27.483000 +CVE-2025-24130,0,1,a12d8dd0c5156a924ae186620b27419836ec44f4aaebb64d055cbe1378313919,2025-03-03T22:45:38.540000 CVE-2025-24131,0,0,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 -CVE-2025-24134,0,0,0c683aca16650cba75e3babdfbf82ff05ac131613d626c76475d340ad10dc38a,2025-02-18T20:15:30.250000 -CVE-2025-24135,0,0,4c3c3c0434830cffc0933e7b5869d1ca806558bf6795e7bd12328ab2d197e45b,2025-02-18T20:15:30.337000 +CVE-2025-24134,0,1,1264c02893561558203f105e1210df02790eee096151b475279f346c35d12a69,2025-03-03T22:45:38.540000 +CVE-2025-24135,0,1,64f68b36def208dd2af5b784709dbfaf4bedc8ee73418176b52e9000c8611a2d,2025-03-03T22:45:38.540000 CVE-2025-24136,0,0,99cbf9af0701a5c7d99024811eeebb1ea5477be0a4beb1c13eeebd005ca7fe71,2025-02-04T22:15:42.370000 CVE-2025-24137,0,0,c89069b81199a98d3b8d24e0cef97a84ed29270991418ebc99e73daf8a9f515a,2025-01-28T20:15:56.410000 CVE-2025-24138,0,0,44bdbfaf2f4e7325d64233f1429f8283b019d66038c072fef616afe04aadc6b0,2025-03-03T22:45:11.697000 @@ -283294,7 +283294,7 @@ CVE-2025-24140,0,0,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc CVE-2025-24141,0,0,7fc396b14c28529aacc4a130c180a099971b0a3329c75121f4e1cc3751488bf3,2025-02-04T22:15:42.527000 CVE-2025-24143,0,0,d6b0dc9e7b05ff53033a444fff93575e464a6a2b7f6b588a53bde953edb8e039,2025-02-04T22:15:42.697000 CVE-2025-24145,0,0,b130f3a7f34dacbf8f60160fa62ed4f9e3a7c741eee662787d15d39ded800009,2025-02-04T22:15:42.877000 -CVE-2025-24146,0,0,d8cea1e68c5f6b324e48e4c9acc5d5075ad5fda4d855d256ed748a031d53b306,2025-02-18T20:15:30.620000 +CVE-2025-24146,0,1,cd551f11da7235765bf6b4b9acae15352e7ea84b6c0e91142c2339fc99851999,2025-02-18T20:15:30.620000 CVE-2025-24149,0,0,552df760f07bc4a97b700c3b01551826bcbc8f3503a830a4371f27c5517839cb,2025-03-03T22:45:11.697000 CVE-2025-24150,0,0,b57965dad8218b33eb0f705e2c70a2d88ee1011a034996083539ca2cb700960b,2025-02-05T16:15:42.517000 CVE-2025-24151,0,0,950a99a3a84c05cce3abc68b154a568d7831984ad21dca6992c3b53f058d5488,2025-03-03T22:45:11.697000 @@ -283303,7 +283303,7 @@ CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981 CVE-2025-24154,0,0,68781c32643d4a4647d268730cbc4a6b1bead434915adcfe349a49da6f2e8950,2025-03-03T22:45:11.697000 CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000 CVE-2025-24158,0,0,7fa125e47f84590a4dd646ce392f580e4156a2cc3ef03e6e070d993a831ca04a,2025-03-03T22:45:11.697000 -CVE-2025-24159,0,0,f5b14f1b371b90b78ccfc8a5012ffb280a50db51e47b06657f4582cef939bac0,2025-02-18T20:15:31.100000 +CVE-2025-24159,0,1,179a9b6942305f6db7a6d4187891ffc38c7b9369f0a04287a4b04617fb16ae13,2025-03-03T22:45:11.697000 CVE-2025-24160,0,0,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 CVE-2025-24162,0,0,e35adbdd28b58f3416e1990717301769eb1f37cee7f58608b67915d4d6f77616,2025-03-03T22:45:11.697000 @@ -283313,12 +283313,12 @@ CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db CVE-2025-24174,0,0,95dfb379df306aeb43eb6243b1abac4c2b93f5fa4cc8ec6eac185094887da287,2025-03-03T22:45:11.697000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 -CVE-2025-24200,0,0,d9c7918e8a07e18518c12bcf14fe92863d4e1d1a93377db97d110f68957cafff,2025-02-18T18:15:33.667000 -CVE-2025-24301,0,0,59239fef4b27eeed85b6fe6c71f37171a7e684fafcc3ed8933ce31676a0f5a14,2025-03-04T17:12:06.513000 -CVE-2025-24309,0,0,9fdc72038f56947ecf9d9d30185e97627ee6f41dea81dd9e019935de6baa9993,2025-03-04T17:12:06.513000 +CVE-2025-24200,0,1,25400eb87be817df8c7c87a3279a41776a1e6f982935bdc20765635067fa7eed,2025-03-06T19:48:51.880000 +CVE-2025-24301,0,1,053ad1655536b1ab1dd3f965481b1a26b1fc614d01aa30bb417618912a6f4ec7,2025-03-04T17:12:06.513000 +CVE-2025-24309,0,1,e0b728d88c10e7a52424c580fcfcdafa41ec5aecc92adb9e7dcec0028f63ad77,2025-03-04T17:12:06.513000 CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000 -CVE-2025-24316,0,0,770bef4f97559304e30386e8115bd7582afb0c9db56f36e83bccb579d61f5751,2025-02-28T17:15:16.790000 -CVE-2025-24318,0,0,141558a454419e2326c0c64b4fbc3e837b318d293574156c8e8685ddefe4e612,2025-02-28T17:15:16.937000 +CVE-2025-24316,0,1,3d67fc5ca9257bdefdc420f872260ce49c49fc7bc45018e469adac707c1de56f,2025-02-28T17:15:16.790000 +CVE-2025-24318,0,1,45737d4f27e86b0669543a856f157a50a0c8a223d43ce9658341d0666e6cb01e,2025-02-28T17:15:16.937000 CVE-2025-24319,0,0,9187be60b0cac196c7936aff1f9769e0582f5aeeb7750ad9a385d1c3e1292585,2025-02-05T18:15:34.557000 CVE-2025-24320,0,0,22204bebd126ec0b8efa20c54300c5d2c2817352b294d53c5a23f29d2ef87e4f,2025-02-05T18:15:34.960000 CVE-2025-24326,0,0,dd13af4709b7b17ac448c947eb2606b60fddc8b7e04055280df591b39ac70dcf,2025-02-05T18:15:35.420000 @@ -283355,37 +283355,37 @@ CVE-2025-24400,0,0,fc2d35dcc02dfde6472cd44ddd220493709314070b1167c1ac10abb11d37e CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 -CVE-2025-24406,0,0,ec96ced1a48875dc6ca2d8cecf0bde2d5b4d644dcaed7a03315f42978cf64d55,2025-02-27T21:15:37.383000 -CVE-2025-24407,0,0,f099027fa2eb89899153409446fca7ff62b73694daa446b5bd60997657b792f5,2025-02-27T21:15:37.583000 -CVE-2025-24408,0,0,e4a6b1ee8c23244d7789aad0af88a5e761f7cd0f42fb9ead023dda14bf9e5ee4,2025-02-27T21:15:37.717000 -CVE-2025-24409,0,0,fdfe7236425c92c90279a3f394d69517e34846764e83772e6689dacc4844f0cd,2025-02-27T21:15:37.863000 -CVE-2025-24410,0,0,55932038efd431f8316e3afcb61ebef9ab0cc6df0869f6ae4de0990242ea68af,2025-02-27T21:15:38.017000 -CVE-2025-24411,0,0,3743affda26963f74192f38ca346ddcb96cdc191c808e26e1a9056a4ed9af016,2025-02-27T21:15:38.160000 -CVE-2025-24412,0,0,ed658a2f39882fb76f6c45248a22c4a64678525508f6cd811f46d59b7caa5659,2025-02-27T21:15:38.317000 -CVE-2025-24413,0,0,adcd915efb0bcc99f079befb7171372dc52d987525ce81a6aeeb8de6c206bf0a,2025-02-27T21:15:38.470000 -CVE-2025-24414,0,0,d967ef5e5f66dd9f315541e7e55025fc0f70d9179058291e0cb2c030470776e2,2025-02-27T21:15:38.617000 -CVE-2025-24415,0,0,03b62edc0bd3e98972f773e0e1498b29bb1b83a51c384045e565962178050159,2025-02-27T21:15:38.763000 -CVE-2025-24416,0,0,8fddd8fc3bd06562892ae06c59c19aaa7194973d1cd2afe8eb47c58ded87c712,2025-02-27T21:15:38.910000 -CVE-2025-24417,0,0,17c95a635c901f3b86b126776bd93fb7fd29d8d110dbd3aeaf1609776f7f72e0,2025-02-27T21:15:39.070000 -CVE-2025-24418,0,0,35ebc5399af364d13c5cfab8a21ee976708298d00256f84b7947631351afbe1e,2025-02-27T21:15:39.260000 -CVE-2025-24419,0,0,867e106b68014b455aaf7e745db40fcd591f8725fa4e522d4f5258fe71ad2002,2025-02-27T21:15:39.400000 -CVE-2025-24420,0,0,0985f1de9f6e2e4e65af3d2b08d98909b67a1b35fcc14e71eda18ccd6adcfe08,2025-02-27T21:15:39.553000 -CVE-2025-24421,0,0,f7231d1ed1e8382ef3f8298d19e4c7f93af6656e975b93d1fc1ab12e81d5579f,2025-02-27T21:15:39.693000 -CVE-2025-24422,0,0,ec2f8056eb5c353a70abe15e5ea8a5ef0a47224a0e057d3ea39bb7a2cb503968,2025-02-27T21:15:39.850000 -CVE-2025-24423,0,0,169f472dff19d3e595234a4557a30a6117005d2a45e5fae7840803d6db66f7d3,2025-02-27T21:15:39.987000 -CVE-2025-24424,0,0,21b11ca09b8673874895510024aaf8ad8182154f441913c677a9c85fbedac21c,2025-02-27T21:15:40.120000 -CVE-2025-24425,0,0,242b701dbfe06337da2bd8ccd3cf54d94fc82056ed1037bc6580e60c9aaf77b6,2025-02-27T21:15:40.257000 -CVE-2025-24426,0,0,eaa855dd71562a46bc77bf16a3517ae67c9de83e174a555c416f09cf48e00df1,2025-02-27T21:15:40.397000 -CVE-2025-24427,0,0,aeab414832c49a4f5c936b87983d2491f9c9e21252b16e14b179a723e5483abe,2025-02-27T21:15:40.530000 +CVE-2025-24406,0,1,1404ba2b8b944aa833a43afd3a4695211110da1e67ef084a4bf40afb51bc10e3,2025-02-27T21:15:37.383000 +CVE-2025-24407,0,1,a6b4e39eeb5768d8622b828a4e9e4164ea3b193a92ee1ccbc020e061179adbc6,2025-03-03T15:52:41.880000 +CVE-2025-24408,0,1,8982950b196d62c23ecd3b50fa257f8cd9fe3b013d4f05eec3a9db3faad380ce,2025-03-03T15:52:41.880000 +CVE-2025-24409,0,1,9c9de2c14ec731819d65720f89a35c6755a58da2481d0488479079c0675ee3b9,2025-03-03T15:52:41.880000 +CVE-2025-24410,0,1,98ddf400ecf4b1a746d947492dc8db08826a985fdbe7c62eef744d490ff221c7,2025-03-03T15:52:41.880000 +CVE-2025-24411,0,1,ac2f99387ced384bd17b35f77045f999af01cd13403e248e0fed2a7dc75e1ee0,2025-03-03T15:52:41.880000 +CVE-2025-24412,0,1,f3fc3bd19c87014e7fccf4cf6d4a8392506ff7764b7cbec0317f0b6b1e012f4b,2025-03-03T15:52:41.880000 +CVE-2025-24413,0,1,547930f27d363b1a8ce778784ccf43f480d2b7d7b2a25f76fd50a6ba5b9972d0,2025-03-03T15:52:41.880000 +CVE-2025-24414,0,1,00bc423e6f58e1588e38dbfbad40595da55ca482ead2747035d4faca300bfc1b,2025-03-03T15:52:41.880000 +CVE-2025-24415,0,1,5f22395239d269ce35ab46bd716b70ceb4562fc1366fd59bfdb8adcbff7c8e2e,2025-03-03T15:52:41.880000 +CVE-2025-24416,0,1,5f804ee63886a79973b8681b67cb0a7cc9aee21b8b022f5ff414809e73e5e6d9,2025-03-03T15:52:41.880000 +CVE-2025-24417,0,1,754159e4cc3e34259f3ca2218fb8aad2ab7ff6c877386a50b6a56720e934eab0,2025-03-03T15:52:41.880000 +CVE-2025-24418,0,1,21c34a929c20da34d0758ccc6ba8c8635d681e450114583cd415ba752827cda9,2025-03-03T15:52:41.880000 +CVE-2025-24419,0,1,a934622abc022fe4aca895970e57c82c365fc52795593f7337094b13795a0971,2025-03-03T15:52:41.880000 +CVE-2025-24420,0,1,392c04d8f3c8820d4ed876629165b80271f9d549ad4d6025aea6405c1f15ed92,2025-03-03T15:52:41.880000 +CVE-2025-24421,0,1,d3bd1726a8c8dfdb9d12730b9242db85c34adee8226b7571c62f688f0d1dbf02,2025-03-03T15:52:41.880000 +CVE-2025-24422,0,1,3377b8018837936df872a002118552fd2159d9e9ec3545fca706933df660490e,2025-03-03T15:52:41.880000 +CVE-2025-24423,0,1,144533d6123892ef5e4176d2fcffc8fcbb210bb5234f6c8dac21522e6427c9e2,2025-03-03T15:52:41.880000 +CVE-2025-24424,0,1,60ba0cbf89cf984b5d05ceb054ea4d819d2daa3353dcea99118612903ff1ff87,2025-03-03T15:52:41.880000 +CVE-2025-24425,0,1,36d8cae404a23db6344c0462e5380603fc760ee5fce8b160bd13457737009a6e,2025-03-03T15:52:41.880000 +CVE-2025-24426,0,1,124484cdf8e290a7a7099b5aac2ff826640ff54e2a41c6c98a2687636e9dc2b7,2025-03-03T15:52:41.880000 +CVE-2025-24427,0,1,5b51070717e613f4f555703bbc42c95f36096634d78669e629005b80ebbefe15,2025-03-03T15:52:41.880000 CVE-2025-24428,0,0,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000 CVE-2025-24429,0,0,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000 CVE-2025-24430,0,0,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000 CVE-2025-24432,0,0,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000 -CVE-2025-24434,0,0,380744e45c93abb2193a38a3d330d1de2a80e61ae98cfa1c0e2c7340f63efe4f,2025-02-27T21:15:41.317000 -CVE-2025-24435,0,0,9a399c91aada2dd1bf7b57eaed273c4fd2f09f22088815b4e80f1fb5172bec45,2025-02-27T21:15:41.437000 +CVE-2025-24434,0,1,608d3c85a91b7323de06305611259a66544c938d1496f623d24d8f0cc0037f37,2025-02-27T21:15:41.317000 +CVE-2025-24435,0,1,dfc219e78a67a41fbf4a8e3541666eb64d6263e8ba5c2874da58cad45ab47be4,2025-02-27T21:15:41.437000 CVE-2025-24436,0,0,fa6e1028e6b05751859f5712ef24bba808cb1ae0a39dca5196099fca50ecb47a,2025-02-27T21:15:41.553000 CVE-2025-24437,0,0,972c47e05b6f52dc6e19f4c1285b87e9410af4d32e9f6ebd4dac4600d3f09d2c,2025-02-27T21:15:41.673000 -CVE-2025-24438,0,0,b55b4bf2e06370ab72588d6a145267639ab09fee2db226f47b0eb632bcb36dde,2025-02-27T21:15:41.800000 +CVE-2025-24438,0,1,12d3860fa1429cfe71ef9cfbc827b2859fe934554fcc5b7031f28e164bbbaa42,2025-02-27T21:15:41.800000 CVE-2025-24456,0,0,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 CVE-2025-24457,0,0,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 CVE-2025-24458,0,0,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 @@ -283401,7 +283401,7 @@ CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca16 CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 -CVE-2025-24494,0,0,4505eb9f7cf0964d30efd35051c5fc63d906a9027aff7d3cdb61dc165fbf7dd9,2025-03-05T16:15:38.937000 +CVE-2025-24494,0,1,5decf71972d99c3e2ac3cacd3215043884a30d2308123cd8a3a2cbee4472cc89,2025-03-05T16:15:38.937000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000 CVE-2025-24500,0,0,9295dd9b249041670d2ba554602eebc3b93f68829fb82212836936456e522eee,2025-02-05T05:15:11.067000 @@ -283412,7 +283412,7 @@ CVE-2025-24504,0,0,ef6de3b3dbf1242190b08aac9e33b32e05b2dd27e51e53bc5474f7cffa0c6 CVE-2025-24505,0,0,7974460272478c3512102c93107009cbcaf39c532939b93286f6169dc2322ea0,2025-02-05T06:15:31.587000 CVE-2025-24506,0,0,6d0f2b92aeb54c0239442b80d645c7de8b9983e714f18d96e40f89a3734ac9c7,2025-02-05T06:15:31.737000 CVE-2025-24507,0,0,422b270ad7f0d60cc805efaa577ee203a8a40781b3fc9ddd5b1e3464f7401c91,2025-02-05T06:15:31.860000 -CVE-2025-24521,0,0,d2a5434d44903256a9b307636f2b9358f00abf8efd9d36c4ebb2f34759c6b0ee,2025-03-05T16:15:39.093000 +CVE-2025-24521,0,1,a26b810a2cff892b7fba105e3f409da95df17a46aadb7bebbb8491a71845c7d2,2025-03-05T16:15:39.093000 CVE-2025-24526,0,0,1e18d1f5ae98abeeaf7d844b3f89d785c7636c11b538120dbb867fa27b9c5f64,2025-02-24T08:15:10.427000 CVE-2025-24527,0,0,64c5f15d3a36426dd086cf6753a3bcfcae0a9e70014bff12440c7ea401e9bd26,2025-02-24T16:15:14.683000 CVE-2025-24529,0,0,bc0b161a595e000cd783abe643c1f26152f3142c15687c9c73e18c43346dadb9,2025-01-23T06:15:27.710000 @@ -283468,7 +283468,7 @@ CVE-2025-24587,0,0,cdbb8061e1f61beafef8c11244b1f0f3cf5d180e5bc7005af8284dd778fa5 CVE-2025-24588,0,0,1faf1db2c22cba9af693fe3cbaa545e96089409d18ce5347c551a8624facf360,2025-01-24T18:15:35.867000 CVE-2025-24589,0,0,b85c10bc35bda6003444da3a1e9b4af85d2fcdc02f9c52178826de0f932d0894,2025-01-24T18:15:36.013000 CVE-2025-24590,0,0,6d329557bd921dc7666d0060887bf7f29ec231517d3f0f298abda15e13f82d81,2025-01-27T15:15:13.947000 -CVE-2025-24591,0,0,b7971fa84f05c3bb78914287a19bc99b1f1dcac753da4f83dbac16d5be9b1e85,2025-01-24T18:15:36.160000 +CVE-2025-24591,0,1,871ca7fcd466fbce301e6e85e2eaa43f4b7e73aa4b2a083f0bf217f79b0a9271,2025-01-24T18:15:36.160000 CVE-2025-24592,0,0,3787dfb63ac5c39ff91b830b1773e2963898b3659c5acf289b6ded99ec58c289,2025-02-14T13:15:48.940000 CVE-2025-24593,0,0,755396b47c2f347b932dd610e5ab4f3682e12a817f74aab1e5387ab62cc20592,2025-02-07T20:12:44.647000 CVE-2025-24594,0,0,70d3e9f240cfda56e930b75c6211c3cc09718619b7ecb5df938afe6f725a25b3,2025-01-24T18:15:36.330000 @@ -283524,7 +283524,7 @@ CVE-2025-24649,0,0,023d2bd5a44406bd68c3c4645a1c6ced5cfeeb799618a8ff0129cf3c8fd99 CVE-2025-24650,0,0,5c9fc38112d5e5a4629a3f2853c55d07f73189509eb8ba11355a608cb20e8521,2025-01-24T18:15:39.347000 CVE-2025-24652,0,0,125bd9607cb5ca27355c57c1e03dde9d03a473f27327fc2bf3ba8ab8fcc2bcac,2025-01-24T18:15:39.517000 CVE-2025-24653,0,0,98339226f3f5cbf33f9e3597a502d8cd262e3f8166ecb0e8b1f8d1c7b5a57572,2025-01-27T15:15:15.070000 -CVE-2025-24654,0,0,45835cb9c7b806077b7e11439f2493b9b8890cc4ae2a8bae7c1c2bcc0cb55d5b,2025-03-03T09:15:39.660000 +CVE-2025-24654,0,1,660fd039d0e9c0919afa8bd17bf29943c6a14117dd2e90933ed427a4cb89d6bf,2025-03-03T09:15:39.660000 CVE-2025-24656,0,0,e3f8f37e20f1a0138b24c493e5230c4d8fc92553c1f4e874e0ae9d9e3d7c636e,2025-02-03T15:15:28.880000 CVE-2025-24657,0,0,a8222e0bd7505ef553e92de5bb8cc85de0450bfc3b5409fc8a3f31db56fdcc0c,2025-01-24T18:15:39.680000 CVE-2025-24658,0,0,998dc8b87f0bb72c992e3106285f00f7037efa9c383eaa222321a76f3e0f2d46,2025-01-24T18:15:39.853000 @@ -283561,7 +283561,7 @@ CVE-2025-24689,0,0,70a27061e8b0633b0958a705695b21ab3e50470132d440b4823f73ecd6b6d CVE-2025-24691,0,0,a9ecb50c9c5d82c8ecfc70917b5c56e667dfa57f33c8e4cb10ee7b326b2f95b1,2025-01-24T18:15:42.433000 CVE-2025-24692,0,0,4f3862dd5d5dfdfb8e9ec9276452e566888a0246b5bd370541ff930cf3e495a6,2025-02-14T13:15:50.050000 CVE-2025-24693,0,0,c7bef0dbde3fa8449c3a078a65549f5280577af242006cc996d29313a11fb18f,2025-01-24T18:15:42.597000 -CVE-2025-24694,0,0,7552269c8c3359090281460d70b6607cce8bb494f597ad67c1ae5b0211f65094,2025-03-03T14:15:49.157000 +CVE-2025-24694,0,1,74bcc6e20e6775cebdd45115f389e00a57b4204067a4e951e1df717a2ee2e910,2025-03-03T14:15:49.157000 CVE-2025-24695,0,0,f61c171f77cef62d0dd2aede8b4b5d725bd7ea8ff8a025771bdf23d5a72f8ca4,2025-01-24T18:15:42.740000 CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149632,2025-01-24T18:15:42.900000 CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000 @@ -283594,7 +283594,7 @@ CVE-2025-24723,0,0,fa12ebacbbb7d35c253a1357f7f47490c0de5550909ae7c921321a3a0608c CVE-2025-24724,0,0,f1d5a9efaab4111ba60ddeb14dd4139746a0b38d99f4f1b8671a78a8a285d45a,2025-01-24T18:15:46.170000 CVE-2025-24725,0,0,a0e252a651d31906e931aabf1afe1a1acf899eea1aa87f5cd5f7fb623547b2b3,2025-01-24T18:15:46.357000 CVE-2025-24726,0,0,643457e78383ffd21c80ba87cde1f90064aab70800fe6ac90c239f7f356518e7,2025-01-24T18:15:46.530000 -CVE-2025-24727,0,0,50c53138b35e4c8d6f22f4348f002321bb971f965d9e30f873316a30effbd955,2025-01-24T18:15:46.707000 +CVE-2025-24727,0,1,b0410049a710832e655c8a16c05767582f5da64ae3395c35b8f48d77781cf64e,2025-01-24T18:15:46.707000 CVE-2025-24728,0,0,838d34167d6e9360204659821ee61be03178a357afccd2fffe732d67db08ac02,2025-01-24T18:15:46.877000 CVE-2025-24729,0,0,8dc8344bb02bcef77a948622735797e4aafaad488eec9af68a538372de4eeb72,2025-03-06T19:02:47.083000 CVE-2025-24730,0,0,fc837ddd0a9b843a50233d49b160d1ffcc2a42a504761ca2d6cbe244eb7ae5c1,2025-01-24T18:15:47.193000 @@ -283619,9 +283619,9 @@ CVE-2025-24753,0,0,a2c1331499f1ee93474d032a5492134141c22dfbef3d88782211f0652176f CVE-2025-24754,0,0,df5b30a971ad3afa753fa5100ea4ce4a8eeffe0cded00f62df24aa224b1825d8,2025-01-27T14:15:29.477000 CVE-2025-24755,0,0,817a6f4676c47a1165c3ef71cf774d5099a4b3fffe7ab21f2fd661b2cbf35fed,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,00090c21b036cb18f500635475c1d0d07432c00656603d0706e690db1dac0d4c,2025-01-24T18:15:49.307000 -CVE-2025-24758,0,0,7cefb6fa6313acf51ca2fb8223b31fb14d96fc92645f40e75130e31a4762ce87,2025-03-03T14:15:49.300000 +CVE-2025-24758,0,1,32f18f9fde7b9c98057db303ccb0ef7fae2b4bd1295433bfb8994fab92023627,2025-03-03T14:15:49.300000 CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000 -CVE-2025-24782,0,0,17788acb91d6c67508456b6c6bdb11b91003536a6622098710e8b2b3540b27e3,2025-01-27T15:15:17.450000 +CVE-2025-24782,0,1,f19a1e15fdb44b3eb4bf44072462ab6af8638e3d7f4c38bf659e196b1c9167c3,2025-01-27T15:15:17.450000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 CVE-2025-24784,0,0,1e3d900223348a54f70c5afa85da5a9110aa159dd48bbc6ea1610b6320412748,2025-01-30T16:15:31.780000 CVE-2025-24786,0,0,77ab7857e7df965a91018da6faa2da651f03edbb1f269937c349ededa9d423f5,2025-02-06T20:15:40.720000 @@ -283634,7 +283634,7 @@ CVE-2025-24792,0,0,815c00b91fe0508a6ac1ee7b62f401c19482a17315a51f6f7a6adbc3c30a5 CVE-2025-24793,0,0,e28f23f8765521f3c09231efc18389c18020ab59aed59a8a8b47cb836c195885,2025-01-29T21:15:21.270000 CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7cde,2025-01-29T21:15:21.397000 CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000 -CVE-2025-24796,0,0,eb645f4107f1de4fc5f3a387f5b0d6cc2457622dca701d42f68f9ef307ccc215,2025-03-06T19:15:26.953000 +CVE-2025-24796,0,1,250182985adf73555f4ca5a7e32a281b7f14a948e50a0e88da7e06f3dc796a01,2025-03-06T19:15:26.953000 CVE-2025-24800,0,0,7ed7267931cd5ab7815e3084be7a388ce38e4d4a267ef28098f1d5b3017953e4,2025-01-28T16:15:45.063000 CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320ad5,2025-01-30T20:15:51.010000 CVE-2025-24803,0,0,74eab822b1c3e68557671b88128107e72ab93a3fd5a52a629fe3462c9de889ad,2025-02-05T19:15:46.207000 @@ -283652,17 +283652,17 @@ CVE-2025-24828,0,0,d6c7252c68dc48223ad23e8fe02a63238ede39167f9cb9fd8d861384db181 CVE-2025-24829,0,0,7efc0c94ae292054ed83b5517e6eda6a14703f283b7f8ef2e7ee76b6d97d388f,2025-02-18T19:15:27.723000 CVE-2025-24830,0,0,149ce554396e6f6a2d01866c124b61e24002e40c9d6d50b44720c1d2e3007d9d,2025-02-18T19:15:27.847000 CVE-2025-24831,0,0,c92da556f0147b9019570da06039147ae8945532d2deb083de9ea344daaf5414,2025-02-18T19:15:27.963000 -CVE-2025-24832,0,0,0e55f493d409b77a5f04c321a35ca45e55bde148e122f23287eec64d5d578bbb,2025-02-27T23:15:37.310000 -CVE-2025-24836,0,0,2105a2b27eb3ab727652655fd6687e9c6f3ddb37ef353b640f3771eb913e5f22,2025-02-13T22:15:12.270000 +CVE-2025-24832,0,1,6323ca18fbb7b250ae25bd8a26128cc938f8c40313999a5eb50edb4a58e57eec,2025-02-27T23:15:37.310000 +CVE-2025-24836,0,1,5588ca94131c46244e8539a791daf1e4d822f1331c844bc8a05b1352617301a0,2025-02-13T22:15:12.270000 CVE-2025-24841,0,0,a2bfe696c59d71d61006c3347b2512e90c01384ccb7467de18b9531d5dd49072,2025-02-19T06:15:21.853000 -CVE-2025-24843,0,0,f7bbc384e2d75fb580e77146ec89d10eee9143db66ff21944216da0081af9b82,2025-02-28T17:15:17.103000 +CVE-2025-24843,0,1,fb4d0afee0c2783ca1631e4031059d2c08004431e384816d6d85a2fa124d2f4b,2025-02-28T17:15:17.103000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 -CVE-2025-24846,0,0,3ff917c4c6b459e301d644b006b5a125f5ca87087b0f384a12c5d025e312d0c1,2025-03-03T09:15:39.817000 -CVE-2025-24849,0,0,0ee9898c778a9b7afdcc6b402323e98a9996b5fba0ecbd5a154a7193bceeb36e,2025-02-28T17:15:17.253000 +CVE-2025-24846,0,1,395a1c47127c2c7ef37d1800a5094c8ea72456277181e4a623939a06fd6c82a4,2025-03-03T09:15:39.817000 +CVE-2025-24849,0,1,8e5985d51102085b2b29506fc161cb28ee1a0b2a33328ea438367fccd6fa114a,2025-02-28T17:15:17.253000 CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 CVE-2025-24861,0,0,fc737346eef529f7ce1820f1979d09e2fa4fa5e49ae311378cd6313a62a3da9a,2025-03-04T19:24:05.917000 -CVE-2025-24864,0,0,3f3f8c7ad47eddf30a05ae7b7d88d188e34c963309d1c098db7deb98c3c7ddb6,2025-03-06T04:15:25.713000 +CVE-2025-24864,0,1,f3d6852734c1e0ab70389f5a627b90c3a3b9e19990c3f9c9932f81a939183871,2025-03-06T04:15:25.713000 CVE-2025-24865,0,0,d86122dd19f261653c8b86d31d64d9d418f9889d6a6559684ce29911d0a2e3dc,2025-03-04T20:59:05.417000 CVE-2025-24867,0,0,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000 CVE-2025-24868,0,0,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000 @@ -283695,7 +283695,7 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000 -CVE-2025-24924,0,0,790c4102f7a13d61ef63cf8baa9bb4ffd44208fa79207e81feb3553f3b76b500,2025-03-05T00:15:38.423000 +CVE-2025-24924,0,1,a7084794ce1702a81fd2bcd238459f023095753247c4c7d60e5ed9e8f0ccc53a,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,8e9335012d42a7d487e5f9921ea54f865e117f9248798a001634be5429fb2b4a,2025-02-18T23:15:10.250000 CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000 CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000 @@ -283720,7 +283720,7 @@ CVE-2025-24980,0,0,a17fd16fc181710dc23e803283e1d6d1f933f1a8ebddaf620892759c050de CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 CVE-2025-24989,0,0,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000 -CVE-2025-25015,0,0,eb1050bd5b65a4dad7d526191a26a4661ea59db9fd330a6daf35730bcf0718dc,2025-03-05T10:15:20.160000 +CVE-2025-25015,0,1,1728a18585006aac4e3f477b411ddf25ead2fc2546118a111f01cd9522231a49,2025-03-05T10:15:20.160000 CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000 CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000 @@ -283731,7 +283731,7 @@ CVE-2025-25065,0,0,45484afbd03efe60cdfc0e8025f2d7de171ad9fb0eea11f3663a654375185 CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000 CVE-2025-25067,0,0,2f09f51b35dbaf6463f10a0672cf6819d42c674ab7d8e36c8f2d4bf8365c44b6,2025-03-04T20:59:05.417000 CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000 -CVE-2025-25070,0,0,5327ab05edcb8e3afa82526bab4bc859623c1daaa376383bc1e52985f02ea43d,2025-03-03T14:15:49.490000 +CVE-2025-25070,0,1,ddd6d0a8598a596c1d208b2e275c0bbf80bbb7d9feedc6a11fcc7ee87391bf86,2025-03-03T14:15:49.490000 CVE-2025-25071,0,0,1629f669e71655c3fde13bbe5cdd27b1092b6fb208e43d4e7d5ad171118f64db,2025-02-07T10:15:11.840000 CVE-2025-25072,0,0,b2f1001fba6b0792cc732077ea2e226df66672da745a56dd97c913a535040448,2025-02-07T10:15:12.023000 CVE-2025-25073,0,0,ae247888df9b0a0f02c26fb56226f6f772bcd6d701eac54b2e26221f7762b06a,2025-02-07T10:15:12.197000 @@ -283744,63 +283744,63 @@ CVE-2025-25079,0,0,43fc907c6f7f8abacf15501eee12dd84e65f7bf34c2b4b035c7998a7325a8 CVE-2025-25080,0,0,861ac78288703f786a1258aee4ebc09899b5ccd5f4cd1e0d5d938308ab9cee21,2025-02-07T10:15:13.440000 CVE-2025-25081,0,0,a942a5f18339f333bcf99d8684bd359dbcef14580612543671b3d6d082e9fd47,2025-02-07T10:15:13.613000 CVE-2025-25082,0,0,8fbcb284df10f74ea677343321a609e9989fdcc51f391e47c600626a4578b446,2025-02-07T10:15:13.793000 -CVE-2025-25083,0,0,9e3fc46160501f67c6c5d0fcd474cf23c8788b226adcd496d83723a9cdb1e886,2025-03-03T14:15:49.633000 -CVE-2025-25084,0,0,22ebeb4189de5f1e695fac38cc65353e5d578ca84eeef2155c2a83cea4229a8d,2025-03-03T14:15:49.777000 +CVE-2025-25083,0,1,8fc863a6afa201dbcffcfc1dfd93bef240d092bb5961c8af03bf3e13d5f34008,2025-03-03T14:15:49.633000 +CVE-2025-25084,0,1,49e2f3daba3aab05ae8497db4c773f2fabff3f0af3736a98a68cad883ea5abed,2025-03-03T14:15:49.777000 CVE-2025-25085,0,0,48e8d3fd3144ff3e43021324e6671af7f1230fba8a05033bc5b135fd7d20d9ce,2025-02-07T10:15:13.980000 -CVE-2025-25087,0,0,adb9ca264fa23eee904e111b3b6e1e77904e37c0c1a2fb294dfda7d0a9e5cd65,2025-03-03T14:15:49.920000 +CVE-2025-25087,0,1,873e858ca23aaa5e1381db85e3add8f072c79d735cf6e2fb2ffe5251d33c8a8a,2025-03-03T14:15:49.920000 CVE-2025-25088,0,0,19b513c75a563bafc3fa8ff6ccee8059f648de42a915840688d58d3b8fa92301,2025-02-07T10:15:14.260000 -CVE-2025-25089,0,0,a8bef62dcd1d749a38ebccd69557e5c7041506550959a126098b61e8f9b00e58,2025-03-03T14:15:50.053000 -CVE-2025-25090,0,0,5d8dc7954bc6c19111eae14414de0a3b0221bb55d4ec6a7dc24d57f9c2560b72,2025-03-03T14:15:50.197000 +CVE-2025-25089,0,1,6ea1d167120c5a9c744497a359ef14c47d0c50c9a7012883c33b3c843e89652b,2025-03-03T14:15:50.053000 +CVE-2025-25090,0,1,bfd58132e86787f16200b192f7c0422ef404f744bcf3b7749a749195c6e91fc8,2025-03-03T14:15:50.197000 CVE-2025-25091,0,0,a542fd0c75799894cefcaf1b68ae91e64f2b423e9db55a3bbe6c17b8ea764d64,2025-02-07T10:15:14.440000 -CVE-2025-25092,0,0,cb0fc70813c01d664fd28d9c00fb5e02da5fb9c53946650f9fed7a24a4197bcc,2025-03-03T14:15:50.343000 +CVE-2025-25092,0,1,21818af459297eedfd23a8fa9ad07a7bf61256e46e6c401f3929541ab4ad3e53,2025-03-03T14:15:50.343000 CVE-2025-25093,0,0,47e022609a66eb732cb5607ad69dacadc0e3206330883066d0fbd2217b126818,2025-02-07T10:15:14.623000 CVE-2025-25094,0,0,46628609542d4456cffd07ed0405aedfb34ecda58a73ab49cd592d59afb4d089,2025-02-07T10:15:14.797000 CVE-2025-25095,0,0,3aa0fcd4e44ffa77e526aaa9572752fe51307ed32741a755783c3ce59d4acf78,2025-02-07T10:15:14.977000 CVE-2025-25096,0,0,236222022f87a86e77bd8ba463e844df698349f963210d6765a3437ea99cd5f4,2025-02-07T10:15:15.143000 CVE-2025-25097,0,0,e516102cedda1395b6abdb8786b776f94af95ec136f76e62dc90cc8ba092528b,2025-02-07T10:15:15.327000 CVE-2025-25098,0,0,d51cf54051461684fbfbca4232445e97f072cd7fa5f46b19018d123dcd09d044,2025-02-07T10:15:15.500000 -CVE-2025-25099,0,0,b6ad7cb8a02b7bb74aeb070d48d43ecf31e22a281e17692ec2db7e801e05df4f,2025-03-03T14:15:50.490000 +CVE-2025-25099,0,1,9f4d5bc16129f8aeab3ce15b15ca359e827725b5005628a8e16e352d8cb393f7,2025-03-03T14:15:50.490000 CVE-2025-25101,0,0,b55978e51ad28a269a135a73512b84912bf7da148b6e45135907e1256d3b35de,2025-02-07T10:15:15.670000 -CVE-2025-25102,0,0,6fa6569eedf6590931934190443f4239a817b446024286f09cf28fb86a53b35b,2025-03-03T14:15:50.630000 +CVE-2025-25102,0,1,5f9e7463562618c549bf2e4d3e5dd8db7fee9ab199f55b3f6ce01b6dcabdde0f,2025-03-03T14:15:50.630000 CVE-2025-25103,0,0,8f0bbbc68659bdd6583cb7a4bc5992aad3b30e946386462de20a44c10a02c12a,2025-02-07T10:15:15.850000 CVE-2025-25104,0,0,e4c9d78af0197f942e0524c34497df5047d8f0a28faa9fd982f2bf0c823696ea,2025-02-07T10:15:16.027000 CVE-2025-25105,0,0,87183f79828bf4be3e65d98936975061f302492ba9a4f03a8503cd4599e018bd,2025-02-07T10:15:16.217000 CVE-2025-25106,0,0,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073237,2025-02-07T10:15:16.397000 CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000 -CVE-2025-25108,0,0,b8176f599dc222a1c0960674e0cef78e3ad0802451c5772b955ac71eaa14babd,2025-03-03T14:15:50.767000 -CVE-2025-25109,0,0,9b704f5faa8081bb06099b5adce9d8eec44ea6f5cd7c53d7c0dde275bcf099e1,2025-03-03T14:15:50.907000 +CVE-2025-25108,0,1,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000 +CVE-2025-25109,0,1,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000 CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000 CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000 -CVE-2025-25112,0,0,4fb18260a24599f2be2d8c9ab1f96d1d3c5846f6579cf91502d7d0fa1ffe1f94,2025-03-03T14:15:51.050000 -CVE-2025-25113,0,0,fb694159fc67aa5bff6264f4ec6a8fdb74975e93889b331bb122ba61a089789a,2025-03-03T14:15:51.193000 -CVE-2025-25114,0,0,db47ceb13222d04f70a13bb49afcead2122103a9769ec81b2aef4d51c93ad548,2025-03-03T14:15:51.333000 -CVE-2025-25115,0,0,8338b2b9f4b7a5857fc6a08dff366a204b1f1bde65b0b4e2cba1ddce67064dd5,2025-03-03T14:15:51.477000 +CVE-2025-25112,0,1,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000 +CVE-2025-25113,0,1,52bf9ae1dd80ca6057b53295ac321d5e5d12af1cc864cc1fbeb9f8b7f2f7a9c8,2025-03-03T14:15:51.193000 +CVE-2025-25114,0,1,23fb57735a0a8262b60aa9ac46f03961e19ba038b3e32f5881762956158e6c47,2025-03-03T14:15:51.333000 +CVE-2025-25115,0,1,170c9da6bc3a9782b62d8ed67e5cfdcbe95a2f55e8fa16433c4d3cb68bd39f05,2025-03-03T14:15:51.477000 CVE-2025-25116,0,0,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b7981803189350d2,2025-02-07T10:15:17.083000 CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000 -CVE-2025-25118,0,0,075dbb3aeec37548e9399526109d87ff4bf6a34a63d838fb2591e560bef4aaee,2025-03-03T14:15:51.610000 -CVE-2025-25119,0,0,7b0b2807f2361bb5fdca889f6b96228fbbcd4113400b50585a489d7ad137eb50,2025-03-03T14:15:51.750000 +CVE-2025-25118,0,1,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000 +CVE-2025-25119,0,1,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000 CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000 -CVE-2025-25121,0,0,b13bde3789938d9ac0e9b4c710e75965493d97ce0949ad71567bf9d72bb8b958,2025-03-03T14:15:51.887000 -CVE-2025-25122,0,0,a24d56ee5d5c127d5566762a6b500f497c10054c8940ad873353d0a392ca8f89,2025-03-03T14:15:52.033000 +CVE-2025-25121,0,1,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000 +CVE-2025-25122,0,1,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000 CVE-2025-25123,0,0,39da03858edd407e6c09775c068b65e8a6da718955d1af67b46f995b12dfb1ab,2025-02-07T10:15:17.640000 -CVE-2025-25124,0,0,4023ed897268ec8f0837676ffc606ee4629a6948eaaf262a8e03365d21cd05a7,2025-03-03T14:15:52.183000 +CVE-2025-25124,0,1,807821d1176cc1b1f33cf5248d78ead09f0b00c7131d646a88d817e8b4efa992,2025-03-03T14:15:52.183000 CVE-2025-25125,0,0,d72d623d3ad39f3c37d3909bb3698bc55eee1f38ede5a07ce403181faa4e4d78,2025-02-07T10:15:17.813000 CVE-2025-25126,0,0,8d61804086754e48af89e8567f3989101452037c2ce395ff80341319a100b21c,2025-02-07T10:15:17.980000 -CVE-2025-25127,0,0,bfe95daa619a960e84a583281c93d16dd53dfa06d1a4716e2fffc4b77b42eaf3,2025-03-03T14:15:52.320000 +CVE-2025-25127,0,1,810a3624b90b1b18c4d6e2986693fd2e429b349687ae9da46aa54076b8f770a1,2025-03-03T14:15:52.320000 CVE-2025-25128,0,0,a1be1b60af41d9f59ae264bf030c7f9da67afc0036052f5ee24681007473a137,2025-02-07T10:15:18.140000 -CVE-2025-25129,0,0,8e5da7e6fd00554b65473412a7abd54bf29eaf42d6b3974479b00336ca2042de,2025-03-03T14:15:52.460000 -CVE-2025-25130,0,0,01fa182f2666b6173d40728fb96aa872846c59a6db55a56e8d165ffce860b4fc,2025-03-03T14:15:52.613000 -CVE-2025-25131,0,0,7255eac0e2fbeb9e678b61376423a8cc79febaea3a3a65dd99d17a979ac72177,2025-03-03T14:15:52.777000 -CVE-2025-25132,0,0,1e6c8c91c92157e1bca70e44bbaf2c524d29b882919da113ca023f80cf431bab,2025-03-03T14:15:52.917000 -CVE-2025-25133,0,0,5c542a8600dbba48776b6fccd7ea9175530b1625c210b6043f77b95ed6463e68,2025-03-03T14:15:53.060000 +CVE-2025-25129,0,1,225e474e508a15133127b7cc91a7a320235ffd7073489b67d13c6da872d4fa68,2025-03-03T14:15:52.460000 +CVE-2025-25130,0,1,fd90066c05794bf8a80f9a4a86278162cbcceaff0a4b0e424f0a8a94fffbec01,2025-03-03T14:15:52.613000 +CVE-2025-25131,0,1,3de1761f5748603061958b384600ceb9ed047e5b8428dfde2abe96a44a7079f2,2025-03-03T14:15:52.777000 +CVE-2025-25132,0,1,edd5f2fbc08e2b3bad0873af9a761d855e2808023b51db2d3982aeb907f20c7a,2025-03-03T14:15:52.917000 +CVE-2025-25133,0,1,ca3eeda941991b09349dd2bfc23cd30c06dbd086407da3a24fa8e0bac6c986be,2025-03-03T14:15:53.060000 CVE-2025-25135,0,0,238a7464065012476597d7378a7ce292977f12606cd0a077568b6ceec8b00845,2025-02-07T10:15:18.320000 CVE-2025-25136,0,0,42c0c261cf9eb8be4dc24ad7ec4abc766f8d93d01752ada40296d4ffa1184d99,2025-02-07T10:15:18.497000 -CVE-2025-25137,0,0,fc9d70ed9599f1cdfcc8e397fa6a4784715b7f2ba1be85951c2b998f1ad887a5,2025-03-03T14:15:53.200000 +CVE-2025-25137,0,1,c01f913cb4a985db4be7952c984b5d7b59a678a8ea405e7e0ca55ce742925c42,2025-03-03T14:15:53.200000 CVE-2025-25138,0,0,62d82d9fa013175354f3ea0d4e19c0285c2715dd0fa111fd44954532b1adf0e3,2025-02-07T10:15:18.663000 CVE-2025-25139,0,0,fa14652e102be794a3e0af0bb9d14992eed595fc0a3190cdce8b043807376320,2025-02-07T10:15:18.837000 CVE-2025-25140,0,0,374227d3c660510b64513d59d78c8f882ca05a4da83388b27738f7367599633c,2025-02-07T10:15:19.020000 CVE-2025-25141,0,0,f1bd5fae1f027e6426c8a2568cea6792a0d4eed24199068cede2f66a267de8df,2025-02-07T10:15:19.200000 -CVE-2025-25142,0,0,415d0aa618e86721e98589ed39f03704a5b1c2c62b94fea86f1ec187193ddd58,2025-03-03T14:15:53.337000 +CVE-2025-25142,0,1,60cadc78e101db895f14f86d6b2f21cb6596a5b653755cc073238a5667299d7a,2025-03-03T14:15:53.337000 CVE-2025-25143,0,0,e4f64a7000db26d7295c554498abb3a0e8d7d93ab88d323d72f7d817a03c369d,2025-02-07T10:15:19.383000 CVE-2025-25144,0,0,c23f429ee74bdac005324112ac24332b4076e14b539deab35919f49edda6ad4e,2025-02-07T10:15:19.553000 CVE-2025-25145,0,0,b4a198401379fa6c111f7dbbc979899498f276925009d0e624b600a5d321077c,2025-02-07T10:15:19.730000 @@ -283808,27 +283808,27 @@ CVE-2025-25146,0,0,8cf6209a46b44b06b2ccd5c1c7e8ebdc3f8ffea4dd4aac4b546297068385f CVE-2025-25147,0,0,8becf73efc80f713db1dcf90c9a60e246e06cd5106d3c39388577437a75c73ec,2025-02-07T10:15:20.063000 CVE-2025-25148,0,0,e75aa4aa374ce5c3506ec0aec90e7c3883709d635a4ed1bf876603c867ae1a92,2025-02-07T10:15:20.233000 CVE-2025-25149,0,0,c6ae2b5481fb286fc9000fcaba20092f415781ddd5932a3ec3a446ade703e6e3,2025-02-07T10:15:20.420000 -CVE-2025-25150,0,0,93f3a7d917c83bb70091c80dbaaf5fefdb86a6d63d2f2ff457a11d0128543482,2025-03-03T14:15:53.477000 +CVE-2025-25150,0,1,3dc6a7d10942f5e246aa5092b0453ae4b047a5893d1894fd23d8b8dce80a0bef,2025-03-03T14:15:53.477000 CVE-2025-25151,0,0,07d995688df73514690b1246cc5f82518185dd07fded4938b2d6c2df7cd3a2e6,2025-02-07T10:15:20.593000 CVE-2025-25152,0,0,937b6e0bc1ed0d26ac1442a1ab58b7bbfe5cda83c6da9168e1aca6e3fe25b8c2,2025-02-07T10:15:20.770000 CVE-2025-25153,0,0,e897fcce67b06244f49678e3dfb381a0213ac0f5cbd95b07c1760d0dcf84f71d,2025-02-07T10:15:20.953000 CVE-2025-25154,0,0,e0fe38d9547026402a61df8e4d235a791a658ca2456347f94c0c76d661f9d9b5,2025-02-07T10:15:21.120000 CVE-2025-25155,0,0,25463116677bb5b1e5eede9e10b405a5bfaefa58e87937c57e4c507fe21ceaac,2025-02-07T10:15:21.287000 CVE-2025-25156,0,0,392795b0610ac1fd5d03e67dde364abfeac5df7cd4b13d93620eb6cc4404df15,2025-02-07T10:15:21.457000 -CVE-2025-25157,0,0,853b44e28b6934b0fc93eb8a1414ec67f2b2e35e19e79087efe932600c31ab18,2025-03-03T14:15:53.617000 -CVE-2025-25158,0,0,47cd86dca4815a57374be2a504a855213ef7e6b47ab940cce6de576d53368119,2025-03-03T14:15:53.760000 +CVE-2025-25157,0,1,bc3278739cef8c7a51b2597da17dc27ccf1bc71b22ba875d5a6fb84021185b6d,2025-03-03T14:15:53.617000 +CVE-2025-25158,0,1,dfce69d2026d343bbd8dd188e5771a571b217d56844ea43cdc54885f5885bd53,2025-03-03T14:15:53.760000 CVE-2025-25159,0,0,025a2bd3e6b558bdfff1d7d43ed8378b0ae9f5037837ff20f11b16e15e74370a,2025-02-07T10:15:21.627000 CVE-2025-25160,0,0,c867ea52ba2964998bd24138dfba1ca85a51e3af0334809fe322a505256dec50,2025-02-11T19:28:40.520000 -CVE-2025-25161,0,0,937b69e55f094eb57d0b1520cc723ae5d9b70e1c439bd02ca04586f7338ce22f,2025-03-03T14:15:53.900000 -CVE-2025-25162,0,0,f69710bfdd309ca7e1ac1c5699c71d0cc3bb70b9168fbc0cbaf76970d266c9e7,2025-03-03T14:15:54.040000 +CVE-2025-25161,0,1,35f233b22fce2a42862e1eb3468fdab066050a527f864984377f1259992cc461,2025-03-03T14:15:53.900000 +CVE-2025-25162,0,1,f29cddcd6fc3fc656e41d2741a224ae4b5abffbb6e18709136fca2b0af35934b,2025-03-03T14:15:54.040000 CVE-2025-25163,0,0,df7178d297cc829e76e2bf99edce3f1cbda6db4f0013a6f708bca9205b7f3698,2025-02-11T18:42:09.117000 -CVE-2025-25164,0,0,de1ccc19e14617a50f3106b759b3347a4b76e4c38626f7d1343b89d7d260bca2,2025-03-03T14:15:54.190000 -CVE-2025-25165,0,0,41e8eea8ce871093494c4d23e05e88b7bf73298979efe99671602825cb71cc37,2025-03-03T14:15:54.330000 +CVE-2025-25164,0,1,453013d5a8c87ad353f7f84e8d44cc960e4d651a927309cce6ae7318a042a01a,2025-03-03T14:15:54.190000 +CVE-2025-25165,0,1,22b1b13f21bc34ab1ac781c3eb18a95a4d6e5a51fd37319d1934fc5a26679652,2025-03-03T14:15:54.330000 CVE-2025-25166,0,0,f5428199d8b191f5ec9fa7a05ec98d82647ebea96576afd260370950cb5142c0,2025-02-11T18:25:01.633000 CVE-2025-25167,0,0,e14b9eb6e466e19d148bb81d5cb2df8f805c1241e9a9e8cd6260db11c719e980,2025-02-11T18:22:46.253000 CVE-2025-25168,0,0,93fb1477ac0fd147322a0beee26e3b74949bd1187f727ff11033ff5c839391ea,2025-02-11T18:21:01.407000 -CVE-2025-25169,0,0,ac8afa6ab5756020c58b68a7c9c3e968500fd7fbcfdbe12913b2afdc72bbd451,2025-03-03T14:15:54.477000 -CVE-2025-25170,0,0,5fc159b81b03b8b96394e6682ff7b0696712f10b233cb4eab66d5f088243486a,2025-03-03T14:15:54.613000 +CVE-2025-25169,0,1,b2c2eae9e9728260a10cbcd3cd6ed185b5ee51c8c2c4bd8b669b60e645fe9781,2025-03-03T14:15:54.477000 +CVE-2025-25170,0,1,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483c78,2025-03-03T14:15:54.613000 CVE-2025-25181,0,0,d93e6c4eee13ffa168372e2c7e46bbc0128edff1659cd70737de5b3c44664eea,2025-02-18T19:15:28.613000 CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 @@ -283839,7 +283839,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000 CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aaac8,2025-02-11T16:15:52.313000 CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 -CVE-2025-25191,0,0,302b5aac007977359a73b10b37e4d3c5bcd86bee77fbf1555ca03127afb731e1,2025-03-06T19:15:27.113000 +CVE-2025-25191,0,1,64e75b42b5b4114ec424036032ed543c10e1aab28f65534f055fa09c1cbebe26,2025-03-06T19:15:27.113000 CVE-2025-25192,0,0,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000 CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 @@ -283863,8 +283863,8 @@ CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-25279,0,0,042549a55fc10922a139cd28848b848f448630efd12168ac54dc544f129afb38,2025-02-24T08:15:10.607000 -CVE-2025-25280,0,0,f7f5a35802685cf8365d6387b32115ec00761d5ef078a25d5a06cc4095466154,2025-03-03T09:15:39.990000 -CVE-2025-25281,0,0,36126bebd8b9352f1fb850b3e86148707a624141c49e6424b923fa546fb647b5,2025-02-13T22:15:13.263000 +CVE-2025-25280,0,1,1b5c77d51c05bea0ddf2810fde521e2bf98007c9c56671b108b14a4c893500b5,2025-03-03T09:15:39.990000 +CVE-2025-25281,0,1,6abc0f3852c07b59041936ef70196696b8535967c9a38e594f39899808e3030f,2025-02-13T22:15:13.263000 CVE-2025-25282,0,0,537f6c2a7c075c5a2a9fac9a5320dae8ca666f8b7ef97ab86c6d5a8a44c7f7d9,2025-02-24T15:15:13.620000 CVE-2025-25283,0,0,d1ae07356b8742828976d536d141109b35ac143686ab7de25f652850c0ca2fe0,2025-02-12T19:15:21.863000 CVE-2025-25284,0,0,ecfd36b55e20ecca3a53e0b4f52060374574a6692ca99c332f29e6be19bfc00f,2025-02-18T19:15:28.797000 @@ -283874,26 +283874,26 @@ CVE-2025-25287,0,0,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a4 CVE-2025-25288,0,0,0584d712e57f52bee8eae9744431d7edb4ff073c5208efea9ba9d4aad69105ee,2025-02-14T20:15:34.737000 CVE-2025-25289,0,0,9f524d670b2ea0e928c8409b5f46ea35f805bd4f11134f0dcb16ef0bb77ce771,2025-02-14T20:15:35.100000 CVE-2025-25290,0,0,927339a6905b50f325cf414d0d0e7fad53929abe8412c231085b72dda312b675,2025-02-14T20:15:35.593000 -CVE-2025-25294,0,0,1933530b178b384d9cb739cfd3cbc94c93474d3a796340837a5ed643e2c3fa82,2025-03-06T19:15:27.267000 +CVE-2025-25294,0,1,ff98704c3e474eafdc3c9e20675abfce3f2b5fcddaf943776865166837ca4f4e,2025-03-06T19:15:27.267000 CVE-2025-25295,0,0,ab7cbec386eec3a44bf55fb5a8d6852f900324ec8d3c216c21202391f71c954b,2025-02-14T17:15:20.230000 CVE-2025-25296,0,0,9e79c5fad11a03b5a2666c57a0c1edbda7d102bfbc1a9f3cdfefb4bac3905071,2025-02-14T20:15:36.103000 CVE-2025-25297,0,0,ddf94cfbbc189ce93f241ea6683b88ac35f83102b385ee87dcdb33fc29a231fe,2025-02-14T20:15:36.627000 CVE-2025-25299,0,0,b88cb269210123945d038d12d198228aa26d1b8e47ccb86107a7f3a5f3e3fad2,2025-02-20T20:15:46.853000 CVE-2025-25300,0,0,a63610c8954a67da8954dfef77eac19e25e19f8d8bc841f17242c70e43478917,2025-02-18T19:15:28.957000 CVE-2025-25301,0,0,08be823add38baf39c7e523f834b629ccf6d67e02724ce527ca143ad817c8c52,2025-03-07T19:45:52.873000 -CVE-2025-25302,0,0,207de2032449cd33d7cee27d5ca889c06a6e05f64afdcb1fa983f86317cb1891,2025-03-03T17:15:14.920000 -CVE-2025-25303,0,0,4634a176f3297b7030e523b34eba1b52c58b609fb86c5b9340271a222a29f1f8,2025-03-03T17:15:15.073000 +CVE-2025-25302,0,1,c00a60e460c085bc6071f27703e95f8cb2f218886d77664be4a3a5d8bb045bbd,2025-03-03T17:15:14.920000 +CVE-2025-25303,0,1,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000 CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000 CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000 -CVE-2025-25323,0,0,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000 -CVE-2025-25324,0,0,5b3b99996b198db19221a35dfdee6e3286d56f16572f9eccdf5efd7ec5b7f501,2025-02-28T16:15:38.307000 -CVE-2025-25325,0,0,7ac080e63c68e81f20ebab4d9228091863e1f25a92d142072d332eff1106665c,2025-02-28T16:15:38.457000 -CVE-2025-25326,0,0,1a9fe139d2a10b61db16345be5208a2d5105ee9b72982d34638c81056b3db442,2025-02-28T16:15:38.603000 -CVE-2025-25329,0,0,f8df5c8a4c4e3265c55fb37312bb192f184fb852627dd7f8acac36e50a6f04fc,2025-02-28T16:15:38.760000 -CVE-2025-25330,0,0,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070004,2025-02-28T16:15:38.913000 -CVE-2025-25331,0,0,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000 -CVE-2025-25333,0,0,48db7a0795e1d6c60f3c9b54235bb299f37a35fd06d70db1a48b26f45e2b3776,2025-02-27T20:16:05.073000 -CVE-2025-25334,0,0,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000 +CVE-2025-25323,0,1,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000 +CVE-2025-25324,0,1,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000 +CVE-2025-25325,0,1,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000 +CVE-2025-25326,0,1,b2862e1ba4b28f5f0a5682d708b3ec6d567dcd38a2195e69c0aacba83c866910,2025-02-28T16:15:38.603000 +CVE-2025-25329,0,1,d4f0e8b65e65a86a750fcf893a682a8d84a23fd72a74022969ee982a5255d9e3,2025-02-28T16:15:38.760000 +CVE-2025-25330,0,1,ec57a732aaada47cb1c9fe7b45fae25ce0394e6dc0994efa9c2cd783350453cd,2025-02-28T16:15:38.913000 +CVE-2025-25331,0,1,84ebb96243dbb61882a416675acb570b3a9b60e0a72d57c022d0a349ff3ff35e,2025-02-28T16:15:39.067000 +CVE-2025-25333,0,1,e67fb0c7a15113a897c1684905ddbfe9b9bc0132f0c1392f5f1a3e1994084bef,2025-02-27T20:16:05.073000 +CVE-2025-25334,0,1,df8eff24c662c5b6daa660fc7d998d5bf4081181dbc63484e23b3f1bf41a3ace,2025-02-28T16:15:39.220000 CVE-2025-25343,0,0,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000 CVE-2025-25349,0,0,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 @@ -283903,7 +283903,7 @@ CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 CVE-2025-25361,0,0,dd0fd4c24b78008e91609d0ad78fcd088a6f876ce651fa9ebadb9ad2df525599,2025-03-07T20:15:37.673000 -CVE-2025-25362,0,0,42d98817ecbf18ddccabd4b792aadf3e08587d530c768960c95c682806a1813b,2025-03-06T15:15:17.277000 +CVE-2025-25362,0,1,9cdfc22f6fba81a660a23fb14358e78116e49805e8504ef86ce8786368248ff5,2025-03-06T15:15:17.277000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25381,0,0,1a2bb06e970af8252b42b35cce67724a6bfba5c092f06ed50d25977950572c1a,2025-03-07T20:15:37.850000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 @@ -283911,15 +283911,15 @@ CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a4 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 CVE-2025-25426,0,0,84bb50c8c6b6e219a0ae287a577f7850da18ad1418a69fecce68e26966885369,2025-03-05T17:15:15.320000 CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 -CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 +CVE-2025-25429,0,1,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 CVE-2025-25450,0,0,69c0e66b5259cd848a36ee3387e165b3c13a6a4ba2233dfb5d5ef1991e65c690,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,718dba12e459406ad47aed831fc7ed49761e2789191f94dd42a964acf6eab8d8,2025-03-07T17:15:21.803000 CVE-2025-25452,0,0,db97c2b1a3f3fe6a0b532c32e3b1c28c0459e3ade994dc2ef24db5bea6bd3c1d,2025-03-07T17:15:21.947000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 -CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 -CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 +CVE-2025-25461,0,1,ab0b84ac9f3f8ac10a932ec6905826cba8e3222301f41fba0cc01c825409c256,2025-02-28T16:15:39.387000 +CVE-2025-25462,0,1,e3a95f58645ab088420fcd040b432a2979332c3da882c867dfc35faa5f4a7dde,2025-02-26T16:15:16.933000 CVE-2025-25467,0,0,be54333161dcf2f1f5c07a11d9c21504a7454b945a57486fb894baaadc72dd96,2025-02-19T15:15:17.760000 CVE-2025-25468,0,0,afe7dbc80d80a94d034a67e08ca693ad0d2d24bef9a36440e5c98378bf003bf5,2025-02-19T15:15:17.930000 CVE-2025-25469,0,0,2bf236dbfc4aa53078a64a3e8d4877a092e60bfc3dbade4ea565637fed8a814d,2025-02-19T21:15:15.750000 @@ -283929,20 +283929,20 @@ CVE-2025-25473,0,0,e8e0a8342346bf2f32dfaaee95898f0b633608ccb1cba92ce43fca3dc31e7 CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4113,2025-02-20T22:15:31.027000 CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000 CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000 -CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000 +CVE-2025-25477,0,1,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-25497,0,0,a7e355fbf36080b69b96666d6760a0c61ebcc8657b8ec6616d25a2740bfb4db2,2025-03-07T20:15:38.013000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 CVE-2025-25513,0,0,043fca8e8841337dff57d4e28c7e510727843dfcc920ce62d1b986adb3261f5b,2025-02-28T16:07:41.847000 -CVE-2025-25514,0,0,a814744cfc6697d1777a44445968fcbba30d2857f4667a51084558f12c3b014c,2025-02-28T22:15:39.473000 -CVE-2025-25515,0,0,09ae7b18bfef4cf926a93105bc202a5e5eb13587c89edb53dfe59befa603d729,2025-02-26T15:15:25.327000 -CVE-2025-25516,0,0,9806c110efba5a59ff4c78f119998264475b72b9f9489901afb4c15e2466e757,2025-02-26T15:15:25.507000 -CVE-2025-25517,0,0,a2be2d08d2505b1a2b3576d766200ae22e9f2db518a90d7ff214871ac0cca945,2025-02-26T15:15:25.680000 -CVE-2025-25519,0,0,b0ebdb6955aa2ac46fa8c1ccef4033c28c6d33e0e51706994d2d5405edabd809,2025-02-26T15:15:25.867000 -CVE-2025-25520,0,0,0929475d3a0846bae1d5736c855073b0debfe7e9eb4b7ebcafd5de3fde479449,2025-02-26T15:15:26.053000 -CVE-2025-25521,0,0,7467127675b7073f2c5481bf3c7cdf983ac5e894f53c6a9b2842bb5c4eed2cee,2025-02-26T15:15:26.240000 +CVE-2025-25514,0,1,617e4a6ef407d85f550869e4d2690c93c017af8d1a1803140af567fdeb25478b,2025-02-28T22:15:39.473000 +CVE-2025-25515,0,1,b55809ed8be4e056eed339e65fd6c6d32af10fd4b51bbed182e22a7f91d5014a,2025-02-26T15:15:25.327000 +CVE-2025-25516,0,1,23bba78be49e10039f4b6bf8592c9ac6aac3a9970bcaf7fb58095303adfe6b6b,2025-02-26T15:15:25.507000 +CVE-2025-25517,0,1,c4e74b1e4b5e3bdb91600ba3c3c11c0da302d25b6674e8e626555ebe3c325a78,2025-02-26T15:15:25.680000 +CVE-2025-25519,0,1,017dcef3c55881366215606b5780e4f44a536d0b3b4808b6c941ffb0335bb098,2025-02-26T15:15:25.867000 +CVE-2025-25520,0,1,d82d358d853245c9f484d3961777a5c8466060073bf3f6d3002c80d6ba9dfb8f,2025-02-26T15:15:26.053000 +CVE-2025-25521,0,1,2d7d4f7cf15635a2b9322e7cd1d8a6adf400200c0e48cfe136bcb6c0a110244c,2025-02-26T15:15:26.240000 CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000 CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000 CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000 @@ -283952,13 +283952,13 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 -CVE-2025-25570,0,0,430988ff55d84a8ccb4f31c79b9a35f79acfce21676368efb1c34e8edc940913,2025-02-28T22:15:39.630000 +CVE-2025-25570,0,1,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000 -CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 +CVE-2025-25632,0,1,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 @@ -283972,13 +283972,13 @@ CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000 -CVE-2025-25724,0,0,a31718192b53d6a361e6a655d6ad32958c9e6ce226e8fbe6e70b631b7f89a878,2025-03-02T02:15:36.603000 +CVE-2025-25724,0,1,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000 CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000 CVE-2025-25726,0,0,1241b8ce4f2f3e5a9582d1cb34e021df8b6f066d37fe203461681ffda7c05f0f,2025-03-02T02:15:36.850000 -CVE-2025-25727,0,0,eed5aa4e92d3da35936b8898a3baaeb8486976d6506a3be4f81c3be66ac7acb1,2025-02-28T00:15:36.530000 -CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314bf22,2025-02-28T00:15:36.680000 -CVE-2025-25729,0,0,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000 -CVE-2025-25730,0,0,5698d9d4b3d086c1c265c033d8b8d6ebf52c1e553b08fab79bfe6eec41adf00a,2025-02-28T20:15:46.803000 +CVE-2025-25727,0,1,a463f9a30c3b07ea979a108d89c5f5093759020443c64839afb53561c19e5a60,2025-02-28T00:15:36.530000 +CVE-2025-25728,0,1,1189853ac3c61bee23af7c49ad2139e48e8a747d4ba5ca106c87a7dc4a936521,2025-02-28T00:15:36.680000 +CVE-2025-25729,0,1,37dccbd23e8b05f5aabcfb584977649888f3f534d26d5e574ce2d7e88687c4b1,2025-02-28T16:15:39.707000 +CVE-2025-25730,0,1,2d4e8c99634c9753085f1bf0f3dc2ae2d2ae9a31f8634761394f303c2de1e717,2025-02-28T20:15:46.803000 CVE-2025-25740,0,0,773eb69d9fa04e004e72a74faf22d133a852d69f49836b1bbebb7a8b7833c66c,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000 CVE-2025-25742,0,0,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000 @@ -283988,7 +283988,7 @@ CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 -CVE-2025-25761,0,0,3db442c19fbfc76e4afa4e4eacc9350d95fd28b1bf92eb230c9d214105e6b76b,2025-02-27T15:15:41.777000 +CVE-2025-25761,0,1,f248f6741f63a9a7aedabfe16b412988575b28956c4c9e9dd6d7c9dcf3c9c70f,2025-02-27T15:15:41.777000 CVE-2025-25763,0,0,99137e0216a0b48a5c697c4fff231e990ba56e7e76a12ada9abbf4aea39c8394,2025-03-07T20:15:38.180000 CVE-2025-25765,0,0,4771a7e87c33cb6b1bf793f3b79e4f059f64eb7778711124d0e26c1a7b4b4033,2025-03-03T20:15:46.433000 CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413b60,2025-03-03T20:15:46.600000 @@ -284002,17 +284002,17 @@ CVE-2025-25784,0,0,3e43aebf6f03069ac210115a03220d81a261d055bf117d06bf3215e14e262 CVE-2025-25785,0,0,12399114d1e01798a9cb8e44ff529be3a97f5d175baa693f6af5ee4fed7d3d07,2025-03-05T15:15:17.930000 CVE-2025-25789,0,0,0f14c3f4531a98890710e1a14e26e29c794c8daab8f347fb89e415279f670b71,2025-03-05T15:15:18.117000 CVE-2025-25790,0,0,7f4ba42ac1fa0ded64af2d9c6fa1b05caa67d4b689df7ce81d6f0841ed6a91ca,2025-03-05T15:15:18.287000 -CVE-2025-25791,0,0,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000 -CVE-2025-25792,0,0,8ed8e898e77ccb511a21f5618850617bafb38b135aa1ceeb89c7273480778843,2025-03-03T21:15:18.863000 +CVE-2025-25791,0,1,ef30eb1675961cc15191f4a4b7dcf35a55c9b6b7bd955126c2b0af54eaf9a639,2025-03-03T18:15:40.030000 +CVE-2025-25792,0,1,a4f4a96ed8354d6e72c2916ac3e6b103585e9e936a2f0a1069b68dee434fd959,2025-03-03T21:15:18.863000 CVE-2025-25793,0,0,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933dcab,2025-03-06T18:15:41.480000 CVE-2025-25794,0,0,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000 CVE-2025-25796,0,0,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000 CVE-2025-25797,0,0,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000 CVE-2025-25799,0,0,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000 -CVE-2025-25800,0,0,522fb65d58ed245411f19820e000d842e65fe1759af2fa4ffd4c03c8bb5f4592,2025-02-26T16:15:17.053000 +CVE-2025-25800,0,1,84c0703ad8895be752ba6115cd9ffe473c7260c43dbc52d30ca606520fed7ac5,2025-02-26T16:15:17.053000 CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000 CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000 -CVE-2025-25818,0,0,bb1057156f76c0ba13313437f2d9a42516b0d209ee43b6f684c1131ad31b9b9f,2025-03-03T17:15:15.230000 +CVE-2025-25818,0,1,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b878d1,2025-03-03T17:15:15.230000 CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000 CVE-2025-25825,0,0,44662eb5095fccda4e3c5daeb8867cc0b42f8cea49e95654318106019a993ae4,2025-03-06T21:15:15.300000 CVE-2025-25827,0,0,592a10fc3f850156d30f40a9c171cd33687dda2306b5a1e50f6dc9f481441aeb,2025-03-06T21:15:15.460000 @@ -284031,7 +284031,7 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 -CVE-2025-25916,0,0,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000 +CVE-2025-25916,0,1,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000 @@ -284062,7 +284062,7 @@ CVE-2025-26013,0,0,724f265adcd738220ed4a776fa09e1541bc1e63c38f068763e12781ff127f CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922eccf1,2025-02-21T17:15:14.680000 CVE-2025-26047,0,0,e5f969b85e25d20e576d529c079698dda076726cc7fa9835a0c501d496a29bb3,2025-03-06T21:15:15.623000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 -CVE-2025-26091,0,0,de888ac48b9f6b5458a595acd54af619dbe9af0acc8f88bc90bf02904e83c7b4,2025-03-04T17:15:18.243000 +CVE-2025-26091,0,1,a9bd7cf56daa4e25bf16a8d9dda65587172626b322af3dd2aebaf77be07c72ff,2025-03-04T17:15:18.243000 CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec741,2025-03-05T17:15:16.017000 CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 @@ -284072,9 +284072,9 @@ CVE-2025-26182,0,0,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbc CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 CVE-2025-26202,0,0,faf1da73f05d445d952dd532cee33fae2a2ae5a854a8d484ad2405b4354fa0d8,2025-03-05T16:15:40.130000 -CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000 +CVE-2025-26206,0,1,65fb1b35688e4155ab7cd5d9dba72d14a0558f77be50007bc2f864f59797ec8c,2025-03-04T17:15:18.487000 CVE-2025-26263,0,0,fc3120fea42838e95a7a6b2851141f093ed91446459738db389d5fc39c0f2990,2025-03-06T22:15:35.437000 -CVE-2025-26264,0,0,3e1d4d30fa9513d426ec3a7ec9d2895da1266ed6b8213b35e226a5d2b686e5dc,2025-02-28T22:15:39.780000 +CVE-2025-26264,0,1,d652b5dab25ae333f8ea0835b25b75d718ba956bf0f33ef0027b1933da0a46e3,2025-02-28T22:15:39.780000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 @@ -284086,7 +284086,7 @@ CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39 CVE-2025-26318,0,0,954b8e579069ffbba2c1644cd56a790bd60e4a5ad19eb604706c56f01984d999,2025-03-05T17:15:16.180000 CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a721,2025-03-05T17:15:16.340000 CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000 -CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 +CVE-2025-26325,0,1,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000 CVE-2025-26331,0,0,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 @@ -284117,25 +284117,25 @@ CVE-2025-26363,0,0,88de4b738054d81b50fbc63f019ba6c5ca3994c19879d01a6ec8b97a38a00 CVE-2025-26364,0,0,cad3ad8549b1f8959c696141548488c58bf9c1bb1c933f0ca4bc69b1966f877c,2025-02-12T14:15:37.123000 CVE-2025-26365,0,0,48652c3299634957c004062f087c5baa530f27f58870661c91c04d5d14c97015,2025-02-12T14:15:37.267000 CVE-2025-26366,0,0,791459512be83b7fc0ade0a1c646586bc122ab878822f19fa4a4996b21043d24,2025-02-12T14:15:37.397000 -CVE-2025-26367,0,0,0db2fa42c92abdeeb8b6f53cb796651ba022abb1806d9d4781c141b92591ddc5,2025-02-12T14:15:37.533000 -CVE-2025-26368,0,0,a1a1c238639cdff8f5e44f2534ab2ca357edb50432de477306cddd37368073dc,2025-02-12T14:15:37.660000 -CVE-2025-26369,0,0,f84406f1acf656592558e5d9b47b0b9f3d72547a6dd3314df3ac76552f04ba77,2025-02-12T14:15:37.800000 -CVE-2025-26370,0,0,bbb2d9fb4c0649126ad0d0a3c98d217a6344733d746a48a9e3d9d92e5e0ecd29,2025-02-12T14:15:37.940000 -CVE-2025-26371,0,0,7ec1c9729a94b5be0bd04a04db55b9f67bb7970da8d10bcbe871c431291a3b8c,2025-02-12T14:15:38.077000 -CVE-2025-26372,0,0,6bbfdc80183d609b86ee398dc52831ff4f4767beeb4a7b0f8653b05ec43160fa,2025-02-12T14:15:38.227000 -CVE-2025-26373,0,0,c798810bbbd6dc67d70a50a3162c488c6729ffdcdc8131fa509dc6e1fec0fdbc,2025-02-12T14:15:38.360000 -CVE-2025-26374,0,0,fbfabd03ca80a51efefb621201de0a9e3801af7fbc6afb15a854c48301686ac1,2025-02-12T14:15:38.500000 -CVE-2025-26375,0,0,84821ae2a61f085659b0e84453533efd90e26d2715dcaed43a63af4d901a903e,2025-02-12T14:15:38.633000 -CVE-2025-26376,0,0,ae206e68a42a4d679f54837497ae12a86feed61ce6edfe0c3c3976f9bfd49395,2025-02-12T14:15:38.777000 -CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000 -CVE-2025-26378,0,0,e51dbad96406eb456158bdbf1d717d786489f18ecfbd56f380fadc61ce2f3d12,2025-02-12T14:15:39.163000 +CVE-2025-26367,0,1,0fda62fd37b05ce67174e90d99abb27eb8b2b5180dcb22e47c14eeb24b9349b4,2025-03-03T19:36:13.823000 +CVE-2025-26368,0,1,86be434a92cc3ba6cf93ba4378797b9e6287e4f688532854e7458a3f2f1ff3ac,2025-03-03T19:36:13.823000 +CVE-2025-26369,0,1,b1867cc2019b7e993de61876fcd50acc0051970c377eaf955676f601ca202c59,2025-03-03T19:36:13.823000 +CVE-2025-26370,0,1,c57c04d3b43d4338447f6d9c43bb7ce1150054782f890b1ea2048df782103d8a,2025-02-12T14:15:37.940000 +CVE-2025-26371,0,1,88071c7715280a8bbcaf925a3a7126843fd580d86a57973bd420d9bbbdc8e3ce,2025-03-03T19:36:13.823000 +CVE-2025-26372,0,1,920b3fef38fd481da0796873d691023b0ee567f23116314a5e92f56b2381d0f3,2025-03-03T19:36:13.823000 +CVE-2025-26373,0,1,6386623d40e46726ce362b6e8d9adfc6b39931a7a2d1aff605d309083d444262,2025-02-12T14:15:38.360000 +CVE-2025-26374,0,1,d00dcbdcf2968e7080b49ea73e02bc66d980e8efd653e5e6567d2c90379935e8,2025-03-03T19:36:13.823000 +CVE-2025-26375,0,1,920a9deea8fdb28d78f3224a9ae4f3833d3a4b2e893a04dcbb3ded1a51d8dd46,2025-03-03T19:36:13.823000 +CVE-2025-26376,0,1,e218464efe6e90fed84c4d978b6ad6bf0b6200543af2dccb376bf6395f02fc6e,2025-03-03T19:36:13.823000 +CVE-2025-26377,0,1,297351c68cf52c9cd83717e4b65904d9dae0cadbdb795ffb2db1593b20c049d1,2025-02-12T14:15:38.933000 +CVE-2025-26378,0,1,1d699d733c576eec2ea126d7e5a0c031be00ae2bb25a420f8d8e59a1c66ad944,2025-03-03T19:36:13.823000 CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259ee6c,2025-02-18T18:15:36.097000 CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 -CVE-2025-26465,0,0,f25765ed256eff314f13089336ba54158694f343e4e7f929cae34b191b596bff,2025-03-03T18:15:40.247000 -CVE-2025-26466,0,0,548bf7a27b1270e9aa9b10c7ec42a28144fa7b96452ac1b65297a175c15ca940,2025-03-05T04:15:12.127000 -CVE-2025-26473,0,0,0de7ad16e6d8c7db9e1838d2da6a9c6cb3a186f455c098963c4286ddeef3bd3d,2025-02-13T22:15:13.417000 +CVE-2025-26465,0,1,891ebcc3f2b2d570a319bc3b195f6888f054ed7b62aec64c0b059ab032f79425,2025-03-05T18:54:18.150000 +CVE-2025-26466,0,1,31e3313907815d9444404919db40575d054ac5cd1b151e7618641ef4fbb46ce5,2025-03-05T14:05:15.387000 +CVE-2025-26473,0,1,52ccbccdb5f491f06d9908445755c27b74741ade2b49687a9637bc0d9ccdeabb,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000 CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10654,2025-02-11T14:15:31.260000 @@ -284147,7 +284147,7 @@ CVE-2025-26507,0,0,95b908cc64a72128294640690e70f9b52cb7f86d46bb5d8b6708727a9b7ab CVE-2025-26508,0,0,d39bd75c34a7083f955ea70add860587db1f6572db6bc11a7a1abfe21efc97ea,2025-02-14T17:15:22.983000 CVE-2025-26511,0,0,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000 -CVE-2025-26520,0,0,fda8ec9687e10625c856cf32406850389646128986297c6bf71d213c6eb7b4cd,2025-02-12T07:15:08.617000 +CVE-2025-26520,0,1,5a00210262e6686d707ec8b80d4f104f6af4a14a3efe01116296ce9558a98fba,2025-02-12T07:15:08.617000 CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000 CVE-2025-26524,0,0,e4675579756d8bf50fc8a11fc92dcb6c0f4393fb284e95c0369d48074177af48,2025-02-14T12:15:29.887000 @@ -284160,11 +284160,11 @@ CVE-2025-26530,0,0,09a0748455bc659d6989e31e327b5989db76ac7924c30a95a554cde861ed3 CVE-2025-26531,0,0,fc0f4e77d1c1071bba686eb2017d32fa454189d0419ad72aaf9c7f4e2b6e442f,2025-02-24T20:15:33.933000 CVE-2025-26532,0,0,5e501a7d3709b2aa8c5be9125b3a76235831b0b4b3b67ef6bc1a6c982c27eef2,2025-02-24T20:15:34.053000 CVE-2025-26533,0,0,a18d4f4a5a0ac1e162dfff41acb3a5f496590937464ceb83e8fe84ab406903e7,2025-02-24T21:15:11.057000 -CVE-2025-26534,0,0,6fc053c5ae01a8badbbaec51325a6329c073f97602adb14a02d554110cdb41ae,2025-03-03T14:15:54.757000 -CVE-2025-26535,0,0,10bf1d3b4fd8855382114c974e895976efa527d78196d8edb6a9f26eeba26f4f,2025-03-03T14:15:54.900000 +CVE-2025-26534,0,1,ab467a5c9c98bcf93d9b7ea4108c47f6694cf2610d3631b8a1fb0fc39b004fbd,2025-03-03T14:15:54.757000 +CVE-2025-26535,0,1,565367cf0af5ec55fb84aa51b9f3cdbadac3508258cd3a35844455f68691b45e,2025-03-03T14:15:54.900000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 -CVE-2025-26540,0,0,ed3070be48d00a76e88c10251c8e991ed8714bee460ed7a12da5751f7d5c31c1,2025-03-03T14:15:55.037000 +CVE-2025-26540,0,1,08a03edcb3fb5cbf83ab6f143d7641096163430d54f5e1cdf4c07f2284606837,2025-03-03T14:15:55.037000 CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000 CVE-2025-26547,0,0,e08dcb76a1a156827a53523cfc389ec01817f240b8063496d38b458c276a6d4a,2025-02-13T14:16:20.347000 @@ -284172,11 +284172,11 @@ CVE-2025-26549,0,0,a91c3170bbcc373aaf39cde5374b44949bf89c60e7eb9052278e26cc0b4c7 CVE-2025-26550,0,0,11ffa180d12636b1f76387bc0c94d3286af647f36111bf953b554aa472cf9302,2025-02-13T14:16:20.993000 CVE-2025-26551,0,0,7dba4004c8c5ac4b8233012e2b2938b33f182bd977f21f4fcded6f08beb26471,2025-02-13T14:16:21.450000 CVE-2025-26552,0,0,16d07aca1b11958070d4074738ec0200053b71a2d60f0b27a550d9209c196d6d,2025-02-13T14:16:21.787000 -CVE-2025-26557,0,0,d385ed145fbb4f8d815d25d06045454beb6305459538025233079fe8d87676e9,2025-03-03T14:15:55.173000 +CVE-2025-26557,0,1,78fcbed318c980adb806849ae60b5051c97a5ad5bb4ce5ea0a885ea6b945f93d,2025-03-03T14:15:55.173000 CVE-2025-26558,0,0,a062ee3114c1fd8a9a3b12a23d155f52de34c21e7fb6b719fabc3bfc4229ad95,2025-02-13T14:16:22.130000 CVE-2025-26561,0,0,9db6fc955870504ffcf58626e676807e01c595a1a1593cd3c1cecbb59b4da31a,2025-02-13T14:16:22.450000 CVE-2025-26562,0,0,78c3ae54a6c695c17d29fde5c9737279cebca6b65324878f65a4af2921bdd7d5,2025-02-13T14:16:22.607000 -CVE-2025-26563,0,0,8980540b2b19cd1958ec1f2f791aa899eefc90f63022f10bd43a73920718b428,2025-03-03T14:15:55.310000 +CVE-2025-26563,0,1,4748440159882f70493b76b915cfd5e07b6cb7c88518a748fc4f26c2e284470d,2025-03-03T14:15:55.310000 CVE-2025-26567,0,0,9c52f3fc1e49f60743513ba1ed12dcbfda98a9640ff0dad0a481c93829413d86,2025-02-13T14:16:22.763000 CVE-2025-26568,0,0,6a192b29369c6b3335433454f2c2e808bd01940f79d2fba0874a491ae58acee8,2025-02-13T14:16:22.910000 CVE-2025-26569,0,0,9a179d6db4962531369c0769d72d435114b34b89fbe8cbd8217294dfd6d060d0,2025-02-13T14:16:23.070000 @@ -284188,11 +284188,11 @@ CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 -CVE-2025-26585,0,0,9ac38f3a065cada74e53eb756be42cd5cc9e7d81f5a7067757b2f87cb299348a,2025-03-03T14:15:55.470000 -CVE-2025-26586,0,0,9de798772bcf8b69e1f9d59046278061df5835cbaf2bec86432fb70a5b0e047a,2025-03-03T14:15:55.640000 -CVE-2025-26587,0,0,9dc6f2a7bb360069e4b8cc02514cde74f4a8d2bcaac5ee6bdad13028e58f561e,2025-03-03T14:15:55.780000 -CVE-2025-26588,0,0,3d48a24eb2502fc6c90773e5ff07df46aea0a78afc7299ab4e2317fbf1b71d2c,2025-03-03T14:15:55.920000 -CVE-2025-26589,0,0,944d5104a3821c549e39415555e5cac14ff0ae961ea607176bbfcada777b7096,2025-03-03T14:15:56.067000 +CVE-2025-26585,0,1,92032c09be1592164acb96287b82c62eb88a8f0bba053ae93a1e251b4204853d,2025-03-03T14:15:55.470000 +CVE-2025-26586,0,1,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8cc20,2025-03-03T14:15:55.640000 +CVE-2025-26587,0,1,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000 +CVE-2025-26588,0,1,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000 +CVE-2025-26589,0,1,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000 CVE-2025-26594,0,0,0d6d9befe6da920872ec22e8e208a0d81f4bd77a0af2601af6452e5457b8c1b9,2025-03-04T17:22:39.620000 CVE-2025-26595,0,0,9c7fff58832704987ccf743960665d07f758e30383f1a9601ecd32dca83c0576,2025-03-04T17:22:39.620000 CVE-2025-26596,0,0,cfec1b7af7b418f4d0d8101bb5388b19d5ce1506fde9b472b400bc369e32cded,2025-03-04T17:22:39.620000 @@ -284222,7 +284222,7 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000 -CVE-2025-26698,0,0,a84e642c8171fd04684ed37215c90775ce47055c0db39dea2bf9e7638329b9fb,2025-02-26T13:15:41.983000 +CVE-2025-26698,0,1,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 CVE-2025-26708,0,0,d8e31c1d3ac2ae2d4309442531e3be42990d730d60213fee7cc6165b1cee0645,2025-03-07T03:15:33.307000 @@ -284261,19 +284261,19 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 -CVE-2025-26849,0,0,4804d0ece607a764494cd6767268cd543fb8f2e15d59cfe59c95c44de45b7d40,2025-03-05T04:15:12.367000 +CVE-2025-26849,0,1,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 CVE-2025-26876,0,0,951eb7449b154de578d3128a59b04224fb75a7c7aa4bcfeca0a4c24d809c64ec,2025-02-25T15:15:24.180000 CVE-2025-26877,0,0,b1fb1271cf45d4f78b6f005e3e24f2bb5a70e11b2fe017c5fa8de04fa1174cda,2025-02-25T15:15:24.380000 CVE-2025-26878,0,0,b83c78001aed3b72257afa473beed64325520c746080d9d4c55fc0721207cb83,2025-02-25T15:15:24.560000 -CVE-2025-26879,0,0,ee3d3c367f382999f7c131659c188d29259a67959865aa261444c0890da811b1,2025-03-03T14:15:56.213000 +CVE-2025-26879,0,1,ff13b8336e93c3c4112258e1261f28d97f76ce67ffc3e5951e1c9eced4ea0dc7,2025-03-03T14:15:56.213000 CVE-2025-26881,0,0,921429dd5a0c5a1101d4da691445afee44c665c84de754602fbf841d0217b94b,2025-02-25T15:15:24.690000 CVE-2025-26882,0,0,7062fd0c75af34ccf6b6ec2ff75c922493b57ba8fdc01187594aa2fa72d319c7,2025-02-25T15:15:24.837000 CVE-2025-26883,0,0,922ad8d066f9e08d920e6020bb5edb414ef495b7a7f4fba5c400a5b716452883,2025-02-24T15:15:14.007000 CVE-2025-26884,0,0,1d074e2084c12e5387b24bf69656649d494667e7bb4c2438392c9dd96d466434,2025-02-25T15:15:24.977000 -CVE-2025-26885,0,0,aaeeeb7523d3ad23a8905509f21778a495219afcfd8e2f3597d8ce85f8c015d7,2025-03-03T14:15:56.360000 +CVE-2025-26885,0,1,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a44b,2025-03-03T14:15:56.360000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000 @@ -284286,11 +284286,11 @@ CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd646 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000 CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca3cc,2025-02-25T15:15:26.663000 -CVE-2025-26914,0,0,226881c0e7104d164f16fb899b4d54831bbb9313d069f9649f0bd17e480b43ed,2025-03-03T14:15:56.500000 +CVE-2025-26914,0,1,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000 CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000 -CVE-2025-26917,0,0,31cc21cc9072306585f69514f61f2e960ec855b1681b400f7e8f49a88e62c0af,2025-03-03T14:15:56.640000 -CVE-2025-26918,0,0,98eec19d324c288ebb7a445776d639c4e1c856c42b6d8f891272eb5a03cd771d,2025-03-03T14:15:56.787000 -CVE-2025-26925,0,0,8946eee7a39194c4afd7076d624fb421e6dcd2fade2681e6dbc0c8990bd1c992,2025-02-26T14:15:11.743000 +CVE-2025-26917,0,1,c1097030fbcc9b94d267c252ddacbb859283ed99e922157cf435c49676b50741,2025-03-03T14:15:56.640000 +CVE-2025-26918,0,1,23788357a0b6dd77631565c9d4f3eb930266dadf051f40a3a97eb14cd9ad37b2,2025-03-03T14:15:56.787000 +CVE-2025-26925,0,1,d5e509c3100c8df66ee25704b916843165e5ea195a85927b6d7f6a9a10386673,2025-02-26T14:15:11.743000 CVE-2025-26926,0,0,46670274056f543a2d8d831b8a506aef43cfadd1396d409b955b63f1e76e669c,2025-02-25T15:15:26.930000 CVE-2025-26928,0,0,861f1ddc85c79a1a8d63021b4a752a7980136fff79059fb765bfdd66a75382c5,2025-02-25T15:15:27.067000 CVE-2025-26931,0,0,7680a16e5e4bc5cb7d571ec7522e8eb1da81a45543fb23fce8deb347b9f39cce,2025-02-25T15:15:27.200000 @@ -284313,8 +284313,8 @@ CVE-2025-26963,0,0,54f00e4fea41b88956fdb0f9291bf51c02378bde0a947585b962f5bdc1cc3 CVE-2025-26964,0,0,ea0080d8ce2ecb3373a085eceb32e90ea95cb761f82deb76b39a1124e96a2b84,2025-02-25T15:15:29.557000 CVE-2025-26965,0,0,93c337cc3eb3f8fc92e5ddc9ffc0898aaa0f0aad24f5399c878678a39f5616ad,2025-02-25T15:15:29.703000 CVE-2025-26966,0,0,684880e8c3573c6260a708640641c019d80d69ea6fd25ee44630d6bbd77dd883,2025-02-25T15:15:29.870000 -CVE-2025-26967,0,0,2cae9a5ea0d13b0819f134b63dbd07e03b6937014242e21d306c74a74ba6e150,2025-03-03T14:15:56.927000 -CVE-2025-26970,0,0,3fcdcd39b757ef90c65ee65cbf95ffeab429f7b7293b199e99fda40f9f84ac67,2025-03-03T14:15:57.077000 +CVE-2025-26967,0,1,8a0dee5341be836887c7e56be030e1f5276a5f32173aa96034e4713dbef1df89,2025-03-07T20:44:44.980000 +CVE-2025-26970,0,1,b80619be75f44699d5685a53e4facedbdcc25783b061c17e531c0c814a3e1f6d,2025-03-03T14:15:57.077000 CVE-2025-26971,0,0,e0eab267b5fe828b40a07ebbc4ca96ca688836c7dc0a336c224f3b128e48119a,2025-02-25T15:15:30.017000 CVE-2025-26973,0,0,dfc2b4d3fdbe9f7b9fc4015477cd2b76bd1f2004f6502405d65906b3259ef418,2025-02-22T16:15:32.347000 CVE-2025-26974,0,0,087b2068688c855d65bcc9dc5a6b0a9d8b357bc70b730524b9e5919cb0ee5a69,2025-02-25T15:15:30.153000 @@ -284333,7 +284333,7 @@ CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0 CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000 CVE-2025-26994,0,0,403d03c06473367df2362b43f875ecb5b25ad642dfc3c4d0304d4378ba0dcb0e,2025-03-07T19:45:52.873000 CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be04b,2025-02-25T15:15:31.720000 -CVE-2025-26999,0,0,8c64a91161ab0aa5bf793f758186e5ed0408fbb3bed66a569dd53652259b21a0,2025-03-03T14:15:57.830000 +CVE-2025-26999,0,1,cdacabf1a660ac6dee9a5685fa630f6b1572dbc44af9dd2498823746cb2cfe2c,2025-03-03T14:15:57.830000 CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcfb4d,2025-02-25T15:15:31.853000 CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b34a,2025-02-22T16:15:32.497000 CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 @@ -284343,11 +284343,11 @@ CVE-2025-27089,0,0,a454d43bdd21fb972482a0ce87896ca310da5d909b4331caf97bfdced4edb CVE-2025-27090,0,0,0a4ccf92007267c16eee4b4b222c0a1bb704a8cf350c4393244356bc535834a9,2025-02-27T20:18:12.583000 CVE-2025-27091,0,0,b859d3590fe981ab912d6921b74efbe324bec6c5ee689190e2cf257247d50a52,2025-02-27T20:18:12.583000 CVE-2025-27092,0,0,7104bc7ae5ee9a84de752291fd5401045f96963015db3ee80e61b32134a06641,2025-02-27T20:18:12.583000 -CVE-2025-27094,0,0,1d0155e4f99b84ebc1c41b06ebf2678969c0072b94c6127fed8335ba465ba26a,2025-03-03T17:15:15.433000 +CVE-2025-27094,0,1,912ebcbf7addc06d338a9df39021fc14862a3f9eff1e3429510bfe78c00688b7,2025-03-03T17:15:15.433000 CVE-2025-27096,0,0,713806d5fcce08ce5e5f69a4288233d3ecee84861b6679ecda83068a27e46fd0,2025-02-28T19:18:34.167000 CVE-2025-27097,0,0,2589fa071c1a9a9a5c73ad315b8e6452ddbba374e2341b11c614c9f7d8047e61,2025-02-27T20:18:12.583000 CVE-2025-27098,0,0,492c80cbc63ad6506b976d2c569a0f82a671edac45cb267f8bf0fb56623897bc,2025-02-27T20:18:12.583000 -CVE-2025-27099,0,0,02f7b15a92b044980d4320020e01555470581ad4478f07732cef3a6e4066fc9a,2025-03-03T17:15:15.533000 +CVE-2025-27099,0,1,e0a8674e5982bed778d53380d1b5e133811de7e5fe1cff344a8cdd4483cf2db8,2025-03-03T17:15:15.533000 CVE-2025-27100,0,0,e8e728a94b37df8d941f1021ffd1ce6798ea17728dd5164f5aca39df84532b59,2025-02-21T00:15:09.250000 CVE-2025-27104,0,0,db08a4c948fc11797e4258ffc992c2c766c2c60f6bb4613e3fe0360292b496dc,2025-02-22T16:15:32.640000 CVE-2025-27105,0,0,df9e9eacd546987ca285a6d087354c1720d68ee71843aaeedd241da5e8b62276,2025-02-22T16:15:32.827000 @@ -284355,7 +284355,7 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000 CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000 CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 -CVE-2025-27111,0,0,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000 +CVE-2025-27111,0,1,603e696b770431038a322062dd2271adcd4fec6ad741a9d65d281237f1a62d7e,2025-03-04T16:15:40.487000 CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000 CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 @@ -284369,33 +284369,33 @@ CVE-2025-27143,0,0,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f85189 CVE-2025-27144,0,0,7b7ab9cc6cc8170173ae9d52939463b9ea29a5775bc47236dbba73f17e364355,2025-02-24T23:15:11.427000 CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75c2c,2025-02-25T14:15:31.567000 CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000 -CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000 -CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000 +CVE-2025-27148,0,1,a02be6d0e91bf8eda3626965312087a36b8be8d291da209d00439f9926ccce17,2025-02-25T21:15:18.073000 +CVE-2025-27150,0,1,9fc1fab51036cc1b6bf0fa7287b920603bc442f0482882ade6f0b02a894fcced,2025-03-04T17:15:18.663000 CVE-2025-27152,0,0,574e27bd64d8669dd2d69821f9c5d27041d6de3de8ef80993979711da0db8eac,2025-03-07T20:15:38.560000 -CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000 -CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000 -CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000 -CVE-2025-27157,0,0,d1dc9b4dc7f892f66b40d5a59eaf35f745dad910762a74c52136c3d66f64265b,2025-02-27T17:15:16.867000 +CVE-2025-27154,0,1,dacf6cef3721a4218d4e6810dd59da982acbb3d6686247b093e3a212d3c26ee6,2025-02-27T15:15:41.937000 +CVE-2025-27155,0,1,5c027c234aa912efbf95720eb50f967aaf5747b42cdc6393b40f1f04caedeb07,2025-03-04T17:15:18.833000 +CVE-2025-27156,0,1,5dd627e3b6db05617238f04696d11de69e6dc5f5c7dd17c4f99850bff75da73b,2025-03-04T17:15:18.997000 +CVE-2025-27157,0,1,82eb8d36063536d774ee636a24e368a87d8a8dd12b6203e709015057d075f7b0,2025-02-27T17:15:16.867000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000 CVE-2025-27220,0,0,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000 CVE-2025-27221,0,0,a77e2ee5b7be7126d70eb1fc9ecc3c0c9965218d6caa5649ef94dfa24ec52f83,2025-03-05T14:05:49.230000 -CVE-2025-27263,0,0,bb2fb5fbdd50586632b45bcd28ca8d1b94cc0c3d678d9350164209de7a3a7d9c,2025-03-03T14:15:57.980000 -CVE-2025-27264,0,0,3266982b454bfda336470c942e22fa435d9ddfb60b41319a7c42000b556f0d3c,2025-03-03T14:15:58.123000 +CVE-2025-27263,0,1,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c5c3,2025-03-03T14:15:57.980000 +CVE-2025-27264,0,1,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000 CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000 CVE-2025-27266,0,0,0b43dda3510df1a6caf90e315ec8e9c1ba742b051a50a212ca0413260e31120b,2025-02-24T15:15:14.443000 -CVE-2025-27268,0,0,e64be4188771dad6a15e59495b3da70ccafc47140d11055147f480507c09fd52,2025-03-03T14:15:58.260000 -CVE-2025-27269,0,0,8ff5830914d2e85e7b2b2251b9b4e6c22853d6a932cada44a8898fea487a3055,2025-03-03T14:15:58.403000 -CVE-2025-27270,0,0,62ce7ae39552dcf98e74a929da94c122901033843d659e740e76ce886f88b137,2025-03-03T14:15:58.540000 -CVE-2025-27271,0,0,a51dd779d1e01c42ca782189b1a6be007e4b2ddcd153553426551dce64779f7c,2025-03-03T14:15:58.677000 +CVE-2025-27268,0,1,3174702840ac51701223fd78f030265fdecc7c2ffadea0a55057ef38d207fc0b,2025-03-03T14:15:58.260000 +CVE-2025-27269,0,1,cda17c6a54559232936df28b8cf7711d2616fcb290267724b2af86f894a9aa65,2025-03-03T14:15:58.403000 +CVE-2025-27270,0,1,4345f1c1b15678a4b2ef9a6d3d453e7a5c46137ca8899ccd2e842d25a097e4f6,2025-03-03T14:15:58.540000 +CVE-2025-27271,0,1,e3c2645210f856dd2bf72e6ed4222c53429c06af30de0ffdb6eb0d99ebf0dc73,2025-03-03T14:15:58.677000 CVE-2025-27272,0,0,031cb0c5a5ee5c0d99c125c8cfce6477a55151f9e350ba83c3bb825eb8b36e1c,2025-02-24T15:15:14.587000 -CVE-2025-27273,0,0,986adc4105f3b5d942d000deb3102d4e3205c4be20cd32374cc7b1b5bae346dd,2025-03-03T14:15:58.817000 +CVE-2025-27273,0,1,530dfc09327240f737c432b7fe310bf240e8a044d03b1a004695237014429dde,2025-03-03T14:15:58.817000 CVE-2025-27274,0,0,b448c2091d8e9c14aaab731b559f9d5a1a139a5ef1074c94c3bf88744038e682,2025-03-07T19:45:52.873000 -CVE-2025-27275,0,0,ffedf4deb1e1963ad3f8692ee23ead4a75a895038be801e42551de90045582bc,2025-03-03T14:15:59.097000 +CVE-2025-27275,0,1,5be45f5260a4a052b5283b669cae35aa76176dbc83c52a6ed8c789d9328389e5,2025-03-03T14:15:59.097000 CVE-2025-27276,0,0,38d755ee9b6acb225b7f449b7a5baa0e000c60dcb53715f6dc4116b6d4e4c37a,2025-02-24T15:15:14.730000 CVE-2025-27277,0,0,1e3db72458897ceab2ba68afe91afc155436af173199d9b5d9a959fd815e4da9,2025-02-24T15:15:14.867000 -CVE-2025-27278,0,0,6b9f7737396b4f81c685357d8b78d34b8232b3b2177ca75760834123edb62046,2025-03-03T14:15:59.237000 -CVE-2025-27279,0,0,2ed308b24a8b12b77d4ffde2c8673af3dd0bc257ae3107361374c36be0f1e141,2025-03-03T14:15:59.373000 +CVE-2025-27278,0,1,256de16b0bce0b2fd5dba8326d4ac9f106c7f7707f2dce3a3458f81de2f34615,2025-03-03T14:15:59.237000 +CVE-2025-27279,0,1,e02d4da30ee7c46005e2dd222aff84182ec72114143ea7720d0988b2b719c61c,2025-03-03T14:15:59.373000 CVE-2025-27280,0,0,8676dde15db79bd7dff4cf239425e3f3d950b17aa3701d636d0a7bd0e166a35e,2025-02-24T15:15:15.007000 CVE-2025-27290,0,0,aa628d5cea07d5d297c7ccfde23ff70de2a1958791da61d5415ca3597f031c14,2025-02-24T15:15:15.153000 CVE-2025-27294,0,0,c0b6fc5af6ea72ce95deb09b1966be2a148292fc28e45c7d495dbcb943cd9ee4,2025-02-24T15:15:15.287000 @@ -284444,53 +284444,53 @@ CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f36684 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 -CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000 -CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000 -CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000 -CVE-2025-27402,0,0,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000 +CVE-2025-27399,0,1,39035d656129062238f81ef47ca04f7a1e8421cb055350242877932e69dd87d3,2025-02-27T18:15:30.380000 +CVE-2025-27400,0,1,09b6d518bf48aeab880dbe66e6bc2a5dd8752164e9bf158ed67c63f0b7ab8431,2025-02-28T16:15:40.237000 +CVE-2025-27401,0,1,a0a9ff73f453a0c4b6de03870f141abd84f19622792f55cbc6c22475d44e32fa,2025-03-04T17:15:19.547000 +CVE-2025-27402,0,1,920b5ec493a4fe20f3d86d2225a25091e0d3f71f7744b6da408c9c08d3dfbc7c,2025-03-04T17:15:19.703000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 -CVE-2025-27411,0,0,7c46620b35e5152361e25fc566c4b1f8041bb67e560a60b09944698197642d21,2025-03-05T16:15:40.310000 -CVE-2025-27412,0,0,35d995274288bd2657d5ab5ee31e6636fbd4b229526e99ad02a06a314eadb902,2025-03-05T16:15:40.457000 +CVE-2025-27411,0,1,3bb429b2a417984eb72d2c43dc11687835b7b048bd7b98fbb69cff47d115b00f,2025-03-05T16:15:40.310000 +CVE-2025-27412,0,1,36da7f2c194d6aa83bde542506c3d49a50905fd0f35afd3aefb691fed3dda567,2025-03-05T16:15:40.457000 CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000 -CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000 -CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000 +CVE-2025-27414,0,1,929fb75122881174d77a5f272353ca474f8f31f3e2150b8f4eb15693c5e1bce0,2025-02-28T21:15:27.957000 +CVE-2025-27416,0,1,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193dd23,2025-03-01T01:15:28.857000 CVE-2025-27417,0,0,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000 CVE-2025-27418,0,0,41f3eb54bc8960a9271d089bac74e54194694ac4af5959c0bca02edfdd330c78,2025-03-04T17:15:19.967000 CVE-2025-27419,0,0,23545eabca461f30510f2dd53c371a88af86f97b94200eb443a91c74e041d0b7,2025-03-07T19:45:52.873000 CVE-2025-27420,0,0,b3c5167d23216466badc66bb683feb7a3d63f11b0877f522ded65752258de9d9,2025-03-04T17:15:20.137000 -CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000 -CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000 -CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000 -CVE-2025-27424,0,0,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000 -CVE-2025-27425,0,0,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000 +CVE-2025-27421,0,1,d05fea08a71a3936a2f096f07356bdc55c206f7da4ad4a6502a071cb1952b476,2025-03-03T17:15:15.630000 +CVE-2025-27422,0,1,cce8795dfe16ac096ec644088df76a3fc7ab0f6058c93abaa8f18c6deb644b95,2025-03-03T17:15:15.787000 +CVE-2025-27423,0,1,76136ac7a97f6b3b77c306faa15fa09b7bae261cd8dfd81b49033906f60d3d0d,2025-03-03T17:15:15.943000 +CVE-2025-27424,0,1,ae381ad83c7e807194f65eb0dd3ebd33b86a96ab3f79d590c8b606ddf3148b97,2025-03-04T16:15:40.647000 +CVE-2025-27425,0,1,0c979c07a2366d7040a7201e00a999f4f859e07054a931c54247ba3eb41c463b,2025-03-04T16:15:40.797000 CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000 -CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000 -CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 +CVE-2025-27497,0,1,04993fdb1d20329c81d2ff19baac9002b619ad4067b2189fb1ebe9ca1d230777,2025-03-05T16:15:40.587000 +CVE-2025-27498,0,1,7cb66b0e34a52fccf99fcea1075b68d5f7e08d30f7f5bc4fcc53c0689130dbca,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000 CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000 CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000 -CVE-2025-27506,0,0,8313f9e93dd55499421f598ef258d63dd49365e5994019d7f3a4774aaadb291a,2025-03-06T19:15:27.833000 -CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000 +CVE-2025-27506,0,1,07d246354fc367ff74f9cf24c73de714acb93e0a05058d934ed8848e110089e0,2025-03-06T19:15:27.833000 +CVE-2025-27507,0,1,0ea0e7f912170983706367423c8294ef29ebdc72c1247148cd79f9f3cfab7d76,2025-03-04T17:15:20.360000 CVE-2025-27508,0,0,6296c41bdf17b79783782f3620ad94a749ef956bf3a0c0cbdee8ca138d0376e6,2025-03-07T18:15:48.033000 -CVE-2025-27509,0,0,717db0d8d3de1a389b101d9ff9200fdda3ba763adad4feb3ab4fe65755010e9d,2025-03-06T19:15:27.973000 +CVE-2025-27509,0,1,2cdf0d6e5e8e451b6e4e2c8e70fdbbede4607671ffc5e431c67ca99d3034fc03,2025-03-06T19:15:27.973000 CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000 -CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000 -CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000 -CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000 -CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000 +CVE-2025-27513,0,1,12ef734ce69d3c67d5a222992a7fd1754e92dbd43e04e6ac871589ec2a36d7d4,2025-03-05T19:15:39.337000 +CVE-2025-27515,0,1,841693c329209d581310753bf0c24e9aa10c6d49e88c5e5a79997b51b29ae1b6,2025-03-05T19:15:39.483000 +CVE-2025-27516,0,1,c101e696026e30b98e28e2ccb44f043699f94063ffe905dbe480c67ba7d3c151,2025-03-05T21:15:20.073000 +CVE-2025-27517,0,1,44710f56e1610139e410285474059dacdc5c788b5edd22cb45bb6c34e4fc598d,2025-03-05T20:16:05.960000 CVE-2025-27518,0,0,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000 CVE-2025-27519,0,0,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000 -CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000 -CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 +CVE-2025-27521,0,1,4cf4d30af26522454f21b7e886af3e715ff97e77c392e11c29878dc3f85bd3e3,2025-03-04T20:42:28.777000 +CVE-2025-27554,0,1,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 -CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 +CVE-2025-27590,0,1,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99ba6,2025-03-03T04:15:09.020000 CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000 CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000 -CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000 +CVE-2025-27600,0,1,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000 CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000 CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000 CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000