diff --git a/CVE-2021/CVE-2021-282xx/CVE-2021-28254.json b/CVE-2021/CVE-2021-282xx/CVE-2021-28254.json index 55c84b7b9aa..b2cfa5e9d34 100644 --- a/CVE-2021/CVE-2021-282xx/CVE-2021-28254.json +++ b/CVE-2021/CVE-2021-282xx/CVE-2021-28254.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28254", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T00:15:07.613", - "lastModified": "2024-11-21T05:59:24.580", + "lastModified": "2025-03-05T19:15:24.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-416xx/CVE-2021-41613.json b/CVE-2021/CVE-2021-416xx/CVE-2021-41613.json index 36864a3e229..79afe45e280 100644 --- a/CVE-2021/CVE-2021-416xx/CVE-2021-41613.json +++ b/CVE-2021/CVE-2021-416xx/CVE-2021-41613.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41613", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-18T12:15:07.393", - "lastModified": "2024-11-21T06:26:31.397", + "lastModified": "2025-03-05T19:15:25.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0069.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0069.json index d5b35ad2220..52163a3176c 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0069.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0069.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0069", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:10.180", - "lastModified": "2024-11-21T07:36:29.750", + "lastModified": "2025-03-05T20:15:39.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json index 41b6fe7c76f..a2a9f0123cb 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0765.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0765", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:37.953", - "lastModified": "2024-11-21T07:37:46.657", + "lastModified": "2025-03-05T19:15:27.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1325.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1325.json index c750305ffcd..2ef0876d9e9 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1325.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1325", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:38.183", - "lastModified": "2024-11-21T07:38:55.627", + "lastModified": "2025-03-05T19:15:27.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20635.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20635.json index e3fd65ec204..5b69fcf9c50 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20635.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20635.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20635", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.020", - "lastModified": "2024-11-21T07:41:15.823", + "lastModified": "2025-03-05T19:15:27.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-191" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20645.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20645.json index 6fc56d8a466..a9a2558da63 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20645.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20645.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20645", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.627", - "lastModified": "2024-11-21T07:41:16.970", + "lastModified": "2025-03-05T20:15:42.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20646.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20646.json index 10d96e4d218..04ed07a26b6 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20646.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20646.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20646", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.687", - "lastModified": "2024-11-21T07:41:17.077", + "lastModified": "2025-03-05T20:15:43.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20647.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20647.json index 27d3577742c..698a35739ae 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20647.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20647.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20647", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.740", - "lastModified": "2024-11-21T07:41:17.193", + "lastModified": "2025-03-05T19:15:27.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20648.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20648.json index d8357736fd8..74195dc4ba2 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20648.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20648.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20648", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.797", - "lastModified": "2024-11-21T07:41:17.303", + "lastModified": "2025-03-05T19:15:28.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20649.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20649.json index 81b0b720fd9..e0daca6c49b 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20649.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20649.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20649", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.853", - "lastModified": "2024-11-21T07:41:17.427", + "lastModified": "2025-03-05T19:15:28.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20650.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20650.json index d0ce2796747..d01c4733c1e 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20650.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20650", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.907", - "lastModified": "2024-11-21T07:41:17.543", + "lastModified": "2025-03-05T19:15:28.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20674.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20674.json index 43c5ca967e3..ba06111413a 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20674.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20674.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20674", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.227", - "lastModified": "2024-11-21T07:41:19.830", + "lastModified": "2025-03-05T20:15:43.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24282.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24282.json index 07974bb145d..ea7967d095e 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24282.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24282.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24282", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T21:15:10.880", - "lastModified": "2024-11-21T07:47:39.283", + "lastModified": "2025-03-05T19:15:29.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24657.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24657.json index 1b212b896d5..8c9cbfad8fb 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24657.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24657.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24657", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T06:15:44.490", - "lastModified": "2024-11-21T07:48:17.387", + "lastModified": "2025-03-05T19:15:29.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24773.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24773.json index 024dd63e824..afb22e6fdf0 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24773.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24773.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24773", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T16:15:09.403", - "lastModified": "2024-11-21T07:48:23.443", + "lastModified": "2025-03-05T19:15:29.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24777.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24777.json index 03156194823..3abae243e9a 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24777.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24777.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24777", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T22:15:09.797", - "lastModified": "2024-11-21T07:48:23.967", + "lastModified": "2025-03-05T19:15:29.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24782.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24782.json index e8694106548..92b1bd1e115 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24782.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24782.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24782", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T21:15:10.943", - "lastModified": "2024-11-21T07:48:24.360", + "lastModified": "2025-03-05T19:15:29.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26107.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26107.json index 0ad84cd58c8..3e47632e008 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26107.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26107.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26107", "sourceIdentifier": "report@snyk.io", "published": "2023-03-06T05:15:12.470", - "lastModified": "2024-11-21T07:50:47.367", + "lastModified": "2025-03-05T20:15:54.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -75,6 +75,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26261.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26261.json index ae76c19e9fc..fbb0bab2b55 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26261.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26261", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T15:15:10.473", - "lastModified": "2024-11-21T07:50:59.953", + "lastModified": "2025-03-05T19:15:30.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26950.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26950.json index 2d632ddc227..f9791362547 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26950.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26950.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26950", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T13:15:10.130", - "lastModified": "2024-11-21T07:52:05.960", + "lastModified": "2025-03-05T19:15:31.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26956.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26956.json index 209c5d20972..6e820b851e6 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26956.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26956", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T19:15:11.020", - "lastModified": "2024-11-21T07:52:06.880", + "lastModified": "2025-03-05T19:15:32.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26957.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26957.json index 835de0832ce..131c4aed01d 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26957.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26957.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26957", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-09T21:15:10.963", - "lastModified": "2024-11-21T07:52:07.023", + "lastModified": "2025-03-05T19:15:32.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27088.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27088.json index b8aa8d3683b..88cb836d9c3 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27088.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27088.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27088", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T16:15:09.527", - "lastModified": "2024-11-21T07:52:17.920", + "lastModified": "2025-03-05T19:15:32.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29418.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29418.json index d562ad8e7bd..3697ab70539 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29418.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29418.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29418", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T05:15:07.540", - "lastModified": "2024-11-21T07:57:01.473", + "lastModified": "2025-03-05T20:16:04.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29419.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29419.json index 884bdbf2864..fc491f21de5 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29419.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29419.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29419", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T05:15:07.577", - "lastModified": "2024-11-21T07:57:01.617", + "lastModified": "2025-03-05T20:16:05.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29420.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29420.json index 1df2a80efb3..c64e79058b7 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29420.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29420.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29420", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T05:15:07.613", - "lastModified": "2024-11-21T07:57:01.760", + "lastModified": "2025-03-05T19:15:34.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29854.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29854.json index 54751227199..25818ff0885 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29854.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29854.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29854", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-18T18:15:07.503", - "lastModified": "2024-11-21T07:57:35.073", + "lastModified": "2025-03-05T19:15:35.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json index c1e9a02429f..a8b96baa85e 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36679.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36679", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T06:15:09.280", - "lastModified": "2024-11-21T08:10:20.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T20:50:02.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.7", + "matchCriteriaId": "56C1B2F9-BBE8-4574-9EC7-AEB2510F409D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-plugin-2-6-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-plugin-2-6-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49031.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49031.json index 91f2d18e9d3..17266d737b9 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49031.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49031.json @@ -2,16 +2,55 @@ "id": "CVE-2023-49031", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:28.330", - "lastModified": "2025-03-03T18:15:28.330", - "vulnStatus": "Received", + "lastModified": "2025-03-05T19:15:37.110", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal (Local File Inclusion) vulnerability in Tikit (now Advanced) eMarketing platform 6.8.3.0 allows a remote attacker to read arbitrary files and obtain sensitive information via a crafted payload to the filename parameter to the OpenLogFile endpoint." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Directory Traversal (inclusi\u00f3n de archivo local) en Tikit (now Advanced) eMarketing platform 6.8.3.0 permite a un atacante remoto leer archivos arbitrarios y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en el par\u00e1metro de nombre de archivo en el endpoint OpenLogFile." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Yoshik0xF6/CVE-2023-49031", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28784.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28784.json index a1c6f35a2e9..f0f476e5313 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28784.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28784", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-27T13:15:47.403", - "lastModified": "2024-11-21T09:06:55.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-05T20:50:02.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,88 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "BD0A459A-C74A-4E18-83B3-4C29D47D2C2B" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285893", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://https://www.ibm.com/support/pages/node/7145260", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://https://www.ibm.com/support/pages/node/7145260", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json new file mode 100644 index 00000000000..2afc5ac5cd5 --- /dev/null +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31525", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-05T19:15:37.340", + "lastModified": "2025-03-05T19:15:37.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Peppermint Ticket Management 0.4.6 is vulnerable to Incorrect Access Control. A regular registered user is able to elevate his privileges to admin and gain complete access to the system as the authorization mechanism is not validated on the server side and only on the client side. This can result, for example, in creating a new admin user in the system which enables persistent access for the attacker as an administrator." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cwe.mitre.org/data/definitions/285.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Peppermint-Lab/peppermint/issues/258", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json new file mode 100644 index 00000000000..84eaa9f436f --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48246", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-05T19:15:37.453", + "lastModified": "2025-03-05T19:15:37.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the \"Name\" parameter of /vehicle-management/booking.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ShadowByte1/CVE-2024-48246", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json new file mode 100644 index 00000000000..48a84e7ccff --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51144", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-05T20:16:05.603", + "lastModified": "2025-03-05T20:16:05.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache <= 6.6.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ampache/ampache", + "source": "cve@mitre.org" + }, + { + "url": "https://nitipoom-jar.github.io/CVE-2024-51144/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json index db493d20e70..754a1e29e80 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53384.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53384", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:29.670", - "lastModified": "2025-03-03T18:15:29.670", - "vulnStatus": "Received", + "lastModified": "2025-03-05T19:15:37.560", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A DOM Clobbering vulnerability in tsup v8.3.4 allows attackers to execute arbitrary code via a crafted script in the import.meta.url to document.currentScript in cjs_shims.js components" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de DOM Clobbering en tsup v8.3.4 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en import.meta.url a document.currentScript en los componentes cjs_shims.js" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/jackfromeast/36f98bf7542d11835c883c1d175d9b92", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55570.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55570.json index 113f34249e7..7357e39b583 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55570.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55570.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55570", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T16:15:38.900", - "lastModified": "2025-03-03T16:15:38.900", - "vulnStatus": "Received", + "lastModified": "2025-03-05T19:15:37.710", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "/api/user/users in the web GUI for the Cubro EXA48200 network packet broker (build 20231025055018) fixed in V5.0R14.5P4-V3.3R1 allows remote authenticated users of the application to increase their privileges by sending a single HTTP PUT request with rolename=Administrator, aka incorrect access control." + }, + { + "lang": "es", + "value": "/api/user/users en la GUI web para el agente de paquetes de red Cubro EXA48200 (compilaci\u00f3n 20231025055018) corregido en V5.0R14.5P4-V3.3R1 permite que los usuarios remotos autenticados de la aplicaci\u00f3n aumenten sus privilegios enviando una \u00fanica solicitud HTTP PUT con rolename=Administrator, tambi\u00e9n conocido como control de acceso incorrecto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://herolab.usd.de/security-advisories/", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json index 7b29b670b02..f31de1bf28b 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1470.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1470", "sourceIdentifier": "emo@eclipse.org", "published": "2025-02-21T10:15:11.243", - "lastModified": "2025-02-21T10:15:11.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T18:54:18.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,20 +93,58 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:omr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.4.0", + "matchCriteriaId": "C1D18A69-E9A9-4C5F-AF59-EA8A17C4102F" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse-omr/omr/pull/7655", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/eclipse-omr/omr/pull/7663", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/54", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json index 7b93107d036..9465948f362 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1471.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1471", "sourceIdentifier": "emo@eclipse.org", "published": "2025-02-21T10:15:11.413", - "lastModified": "2025-02-21T10:15:11.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T18:54:18.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -71,16 +93,53 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:omr:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.2.0", + "versionEndIncluding": "0.4.0", + "matchCriteriaId": "BCEF6A56-762E-4F98-86D7-74720E639B77" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse-omr/omr/pull/7658", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/55", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json index b007605ffe1..3743755a24c 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1889.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1889", "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", "published": "2025-03-03T19:15:34.560", - "lastModified": "2025-03-04T12:15:32.370", - "vulnStatus": "Received", + "lastModified": "2025-03-05T20:16:46.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic." + }, + { + "lang": "es", + "value": "picklescan antes de la versi\u00f3n 0.0.22 solo considera los extensiones est\u00e1ndar de archivos pickle en el \u00e1mbito de su revisi\u00f3n de vulnerabilidades. Un atacante podr\u00eda crear un modelo malicioso que utilice Pickle e incluir un archivo pickle malicioso con una extensi\u00f3n no est\u00e1ndar. Dado que la inclusi\u00f3n de un archivo pickle malicioso no se considera dentro del alcance de picklescan, el archivo pasar\u00eda las comprobaciones de seguridad y aparentar\u00eda ser seguro, cuando en realidad podr\u00eda resultar problem\u00e1tico." } ], "metrics": { @@ -55,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -67,16 +93,53 @@ "value": "CWE-646" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.0.22", + "matchCriteriaId": "A932F445-B2D1-431D-B3CD-937CFB9523BD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v", - "source": "103e4ec9-0a87-450b-af77-479448ddef11" + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889", - "source": "103e4ec9-0a87-450b-af77-479448ddef11" + "source": "103e4ec9-0a87-450b-af77-479448ddef11", + "tags": [ + "Third Party Advisory", + "Exploit", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json index 92ee6b10044..45fd06c0d79 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1891.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1891", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T00:15:31.377", - "lastModified": "2025-03-04T17:15:14.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T20:16:46.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Vulnerabilidad en shishuocms 1.1 clasificada como 'problem\u00e1tica'. Este problema afecta a alg\u00fan procesamiento desconocido, con resultados de CSRF. El ataque puede iniciarse de forma remota. El exploit ha sido publicado y puede ser utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -78,8 +82,28 @@ "impactScore": 1.4 }, { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -139,6 +163,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", @@ -150,26 +184,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qzw1210:shishuocms:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "974C8CC4-C344-4460-9739-C1C254BD6583" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298409", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298409", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.505741", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json index 68ad2f0d5a2..9246b141c15 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1892.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1892", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T01:15:11.147", - "lastModified": "2025-03-04T17:15:15.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T20:16:46.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in shishuocms 1.1. It has been classified as problematic. Affected is an unknown function of the file /manage/folder/add.json of the component Directory Deletion Page. The manipulation of the argument folderName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en shishuocms 1.1. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /manage/folder/add.json del componente Directory Deletion Page. La manipulaci\u00f3n del argumento folderName provoca cross-site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,28 +142,70 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qzw1210:shishuocms:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "974C8CC4-C344-4460-9739-C1C254BD6583" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298410", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.298410", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.505754", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json index 2faea1220dd..22354c2fe24 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1939", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.837", - "lastModified": "2025-03-04T14:15:38.837", + "lastModified": "2025-03-05T19:15:37.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Android apps can load web pages using the Custom Tabs feature. This feature supports a transition animation that could have been used to trick a user into granting sensitive permissions by hiding what the user was actually clicking. This vulnerability affects Firefox < 136." + }, + { + "lang": "es", + "value": "Las aplicaciones de Android pueden cargar p\u00e1ginas web mediante la funci\u00f3n Pesta\u00f1as personalizadas. Esta funci\u00f3n admite una animaci\u00f3n de transici\u00f3n que podr\u00eda haberse utilizado para enga\u00f1ar a un usuario y conseguir que otorgara permisos confidenciales ocultando en qu\u00e9 estaba haciendo clic. Esta vulnerabilidad afecta a Firefox < 136." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.9, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928334", diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json new file mode 100644 index 00000000000..3f5216cfd51 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2003", + "sourceIdentifier": "security@devolutions.net", + "published": "2025-03-05T19:15:39.630", + "lastModified": "2025-03-05T20:16:06.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2025-0003/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json index 64c8cad2893..3ec28c9e59e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21355", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-19T23:15:12.963", - "lastModified": "2025-02-19T23:15:12.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T18:54:18.150", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -26,7 +26,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,12 +76,43 @@ "value": "CWE-306" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:bing:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6F86F428-9E67-4F94-9FF4-8DB47B64ACCE" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21355", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json index affee7d369a..9d93fe51afc 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21401", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-15T00:15:27.163", - "lastModified": "2025-02-18T17:15:20.057", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-05T18:54:18.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,44 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:-:*:*:*", + "versionEndExcluding": "133.0.3065.69", + "matchCriteriaId": "F474ADB7-F952-4192-9BFB-9987B04C0FB3" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21401", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json index 10145d08ecf..c3202a75fc7 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25343", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T19:15:22.003", - "lastModified": "2025-02-19T16:41:43.887", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T19:15:38.007", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json index 4ac871c2f9d..b03045156cf 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25349", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T16:15:46.323", - "lastModified": "2025-02-14T19:34:31.553", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T19:15:38.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json index 6e80e7512f1..1841bda3c0e 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25741", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T18:15:28.293", - "lastModified": "2025-02-12T18:15:28.293", + "lastModified": "2025-03-05T19:15:38.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro IPv6_PppoePassword en el m\u00f3dulo SetIPv6PppoeSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-7-1812386a664480b7ac54d281afa629f5", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json index c37ac09ccbf..1d51a47a04d 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25742", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.150", - "lastModified": "2025-02-19T19:02:59.180", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T19:15:38.503", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json index 10c9e48d9c2..beead566bdf 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25743", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.270", - "lastModified": "2025-02-19T19:02:47.650", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T19:15:38.693", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json index fa0d7730dd6..0473172b6dd 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25744", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.390", - "lastModified": "2025-02-19T19:02:27.687", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-05T19:15:38.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json index b8c657cd00f..b44fabe775e 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26182.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26182", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T17:15:18.363", - "lastModified": "2025-03-04T17:15:18.363", + "lastModified": "2025-03-05T19:15:39.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in xxyopen novel plus v.4.4.0 and before allows a remote attacker to execute arbitrary code via the PageController.java file" + }, + { + "lang": "es", + "value": "Un problema en novel plus de xxyopen v.4.4.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del fichero PageController.java" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/GSBP0/007355c5f6bd213264ae1c35c347e5cc", diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json index 09524d4cef7..abfca18b3b7 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26320.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26320", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T16:15:40.240", - "lastModified": "2025-03-04T16:15:40.240", + "lastModified": "2025-03-05T19:15:39.173", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que t0mer BroadlinkManager v5.9.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo a trav\u00e9s del par\u00e1metro de direcci\u00f3n IP en /device/ping." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/BaranTeyin1/vulnerability-research/tree/main/CVE-2025-26320", diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27500.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27500.json index 8ad2819db9e..1a5c7cf843b 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27500.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27500.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27500", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T19:15:36.157", - "lastModified": "2025-03-03T19:15:36.157", - "vulnStatus": "Received", + "lastModified": "2025-03-05T20:16:46.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1." + }, + { + "lang": "es", + "value": "OpenZiti es un proyecto gratuito y de c\u00f3digo abierto enfocado en brindar confianza cero a cualquier aplicaci\u00f3n. Se puede acceder a un endpoint (/api/upload) en el panel de administraci\u00f3n sin ning\u00fan tipo de autenticaci\u00f3n. Este endpoint acepta un HTTP POST para cargar un archivo que luego se almacena en el nodo y est\u00e1 disponible a trav\u00e9s de una URL. Esto puede provocar un ataque de cross-site scripting almacenado si el archivo cargado contiene c\u00f3digo malicioso y luego se accede a \u00e9l y se ejecuta dentro del contexto del navegador del usuario. Esta funci\u00f3n ya no es necesaria ya que la consola ziti pasa de una aplicaci\u00f3n de servidor de nodo a una aplicaci\u00f3n de p\u00e1gina \u00fanica y se ha deshabilitado. La vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.7.1." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,12 +69,43 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.7.1", + "matchCriteriaId": "0C5813F9-BB60-4C37-BC62-0D0A3B711F09" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json index d7207d27219..cc7bd356bed 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27501.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27501", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-03T19:15:36.300", - "lastModified": "2025-03-03T19:15:36.300", - "vulnStatus": "Received", + "lastModified": "2025-03-05T20:16:46.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1." + }, + { + "lang": "es", + "value": "OpenZiti es un proyecto gratuito y de c\u00f3digo abierto enfocado en brindar confianza cero a cualquier aplicaci\u00f3n. Se puede acceder a un endpoint en el panel de administraci\u00f3n sin ning\u00fan tipo de autenticaci\u00f3n. Este endpoint acepta un par\u00e1metro de URL proporcionado por el usuario para conectarse a un controlador OpenZiti y realiza una solicitud del lado del servidor, lo que genera una posible vulnerabilidad de Server-Side Request Forgery (SSRF). La versi\u00f3n corregida ha trasladado la solicitud al controlador externo del lado del servidor al lado del cliente, eliminando as\u00ed la posibilidad de utilizar la identidad del nodo para obtener permisos adicionales. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.7.1." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.7.1", + "matchCriteriaId": "0C5813F9-BB60-4C37-BC62-0D0A3B711F09" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json new file mode 100644 index 00000000000..6ce36f332ce --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27513.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27513", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T19:15:39.337", + "lastModified": "2025-03-05T19:15:39.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenTelemetry dotnet is a dotnet telemetry framework. A vulnerability in OpenTelemetry.Api package 1.10.0 to 1.11.1 could cause a Denial of Service (DoS) when a tracestate and traceparent header is received. Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage. This issue impacts any application accessible over the web or backend services that process HTTP requests containing a tracestate header. Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime. This vulnerability is fixed in 1.11.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/open-telemetry/opentelemetry-dotnet/commit/1b555c1201413f2f55f2cd3c4ba03ef4b615b6b5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-8785-wc3w-h8q6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json new file mode 100644 index 00000000000..aa7fccf3ce7 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27515.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27515", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T19:15:39.483", + "lastModified": "2025-03-05T19:15:39.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-155" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laravel/framework/commit/2d133034fefddfb047838f4caca3687a3ba811a5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/laravel/framework/security/advisories/GHSA-78fx-h6xr-vch4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json new file mode 100644 index 00000000000..55de76ea50b --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27517.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-27517", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-05T20:16:05.960", + "lastModified": "2025-03-05T20:16:05.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Volt is an elegantly crafted functional API for Livewire. Malicious, user-crafted request payloads could potentially lead to remote code execution within Volt components. This vulnerability is fixed in 1.7.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/livewire/volt/security/advisories/GHSA-v69f-5jxm-hwvv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5cfd4c2ddd3..bc1c14ad0c3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-05T19:00:22.092347+00:00 +2025-03-05T21:00:20.119253+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-05T18:47:21.313000+00:00 +2025-03-05T20:50:02.120000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284247 +284254 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `7` -- [CVE-2024-11035](CVE-2024/CVE-2024-110xx/CVE-2024-11035.json) (`2025-03-05T17:15:13.087`) -- [CVE-2024-53458](CVE-2024/CVE-2024-534xx/CVE-2024-53458.json) (`2025-03-05T18:15:37.053`) -- [CVE-2025-20206](CVE-2025/CVE-2025-202xx/CVE-2025-20206.json) (`2025-03-05T17:15:14.450`) -- [CVE-2025-20208](CVE-2025/CVE-2025-202xx/CVE-2025-20208.json) (`2025-03-05T17:15:14.610`) +- [CVE-2024-31525](CVE-2024/CVE-2024-315xx/CVE-2024-31525.json) (`2025-03-05T19:15:37.340`) +- [CVE-2024-48246](CVE-2024/CVE-2024-482xx/CVE-2024-48246.json) (`2025-03-05T19:15:37.453`) +- [CVE-2024-51144](CVE-2024/CVE-2024-511xx/CVE-2024-51144.json) (`2025-03-05T20:16:05.603`) +- [CVE-2025-2003](CVE-2025/CVE-2025-20xx/CVE-2025-2003.json) (`2025-03-05T19:15:39.630`) +- [CVE-2025-27513](CVE-2025/CVE-2025-275xx/CVE-2025-27513.json) (`2025-03-05T19:15:39.337`) +- [CVE-2025-27515](CVE-2025/CVE-2025-275xx/CVE-2025-27515.json) (`2025-03-05T19:15:39.483`) +- [CVE-2025-27517](CVE-2025/CVE-2025-275xx/CVE-2025-27517.json) (`2025-03-05T20:16:05.960`) ### CVEs modified in the last Commit -Recently modified CVEs: `82` +Recently modified CVEs: `51` -- [CVE-2025-21776](CVE-2025/CVE-2025-217xx/CVE-2025-21776.json) (`2025-03-05T18:47:21.313`) -- [CVE-2025-25426](CVE-2025/CVE-2025-254xx/CVE-2025-25426.json) (`2025-03-05T17:15:15.320`) -- [CVE-2025-25948](CVE-2025/CVE-2025-259xx/CVE-2025-25948.json) (`2025-03-05T17:15:15.487`) -- [CVE-2025-25950](CVE-2025/CVE-2025-259xx/CVE-2025-25950.json) (`2025-03-05T17:15:15.647`) -- [CVE-2025-25952](CVE-2025/CVE-2025-259xx/CVE-2025-25952.json) (`2025-03-05T18:15:38.050`) -- [CVE-2025-25953](CVE-2025/CVE-2025-259xx/CVE-2025-25953.json) (`2025-03-05T17:15:15.810`) -- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-03-05T17:15:16.017`) -- [CVE-2025-26318](CVE-2025/CVE-2025-263xx/CVE-2025-26318.json) (`2025-03-05T17:15:16.180`) -- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-03-05T17:15:16.340`) -- [CVE-2025-27510](CVE-2025/CVE-2025-275xx/CVE-2025-27510.json) (`2025-03-05T17:15:16.597`) -- [CVE-2025-27583](CVE-2025/CVE-2025-275xx/CVE-2025-27583.json) (`2025-03-05T17:15:16.693`) -- [CVE-2025-27638](CVE-2025/CVE-2025-276xx/CVE-2025-27638.json) (`2025-03-05T17:15:16.853`) -- [CVE-2025-27639](CVE-2025/CVE-2025-276xx/CVE-2025-27639.json) (`2025-03-05T17:15:17.027`) -- [CVE-2025-27640](CVE-2025/CVE-2025-276xx/CVE-2025-27640.json) (`2025-03-05T17:15:17.250`) -- [CVE-2025-27641](CVE-2025/CVE-2025-276xx/CVE-2025-27641.json) (`2025-03-05T17:15:17.427`) -- [CVE-2025-27642](CVE-2025/CVE-2025-276xx/CVE-2025-27642.json) (`2025-03-05T17:15:17.603`) -- [CVE-2025-27655](CVE-2025/CVE-2025-276xx/CVE-2025-27655.json) (`2025-03-05T17:15:17.763`) -- [CVE-2025-27656](CVE-2025/CVE-2025-276xx/CVE-2025-27656.json) (`2025-03-05T17:15:17.950`) -- [CVE-2025-27657](CVE-2025/CVE-2025-276xx/CVE-2025-27657.json) (`2025-03-05T17:15:18.110`) -- [CVE-2025-27658](CVE-2025/CVE-2025-276xx/CVE-2025-27658.json) (`2025-03-05T17:15:18.263`) -- [CVE-2025-27659](CVE-2025/CVE-2025-276xx/CVE-2025-27659.json) (`2025-03-05T17:15:18.423`) -- [CVE-2025-27660](CVE-2025/CVE-2025-276xx/CVE-2025-27660.json) (`2025-03-05T17:15:18.573`) -- [CVE-2025-27661](CVE-2025/CVE-2025-276xx/CVE-2025-27661.json) (`2025-03-05T17:15:18.747`) -- [CVE-2025-27662](CVE-2025/CVE-2025-276xx/CVE-2025-27662.json) (`2025-03-05T17:15:18.933`) -- [CVE-2025-27663](CVE-2025/CVE-2025-276xx/CVE-2025-27663.json) (`2025-03-05T17:15:19.090`) +- [CVE-2023-29420](CVE-2023/CVE-2023-294xx/CVE-2023-29420.json) (`2025-03-05T19:15:34.933`) +- [CVE-2023-29854](CVE-2023/CVE-2023-298xx/CVE-2023-29854.json) (`2025-03-05T19:15:35.153`) +- [CVE-2023-36679](CVE-2023/CVE-2023-366xx/CVE-2023-36679.json) (`2025-03-05T20:50:02.120`) +- [CVE-2023-49031](CVE-2023/CVE-2023-490xx/CVE-2023-49031.json) (`2025-03-05T19:15:37.110`) +- [CVE-2024-28784](CVE-2024/CVE-2024-287xx/CVE-2024-28784.json) (`2025-03-05T20:50:02.120`) +- [CVE-2024-53384](CVE-2024/CVE-2024-533xx/CVE-2024-53384.json) (`2025-03-05T19:15:37.560`) +- [CVE-2024-55570](CVE-2024/CVE-2024-555xx/CVE-2024-55570.json) (`2025-03-05T19:15:37.710`) +- [CVE-2025-1470](CVE-2025/CVE-2025-14xx/CVE-2025-1470.json) (`2025-03-05T18:54:18.150`) +- [CVE-2025-1471](CVE-2025/CVE-2025-14xx/CVE-2025-1471.json) (`2025-03-05T18:54:18.150`) +- [CVE-2025-1889](CVE-2025/CVE-2025-18xx/CVE-2025-1889.json) (`2025-03-05T20:16:46.363`) +- [CVE-2025-1891](CVE-2025/CVE-2025-18xx/CVE-2025-1891.json) (`2025-03-05T20:16:46.363`) +- [CVE-2025-1892](CVE-2025/CVE-2025-18xx/CVE-2025-1892.json) (`2025-03-05T20:16:46.363`) +- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-05T19:15:37.870`) +- [CVE-2025-21355](CVE-2025/CVE-2025-213xx/CVE-2025-21355.json) (`2025-03-05T18:54:18.150`) +- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-03-05T18:54:18.150`) +- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-03-05T19:15:38.007`) +- [CVE-2025-25349](CVE-2025/CVE-2025-253xx/CVE-2025-25349.json) (`2025-03-05T19:15:38.180`) +- [CVE-2025-25741](CVE-2025/CVE-2025-257xx/CVE-2025-25741.json) (`2025-03-05T19:15:38.353`) +- [CVE-2025-25742](CVE-2025/CVE-2025-257xx/CVE-2025-25742.json) (`2025-03-05T19:15:38.503`) +- [CVE-2025-25743](CVE-2025/CVE-2025-257xx/CVE-2025-25743.json) (`2025-03-05T19:15:38.693`) +- [CVE-2025-25744](CVE-2025/CVE-2025-257xx/CVE-2025-25744.json) (`2025-03-05T19:15:38.860`) +- [CVE-2025-26182](CVE-2025/CVE-2025-261xx/CVE-2025-26182.json) (`2025-03-05T19:15:39.023`) +- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-05T19:15:39.173`) +- [CVE-2025-27500](CVE-2025/CVE-2025-275xx/CVE-2025-27500.json) (`2025-03-05T20:16:46.363`) +- [CVE-2025-27501](CVE-2025/CVE-2025-275xx/CVE-2025-27501.json) (`2025-03-05T20:16:46.363`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4d0db1be4d5..d258ed21612 100644 --- a/_state.csv +++ b/_state.csv @@ -156013,7 +156013,7 @@ CVE-2020-26938,0,0,52b9dba3657c510a8003154880c11b1a395c6747ab8cac430b408ea74d085 CVE-2020-26939,0,0,06280f793da4c8c360313d10250e69130b517f0c921bb988d2d48a09aebb7272,2024-11-21T05:20:32.623000 CVE-2020-2694,0,0,f8c4451c441b6be051228cc294563fb79a0d62957d677191339a120fe90efed8,2024-11-21T05:26:01.350000 CVE-2020-26941,0,0,beaaa630a930edc627ba10de7f4b970e51f0db3a37c02a9343c0b5a3ce4d16de,2024-11-21T05:20:32.763000 -CVE-2020-26942,0,1,e34efeb936843dc117ef56ebf5c9bb5b159276dccffa0ec316cdfbe2c901585d,2025-03-05T18:25:53.837000 +CVE-2020-26942,0,0,e34efeb936843dc117ef56ebf5c9bb5b159276dccffa0ec316cdfbe2c901585d,2025-03-05T18:25:53.837000 CVE-2020-26943,0,0,ff41be6f51453aa910d9884f70fb87762f1dc12f9c554eeaef22fe44832fbbcb,2024-11-21T05:20:33.137000 CVE-2020-26944,0,0,e913b0fc4f0b50d2ba4a971bbb91bff564d45cd0041b9c19e0ab16df0ea28a0c,2024-11-21T05:20:33.283000 CVE-2020-26945,0,0,3d667d49ce282a114fa949ecc43a012c215c7b0245088e7733f89e6ceaa9befc,2024-11-21T05:20:33.417000 @@ -173384,7 +173384,7 @@ CVE-2021-28247,0,0,8a48528df54b962ad86087a21c67398f7d0a2b31ec145a320eb1e2aafdfab CVE-2021-28248,0,0,0b8c67dff771f7883e0e0334dd310e67925fa190051a701b2e42d0de04ffdf28,2024-11-21T05:59:24.063000 CVE-2021-28249,0,0,b38b4cdc8a8689f21f1e8dc83fd7f0e679e1810ac11f68a09979ae4176b22902,2024-11-21T05:59:24.283000 CVE-2021-28250,0,0,2ee329a0b0b5971160b5f9632535f7aa84ed88d37d84d2503bf8089406fe2551,2024-11-21T05:59:24.430000 -CVE-2021-28254,0,0,2c7863c9abf732350c7ec2a5c497dc1a6e422cdf9ec85c7bf28f4fb30fa058bf,2024-11-21T05:59:24.580000 +CVE-2021-28254,0,1,7f9d7301ceea6ef75775b405e16bb52f663d67a27ae5fc74bded0fc20c0de32a,2025-03-05T19:15:24.927000 CVE-2021-28269,0,0,807f2466e43a408dfcf578392d0b4be00cc186134c2fa653eb130027f5f96c40,2024-11-21T05:59:24.740000 CVE-2021-28271,0,0,f9af5b693852efd28516810e6693fe68f3ded36ef1187ee7d84eb70d004b2b1c,2024-11-21T05:59:24.883000 CVE-2021-28275,0,0,052ab66b3b935f4def9dd1de20a43a2d6d8aa2cc9d1db052ed84666dd0d727a5,2024-11-21T05:59:25.043000 @@ -183554,7 +183554,7 @@ CVE-2021-4161,0,0,330cce1d183695fbd38111b6ca9460022c51ce4f359aa65bd579fd4365c44b CVE-2021-41610,0,0,4383295040357b63b77992dd7785cc62b9b95f8d58dd93cdf697d7c53800b4d5,2023-11-07T03:38:59.180000 CVE-2021-41611,0,0,20e788a9978d5b42bdfb0e861d8a64ecb13ed6a78d656dfa0583ed713b47f4c8,2024-11-21T06:26:31.043000 CVE-2021-41612,0,0,ec4512d7e1eb070ebbb7c50ac4104db7c77bf599d5ee26d0cce1e928eee5bff5,2025-02-06T15:15:08.910000 -CVE-2021-41613,0,0,329e05f88883ce5f1070b19d60f9b86e6353c32b42526be07c5c943b50cba168,2024-11-21T06:26:31.397000 +CVE-2021-41613,0,1,d034769a005bc9bc2a20a3d5a0f08b25a38215f9b91d908bfc334e2f87677780,2025-03-05T19:15:25.660000 CVE-2021-41614,0,0,c10e24c6ecf57f28c0f86386ef18cf31fe6fa33cdc6e2d53899997cac45a7f83,2025-02-06T15:15:10.313000 CVE-2021-41615,0,0,7c87671866aa995cddeac7c3e59b2984fedac1b9c57107390543115e22bed63f,2024-11-21T06:26:31.737000 CVE-2021-41616,0,0,dd054e38761d9b6ac5dcb4c40cda981ba61676d60f3780bef226a2571a607a44,2024-11-21T06:26:31.947000 @@ -187124,7 +187124,7 @@ CVE-2021-46871,0,0,05c2919904c965d0b69570703d46258f27345788e02af9d544a23baf7cc12 CVE-2021-46872,0,0,fd01e6b4d7cf956efd9d67ee9685007e549687974e41eefa9b4ee93344bfe2ff,2024-11-21T06:34:49.547000 CVE-2021-46873,0,0,bd696af11164da0889d93481e3bf2473217e799ee3de555882260a6e2f73ec72,2024-11-21T06:34:49.717000 CVE-2021-46875,0,0,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000 -CVE-2021-46876,0,1,6a2e22af11aa26335bbedce387ed63ddf6418c87ae229e885cf311471999ca35,2025-03-05T17:15:11.137000 +CVE-2021-46876,0,0,6a2e22af11aa26335bbedce387ed63ddf6418c87ae229e885cf311471999ca35,2025-03-05T17:15:11.137000 CVE-2021-46877,0,0,d38d83f8552fd712480fd15b31c69fae523b8d5890dcdafac1ebd8aa441c7eef,2025-02-26T19:15:12.823000 CVE-2021-46878,0,0,78f663683c9ae191c79be4d598f09b9b821005339cc94153cd9666f6c0ac2049,2025-02-11T21:15:08.843000 CVE-2021-46879,0,0,a015dee49a0a6f554418c3219438611f558fe2ca691e65a603110e7ee5b9e689,2025-02-11T20:15:31.043000 @@ -211967,7 +211967,7 @@ CVE-2022-47454,0,0,e7b737cb99edf1fdc942511ae649efa0f88637b608618d95b99e53858a5b0 CVE-2022-47455,0,0,78da122697407476b70af5bb22716c5d16d54cefd750214ba4143eeb45121173,2024-11-21T07:31:59.877000 CVE-2022-47456,0,0,3a01bf8ad878edaa505237411a1eb5b95fb75275350e1b00745c1fa2545e3288,2024-11-21T07:31:59.990000 CVE-2022-47457,0,0,bfdbae1f50f050cee156202de5ecc9a5a9c6220933deb7b2cb4c50a975bf8aa8,2024-11-21T07:32:00.120000 -CVE-2022-47458,0,1,e9c9f58d567a7e5404333ee8f34e143401bb18b280aad45486398317a599894b,2025-03-05T17:15:11.773000 +CVE-2022-47458,0,0,e9c9f58d567a7e5404333ee8f34e143401bb18b280aad45486398317a599894b,2025-03-05T17:15:11.773000 CVE-2022-47459,0,0,719748a913811f44654b341d62ee4675a631cdd673c0528ccb94dcc33bc7a7dc,2024-11-21T07:32:00.360000 CVE-2022-4746,0,0,0f56a61f45cc21503de984bc96389e92a35e5351645f4a9a0944c253cd63e310,2024-11-21T07:35:51.733000 CVE-2022-47460,0,0,6ce08b98b80515cdfa338f84a516b52ba9c3c702ba7436d3d86676c367263121,2024-11-21T07:32:00.487000 @@ -211982,7 +211982,7 @@ CVE-2022-47468,0,0,91558f88671cf4d294e6eb0e3f8df789827ce1e050806b60887232e873021 CVE-2022-47469,0,0,5adcd3211b3f2a00584e97d1ad1e150d7fd1a6ffdea0463dc89b64217d1432f4,2025-01-28T21:15:09.720000 CVE-2022-4747,0,0,2cae0e1e4a7191b71dc69e8df4deb90e08691ea2a220f1b14d3c1cd5d65da5a2,2024-11-21T07:35:51.837000 CVE-2022-47470,0,0,3a8fdd214f63e68ec87a63f525c2fdb0dc5cc3b7b715cee87fc3205f38d5b7f2,2025-01-28T21:15:10.603000 -CVE-2022-47471,0,1,2bb1b295ba61b19da4df18a957858b0159037151bf82e7e4ccd434160cf98d54,2025-03-05T18:15:34.123000 +CVE-2022-47471,0,0,2bb1b295ba61b19da4df18a957858b0159037151bf82e7e4ccd434160cf98d54,2025-03-05T18:15:34.123000 CVE-2022-47472,0,0,9fedf2ddd34ef86d1b864027fd832881ccf70fced06accfd8af23ca518fa7feb,2024-11-21T07:32:01.983000 CVE-2022-47473,0,0,3335e5f0084985a2959a6836570a809e2a4bc068ee73d7232407f36e7fb1f62e,2024-11-21T07:32:02.103000 CVE-2022-47474,0,0,7cb8d6dc18b68527fd19e5a353ea6129c7ca357436d294fb6ef65adcce5d4099,2024-11-21T07:32:02.217000 @@ -213804,7 +213804,7 @@ CVE-2022-49626,0,0,4353a65f1a99788c052b1c8611786763f949c78a1b7cbd81e4eab207e4b78 CVE-2022-49627,0,0,bde88792e25cc4b11ab31c08c3cb66ed16fed8d7b85efa250ecf51d96bea680c,2025-02-26T07:01:38.030000 CVE-2022-49628,0,0,6e519d7f6c53062f22b344e4f50790bb11c7e144d17f4c56bb89a1143a225067,2025-02-26T07:01:38.117000 CVE-2022-49629,0,0,5bebc3810a96a789e580809904ed4bcf34593023fc185ed1ef3e3d5cd52cec10,2025-02-26T07:01:38.200000 -CVE-2022-4963,0,1,d98d4c1e804634cc06ab791fc290767186ddd762bdf3926697d901e23749d3c4,2025-03-05T18:24:35.503000 +CVE-2022-4963,0,0,d98d4c1e804634cc06ab791fc290767186ddd762bdf3926697d901e23749d3c4,2025-03-05T18:24:35.503000 CVE-2022-49630,0,0,551fbe20a57d7813689434a100e3e508b902b920a782226ad8bb3197e9e06c2b,2025-02-26T07:01:38.290000 CVE-2022-49631,0,0,51a7231d2ee2840d6f5c3d086df2ee7d1d404b6fdf797487db3d58d1a2e42719,2025-02-26T07:01:38.380000 CVE-2022-49632,0,0,8f0aa7e3c1237674c3d89b2eec5e12f64d1125279ae3a796556ffad4c11c4993,2025-02-26T07:01:38.470000 @@ -213986,7 +213986,7 @@ CVE-2023-0065,0,0,1af42c9630237adefe532d5e7d6c03134844119157520f1dae4aad3d5003e3 CVE-2023-0066,0,0,66abd1188955921a4f586244d11ac2aed7ba37215a66a107b40ed1984614d870,2025-02-27T21:15:16.620000 CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed0036,2024-11-21T07:36:29.547000 CVE-2023-0068,0,0,09b587937209aec78ff4e464b77cb9d1b780912e276b385bb5b75adb2cb8a003,2024-11-21T07:36:29.650000 -CVE-2023-0069,0,0,fbeebfdbedd3a9959dd565020dd3eff073b852f8a177b310fda2dcb0e919da2f,2024-11-21T07:36:29.750000 +CVE-2023-0069,0,1,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000 CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000 CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000 CVE-2023-0072,0,0,d333d59260663a0b5930bb992584a27415216729bc2149a3935b4f3b91fe9ce7,2024-11-21T07:36:30.050000 @@ -214657,7 +214657,7 @@ CVE-2023-0761,0,0,1c12e966a31ab5fa981f27f6779c348b172a92660c02ef6161d5e68d0643b7 CVE-2023-0762,0,0,b352c77f507f218efecdfba3d0204deb48d60e35cf3d46c52cf2dd283cb2f84e,2025-01-24T21:15:09.020000 CVE-2023-0763,0,0,66b09a9c98c73290507e7116bff86b7079976cc6357472573cf9f15e006e8dde,2025-01-24T21:15:09.187000 CVE-2023-0764,0,0,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000 -CVE-2023-0765,0,0,f61c06c3f34d1e7d896bc0eee0c48f4f1a4d8c814a5af0365f04fa235d17dc70,2024-11-21T07:37:46.657000 +CVE-2023-0765,0,1,6b52002814929eaa820d36a0b1f7124300b13ac41153e1f8eb2dc73ceb0ce3bc,2025-03-05T19:15:27.347000 CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000 CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000 CVE-2023-0768,0,0,854944641b4c5c80838898ca164f46cd13b5eb87a809afca93532e5fd701927a,2025-01-29T15:15:11.710000 @@ -215193,7 +215193,7 @@ CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3b CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000 CVE-2023-1323,0,0,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000 CVE-2023-1324,0,0,00d5f367721a8f873edf46f7e2845f04eda266f6dab94ac034683dc84d5e71f8,2025-02-04T19:15:27.863000 -CVE-2023-1325,0,0,0959d70918885d472cdc91efc9bd6dc4dd3a4b413a8c9a9ff5d155b9a97a3461,2024-11-21T07:38:55.627000 +CVE-2023-1325,0,1,3ff3723565214c557ecea7b3557f725999e31dde6f993620e8d608bc76eb6bc6,2025-03-05T19:15:27.500000 CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000 CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67dfb,2024-11-21T07:38:55.873000 CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000 @@ -216251,7 +216251,7 @@ CVE-2023-20630,0,0,4e220cfad559ee04582d407cd8391bfd570f01397ba72260d786060edc88d CVE-2023-20632,0,0,47be8e71f5a563ce91919f8442033d40dbb4522e3ef7af5135844efec3823f27,2024-11-21T07:41:15.453000 CVE-2023-20633,0,0,9197731104a2b6109350b0d564f4bb04b2c3792f8862636eb8cc18ce6e5d2d65,2024-11-21T07:41:15.570000 CVE-2023-20634,0,0,b0b1c5908cb36423248ecc504db659e09cae32845206be6f448f99a3e9062f1f,2024-11-21T07:41:15.690000 -CVE-2023-20635,0,0,68cc0e66bb142641f6c9e21f0041d600dd3c425161d43e381a22a918d4ed1fd9,2024-11-21T07:41:15.823000 +CVE-2023-20635,0,1,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000 CVE-2023-20636,0,0,7969ffb97886082c6a56452f4bd27bb421515913b292c77bae030e782a2f8d07,2024-11-21T07:41:15.943000 CVE-2023-20637,0,0,8f038e57aa78ece48451171f04153fb424960afef9c2b2d699b66084c7dcf21c,2024-11-21T07:41:16.050000 CVE-2023-20638,0,0,682bb7f5f889f3c8e2845ecb7f3268c10614777581011e1531d7a44568da3706,2024-11-21T07:41:16.160000 @@ -216262,13 +216262,13 @@ CVE-2023-20641,0,0,66afd76ab5e3cab0364e8ba13a5eff296c3abe942f408ca92dfd55e801388 CVE-2023-20642,0,0,ab42154c747b6570707a2a6e302e1d7356412038014a0a3e86e15a95727d6b82,2024-11-21T07:41:16.630000 CVE-2023-20643,0,0,29baeeea0d83d636cbe7387d2e7a6ff6d1b6ca73019c6a0fa1aaca17b82ecd5e,2024-11-21T07:41:16.737000 CVE-2023-20644,0,0,47e77d5e6c7673ac7afc319e6bd16df66831e94df9a4c5108b5e1f129213c770,2024-11-21T07:41:16.850000 -CVE-2023-20645,0,0,d7dbebbbbec8545e47c29fbe294103b6f5b7ae8a520f39e1331ff2d1e4b29596,2024-11-21T07:41:16.970000 -CVE-2023-20646,0,0,455dab224a938ba3444698a81ae8b972e45980243ebef45b8e0085117c47705e,2024-11-21T07:41:17.077000 -CVE-2023-20647,0,0,a6a67f1a91af86fb732ff0b2119dfc82469b48d39a0df6afde7db68188f0a823,2024-11-21T07:41:17.193000 -CVE-2023-20648,0,0,62331aba18181bf7a3a19631e827d21455dc689fa05105754e73c61c7630bb2e,2024-11-21T07:41:17.303000 -CVE-2023-20649,0,0,e578b7d1e0dde5f624a02d937013ff7cf0b25887e0640b542517224614e5c987,2024-11-21T07:41:17.427000 +CVE-2023-20645,0,1,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000 +CVE-2023-20646,0,1,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000 +CVE-2023-20647,0,1,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000 +CVE-2023-20648,0,1,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6dbd,2025-03-05T19:15:28.157000 +CVE-2023-20649,0,1,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000 CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000 -CVE-2023-20650,0,0,268fd855a65cdab2a0eaeb2cfd59dc51a4a643f54094cc85261c1bbd6d1a24f1,2024-11-21T07:41:17.543000 +CVE-2023-20650,0,1,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000 CVE-2023-20651,0,0,c931350452b735a23e9229b569e270a5f54d60e0e2263fb39c061c2250efc655,2024-11-21T07:41:17.647000 CVE-2023-20652,0,0,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000 CVE-2023-20653,0,0,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000 @@ -216289,7 +216289,7 @@ CVE-2023-20666,0,0,c5d2c0fe4d9f9ffdbe1d4fa83d8991d3bf44101616c65a6e41eb579627dba CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000 CVE-2023-20670,0,0,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000 CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 -CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 +CVE-2023-20674,0,1,1d7150870f73731e427b98bc692b8c9d2962bd27caafe479a90e35c1f0c08671,2025-03-05T20:15:43.900000 CVE-2023-20675,0,0,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000 CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35 CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000 @@ -218617,7 +218617,7 @@ CVE-2023-2332,0,0,da44be4c9a914607350af7cdf1b1da16efda7b342df7dcfe63c493c785f8f0 CVE-2023-23324,0,0,5d48828077c8be90528b04711cd87bf712a72c1a2913ba049bb8d673723ba347,2024-11-21T07:45:59.480000 CVE-2023-23325,0,0,518dcf9a2af100841b84c73e77aead56932b04d21c668e4e673d1b9b408ecbdb,2024-11-21T07:45:59.640000 CVE-2023-23326,0,0,1a4e39362f1c8791076d367fc23df696eb59e6884fa5b2335a9fcfd232e3f37d,2025-02-27T19:15:47.783000 -CVE-2023-23327,0,1,608b9a4add436041417cbab32eafb701aa970f9e7b4e878dfae91fbe6a9d76dd,2025-03-05T17:15:12.340000 +CVE-2023-23327,0,0,608b9a4add436041417cbab32eafb701aa970f9e7b4e878dfae91fbe6a9d76dd,2025-03-05T17:15:12.340000 CVE-2023-23328,0,0,93bd54281b2a6b33993da36fd1ee5c9aba3043faf08f089dbbd35a213677db25,2025-03-04T22:15:35.720000 CVE-2023-2333,0,0,49815d35ba5652045e1256f3d4e37c7e202552cb53ecfa1b0d6fb27fcb89f551,2024-11-21T07:58:24.400000 CVE-2023-23330,0,0,4d49459152c00a8d0e982eb0ce8f3681dcb11541a12b5dcd275f47bba39075ba,2025-02-18T21:15:14.247000 @@ -219475,7 +219475,7 @@ CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd141854 CVE-2023-24278,0,0,8b3a10f640b076cc06894b9a7323e5d52321fe3fe7263648e751cafc218009d8,2025-02-26T19:15:16.663000 CVE-2023-24279,0,0,bcb401ecd54952a6b3fa7d3e1dff47a3cf63506b6a5303515865dd9711fad82d,2024-11-21T07:47:39.133000 CVE-2023-2428,0,0,bdb844c56d8c8e00f4a260fc6fd9b038fd6ebce6e031ea2559d7741b54fc28eb,2025-01-30T17:15:15.810000 -CVE-2023-24282,0,0,802047591699666e56f4597ee2c8a86b10133f82c461c579234f7f15c927a23f,2024-11-21T07:47:39.283000 +CVE-2023-24282,0,1,e05ded1b01d4352cf39683a7553627f8b8f9510288b442e8eb44071210e3679b,2025-03-05T19:15:29.053000 CVE-2023-2429,0,0,58ff0d99261c61eba5cceeb08e9f29525f122d7e4d766ca6a31dc201179e1aae,2025-01-30T17:15:15.950000 CVE-2023-24294,0,0,3e42f9b86751e812a6b22510e56d8d1be93e046cdaadd881a9a597ba3368c39c,2024-11-21T07:47:39.450000 CVE-2023-24295,0,0,ef678c92680f783e4697256b62662f890905cb8a683c3e297ed97c828d80ca05,2024-11-21T07:47:39.600000 @@ -219792,7 +219792,7 @@ CVE-2023-24653,0,0,08283d9ae8aab4f26e31d58418abb36bbc8972bfa560b4473ca5aa391721a CVE-2023-24654,0,0,86a74b36ab0aa56ef60565de904d15cc8aaea147de483e6f86904c7816bdaf7e,2024-11-21T07:48:16.957000 CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000 CVE-2023-24656,0,0,7690104318d4516fbb5cb79df2d9f2678e1757e7786f00ff38000419ec12c2a1,2024-11-21T07:48:17.240000 -CVE-2023-24657,0,0,a7c270e0d950e16bb14f9569d20cd75cfef2f1a3560ab3c34ac8bea07ccd6d46,2024-11-21T07:48:17.387000 +CVE-2023-24657,0,1,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000 CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000 CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000 CVE-2023-24671,0,0,285987de08d208e85df027c33ab5d1dccd3ffbde353c9b8020b34641113c0956,2024-11-21T07:48:17.537000 @@ -219845,15 +219845,15 @@ CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2 CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4bc2,2024-11-21T07:48:23.160000 CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000 CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000 -CVE-2023-24773,0,0,1cc31190f570fc3c23b7b2196d6c7eae4d5aa9f41329bb819157d05a69818791,2024-11-21T07:48:23.443000 +CVE-2023-24773,0,1,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000 CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000 CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000 -CVE-2023-24777,0,0,4a866ff95b4f709fb308f1ed6883b97243dc32bc5395b4fb2599794ee1bd83c4,2024-11-21T07:48:23.967000 +CVE-2023-24777,0,1,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000 CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000 CVE-2023-24780,0,0,a70e6811128672d0ff689b485eeaa75ae829acf7b17513334d6f6cc6f8dadc0a,2024-11-21T07:48:24.097000 CVE-2023-24781,0,0,7a997d3dc41a9eaad892ecad59650364a4b3147ccd6d11b4f9bafcd21fd34e03,2024-11-21T07:48:24.223000 -CVE-2023-24782,0,0,de1ddb60aeb7683dad9e507d0f8015dab2e4bb6115306cc28fea452c67275758,2024-11-21T07:48:24.360000 +CVE-2023-24782,0,1,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000 CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000 CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000 CVE-2023-24788,0,0,868ff4d8e88aff25ad543e70a65b697e1d178d63050b1ca143aa0decdb797d27,2024-11-21T07:48:24.640000 @@ -221011,7 +221011,7 @@ CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4 CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47 CVE-2023-26105,0,0,7cc2762bb92da835a09938bd30ea450932cc3a111ca4007596fe1bf509cfbdd5,2024-11-21T07:50:47.137000 CVE-2023-26106,0,0,3b589f2ca9941f574c87aed5e414b2940d6d860604b41f19a3df7a66de8eec77,2024-11-21T07:50:47.253000 -CVE-2023-26107,0,0,afdc678649df7896e5ed650c8611116ae7806e6ef98165c3a3b5f041d30aec6c,2024-11-21T07:50:47.367000 +CVE-2023-26107,0,1,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000 CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000 CVE-2023-26109,0,0,1df13cce9e658344e9fee3b1a3ec2cce78326cb9ab178edcf615a984859539e2,2024-11-21T07:50:47.597000 CVE-2023-2611,0,0,e40fc44e8c0f9f87f6cc648583f7f82c9d48ab56bdd345e0bf13e41c1ddb4a27,2024-11-21T07:58:55.813000 @@ -221116,7 +221116,7 @@ CVE-2023-26257,0,0,651ae83f9b566794a14a3a87e0cadbdea81d8eb5e63fa2a4d16d316ec3fef CVE-2023-26258,0,0,ff9e8234c9784e7a294e94b80683256ffdc02c595f084313493ac6d35cf02eac,2024-11-21T07:50:59.670000 CVE-2023-2626,0,0,ca17b69e5784d9a3dc3563acb8287618e374689f2a0fbc11c0a942570d2465a9,2024-11-21T07:58:57.490000 CVE-2023-26260,0,0,682c3aa32ac3b1e2f0244b618bddb4144dc1da5d6c899d092a4c4361550bec51,2025-02-11T16:15:35.347000 -CVE-2023-26261,0,0,73f44ce0ab82f054ce1c8a5fc6b8cf2f5c8e9f2cd57c934a4fa6003d405980db,2024-11-21T07:50:59.953000 +CVE-2023-26261,0,1,fb6d7637bc853116d89ddd08b2b147d96ef06217c33e5f4e8d240f7283abccd0,2025-03-05T19:15:30.133000 CVE-2023-26262,0,0,5393ce589cf1c921932aa694df325bb2f0c0a9cb4e3b8aeaa04b9961173c31f7,2025-02-27T21:15:18.663000 CVE-2023-26263,0,0,ea8263e453191214d08a39c61ed1efe7b14d89219c29343eb5d7a37fbed09b47,2025-02-07T17:15:25.293000 CVE-2023-26264,0,0,e65f8a2927b958d250904011d8e5d0e2d529de3c6397de687a045325585a616b,2025-02-07T16:15:34.490000 @@ -221605,14 +221605,14 @@ CVE-2023-26943,0,0,40224a5889d9a9d46f084ff88f91a23a22a2c393975db40c4df8c233b1253 CVE-2023-26948,0,0,385254368d76362ed022a3338e9a32f9da4c64e597dcc2197c790fa2beaed98b,2025-02-28T17:15:14.537000 CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e6a0,2024-11-21T07:52:05.803000 CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000 -CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000 +CVE-2023-26950,0,1,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a79b,2025-03-05T19:15:31.957000 CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000 CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000 CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000 CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000 CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000 -CVE-2023-26956,0,0,357b2a07c4dff39d60a75c8ab45811278d23b3855aa28ce615f60743efe78a52,2024-11-21T07:52:06.880000 -CVE-2023-26957,0,0,1fcd76af469e758ca71f02225cb1d9cf9da47892e131821d46b7a639391fad56,2024-11-21T07:52:07.023000 +CVE-2023-26956,0,1,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000 +CVE-2023-26957,0,1,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000 CVE-2023-26958,0,0,1b26350389205ca0e46cfdac6f76150e5a95bb023d56c1b5b2a4a4a1011448ab,2024-11-21T07:52:07.167000 CVE-2023-26959,0,0,3256c10cc44d1ea908179ee6646c2f1d21949e7f041fefc54308e21873c039a8,2024-11-21T07:52:07.317000 CVE-2023-2696,0,0,80c166f4bb66cbe0e082d20ccd7f4b1fe89761e6fcf75764df81daccdc3a9638,2024-11-21T07:59:06.300000 @@ -221696,7 +221696,7 @@ CVE-2023-27082,0,0,2c40f95e8d41178b94dd847ebecb5d6ca70900da105b9be54ff9bd9eda4c6 CVE-2023-27083,0,0,f52240e94afb722f2a0c557f9dfb89c9e41d5209858d5fe1be554d2aa3a26983,2024-11-21T07:52:17.457000 CVE-2023-27084,0,0,35ab801ad3bda4ff85fccaa78f55fd32dbc2a00babecfb93007934955146f638,2025-02-26T20:15:13.003000 CVE-2023-27087,0,0,13db924c9808b9c4671f5e5a124311e49f06005723090df2ee6d54267087f848,2025-02-26T19:15:17.373000 -CVE-2023-27088,0,0,02388a593b99babc1f18f212d3a41091d176beb534c47dbe7068491745b34256,2024-11-21T07:52:17.920000 +CVE-2023-27088,0,1,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000 CVE-2023-27089,0,0,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000 CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08 CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 @@ -221764,8 +221764,8 @@ CVE-2023-27195,0,0,f5b080ae5b82d67219269b974ee6a99df8952f7b57b88ed7fe61d0dfd2d5c CVE-2023-27197,0,0,e84e0b840f378f9a864dbfc7a1dab67e2418382c8daf8e8ab8c5709fe66c51b0,2024-11-21T07:52:26.650000 CVE-2023-27198,0,0,6aaa3a467a6e5a968a4b89d7e55a0283b99f5c3e15d3ceed990a63b065ff0c56,2024-11-21T07:52:26.800000 CVE-2023-27199,0,0,f52e678322b83023c324e2d55ad56e8e9fb4a4e93977a5e149525ab199baa64a,2024-12-04T16:15:20.393000 -CVE-2023-27202,0,1,c164338a825b42246521fdd9b9868c2ffb54c8db17cbea753b9d48b6212ffac0,2025-03-05T18:15:34.610000 -CVE-2023-27203,0,1,fc903e9ce43d0da10ff76fc53b6887dd75a03d749a08a32d70184a65a6ad316c,2025-03-05T18:15:35.217000 +CVE-2023-27202,0,0,c164338a825b42246521fdd9b9868c2ffb54c8db17cbea753b9d48b6212ffac0,2025-03-05T18:15:34.610000 +CVE-2023-27203,0,0,fc903e9ce43d0da10ff76fc53b6887dd75a03d749a08a32d70184a65a6ad316c,2025-03-05T18:15:35.217000 CVE-2023-27204,0,0,f279e9fb997433dbc474729807c8161d03946eb66e7962debf59ad2658b411a2,2024-11-21T07:52:27.430000 CVE-2023-27205,0,0,38a05e270f23afb5b9f10d05350a628adfad95f6a41b889c8861849e26c7e439,2024-11-21T07:52:27.557000 CVE-2023-27206,0,0,77e050e17a3432ef6e8e8ffd64a092d2eace4688e1513da0d284cb0bf810d9f9,2024-11-21T07:52:27.697000 @@ -222444,8 +222444,8 @@ CVE-2023-27981,0,0,ea1231795bcb8310c14a9bb1fc472a25d793792a8cfb51dbdadf72bef9c0a CVE-2023-27982,0,0,6c115496f3ae87320d8598e9ec3c3ab57e5a0bd7f3d12c7c42f4f6fa06abf224,2024-11-21T07:53:52.063000 CVE-2023-27983,0,0,d035370fc7a159a879ed87c7713b961b35c0fb67e5e211a7297b89f013965165,2024-11-21T07:53:52.187000 CVE-2023-27984,0,0,b76fb4132537d021ba4b78153f191e302282690d36245d0404487b9c5e0c785a,2024-11-21T07:53:52.320000 -CVE-2023-27985,0,1,42e73abf98f88adf190a2434e01e5fe54cd0d2159a953b2b8da4dbbd6109dab7,2025-03-05T17:15:12.623000 -CVE-2023-27986,0,1,c2c050d3761f4dceb39fef5f58f3912d41578a686402bb2c80a967da9c60a55b,2025-03-05T18:15:35.673000 +CVE-2023-27985,0,0,42e73abf98f88adf190a2434e01e5fe54cd0d2159a953b2b8da4dbbd6109dab7,2025-03-05T17:15:12.623000 +CVE-2023-27986,0,0,c2c050d3761f4dceb39fef5f58f3912d41578a686402bb2c80a967da9c60a55b,2025-03-05T18:15:35.673000 CVE-2023-27987,0,0,1d337198ca98f7ec23d32aad28d7b6222b7cbb9dde36761f86a64f710b3c6434,2024-11-21T07:53:52.747000 CVE-2023-27988,0,0,cce94002225d2605abe65b4fcc86b268b885b186ca4c4b1fa6a736a3adbc4cfe,2024-11-21T07:53:52.930000 CVE-2023-27989,0,0,f80df68ca27e65f0bb50a2b0cab0d9cd6ce63b52de8bbc50901fb550d113154f,2024-11-21T07:53:53.053000 @@ -223795,10 +223795,10 @@ CVE-2023-29414,0,0,995f6dfbce7b6373c94f8f4446e5c1ab9db1d57586ede22a39a9b94d2ae5e CVE-2023-29415,0,0,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000 CVE-2023-29416,0,0,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000 CVE-2023-29417,0,0,af1671cdf04819caefb52843b9d73da01d07e147abbd4c3ea9e6ae4d1237e052,2024-11-21T07:57:01.327000 -CVE-2023-29418,0,0,216edffe831d0d592ec0d83d60d807b6fddc27336e8ac8763ba6f9057d2f454c,2024-11-21T07:57:01.473000 -CVE-2023-29419,0,0,eee99d945f06108a5e40a1ec9c523d1176d85c277e5d1c52341cf8f78429a077,2024-11-21T07:57:01.617000 +CVE-2023-29418,0,1,7d389d5fb1dc5aa1639d68772bcff9c03b108fc27db7e98f305442d0b248e227,2025-03-05T20:16:04.403000 +CVE-2023-29419,0,1,6abe52bacd06d4b2f2be7bc0e77c7ca4cf8eba041f711b8392428cf819cbd45c,2025-03-05T20:16:05.020000 CVE-2023-2942,0,0,3095d00f007f08736781ffefa009546288f761e162006b66520cb0c1c690f4ed,2024-11-21T07:59:36.943000 -CVE-2023-29420,0,0,e2b6c7bb8587b7680c7006d5e1355d456a81008ea4d057255a2c0081ee9dd6a5,2024-11-21T07:57:01.760000 +CVE-2023-29420,0,1,12b4664e50d577149765f1c033b0e1aca31b1c1cfce0c6b7d8d47cc96b99ce1a,2025-03-05T19:15:34.933000 CVE-2023-29421,0,0,236c15b9df269a365b5f51c706496c8acb4d0d8259ecec17ee326a2d13e3e41e,2025-02-12T17:15:18.467000 CVE-2023-29422,0,0,11d0b8b362c579a59640a4a88f42bc430b3c71c051a72869a1511f4e9f51cbf1,2024-12-09T13:15:27.020000 CVE-2023-29423,0,0,a22c9b9b0fb58e0c90c58921099d165cb9cd3c801aa1e31e81cc43f769d64193,2024-11-21T07:57:02.053000 @@ -224085,7 +224085,7 @@ CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000 CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000 CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000 -CVE-2023-29854,0,0,fc98dbefb3f0918404342d0de6358664a9df189b2710368d978c55821fd941df,2024-11-21T07:57:35.073000 +CVE-2023-29854,0,1,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000 CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000 CVE-2023-29856,0,0,b07bbd6f3df18d3f0c08e71dffe9eeaab7b72b9f25dad866594c7cca7b9f8a6d,2024-11-21T07:57:35.347000 CVE-2023-29857,0,0,0760939b20d3d88a77d487b55a7da2f82fabbe0bc7d6bfc81ea34e8a82edb139,2025-01-22T17:15:10.550000 @@ -226924,7 +226924,7 @@ CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6 CVE-2023-33518,0,0,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000 CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8c8,2024-11-21T08:17:04.957000 CVE-2023-33524,0,0,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000 -CVE-2023-33528,0,1,04519a5771a9c8a42fad9f09afc30f162e7310785f92175a6620fcd28702617f,2025-03-05T18:24:35.503000 +CVE-2023-33528,0,0,04519a5771a9c8a42fad9f09afc30f162e7310785f92175a6620fcd28702617f,2025-03-05T18:24:35.503000 CVE-2023-3353,0,0,73f13e6c85e8b6a63fa0551d3ac8601dd5e6abaf30561f39657303dcaa775484,2024-06-20T14:15:10.650000 CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000 CVE-2023-33532,0,0,109d64130a4769ac20cd8a57448213d04ce1cb12fc0189129cfa30fade0a6a41,2025-01-08T16:15:30.250000 @@ -229165,7 +229165,7 @@ CVE-2023-36675,0,0,cd44e51a9a6eb9c4e63b6fc73dfefe41e5846b7e217f12e6824cfd331ebc1 CVE-2023-36676,0,0,6dff4ed2de3be120c14b2d1cd7e8d5f80ea91e6988a53bad20c9c6d2d9c42bd4,2024-11-21T08:10:20.200000 CVE-2023-36677,0,0,87352cc7cc9fa1d06edebf5b59591f05cddf73fd4ad4323770390a266b8a240e,2024-11-21T08:10:20.430000 CVE-2023-36678,0,0,8e2ca3757ab8e217491173421c97f12fc5198222fd34c6f6238eae9d9ed45354,2024-11-21T08:10:20.730000 -CVE-2023-36679,0,0,710fd98a26df5d2dd2e58cc75a65398b0dfe8227663d073710067948f7d58232,2024-11-21T08:10:20.917000 +CVE-2023-36679,0,1,ba7857da83546fa4db5bb8b1bd93a8a67fe327e5ba5ccf47b4ac55c3dd546b53,2025-03-05T20:50:02.120000 CVE-2023-3668,0,0,ee0fc8a117dff3c229840274c7d57f54273ddbff69a341d8dbdb2bd6060e7e7f,2024-11-21T08:17:47.787000 CVE-2023-36680,0,0,b9be5117546aa41ea1b0775680cd0c31aaaddfcf395655d1742c642ab34f3467,2024-12-13T15:15:17.740000 CVE-2023-36681,0,0,b11a813f807650ef99ed1aeb70071d7ef02b7a8c18f90e2475ff7637b316f608,2024-12-13T15:15:17.880000 @@ -230943,7 +230943,7 @@ CVE-2023-38735,0,0,21ab25d5ddafe00d15e8adabe99307f1a62ce2d7aa79ea0fbb7a5f9551180 CVE-2023-38736,0,0,144ba2540a58f357494ee79a47eb99c452bc1bf7e818120f3e63231a4712e9ac,2024-11-21T08:14:08.773000 CVE-2023-38737,0,0,c2eb8b79ba205ba32e95a9f65042df492bfb77539740a64f3bdc4783e4ad55fd,2024-11-21T08:14:08.910000 CVE-2023-38738,0,0,f5d5b3961240fd01e8da4a613578e8307fcb6551fe59593d23364affd204f28d,2024-11-21T08:14:09.057000 -CVE-2023-38739,0,1,6a98c51212d7a4c7d5a91d9b1e58034ec33c453ad6e474ebb4a33df8bb723c6e,2025-03-05T18:17:37.953000 +CVE-2023-38739,0,0,6a98c51212d7a4c7d5a91d9b1e58034ec33c453ad6e474ebb4a33df8bb723c6e,2025-03-05T18:17:37.953000 CVE-2023-3874,0,0,e8a582a797a204e4ed60e072126d0f975b636930eed36248745a404208c597df,2024-11-21T08:18:15.727000 CVE-2023-38740,0,0,4aed8c9b03e801d431e25d45ad2f5eba21de6eb672f05c26af48e58f03e71755,2024-11-21T08:14:09.197000 CVE-2023-38741,0,0,dc5d151137caaddebae25d42c4162a178c946928edae1a7416db1595fcced194,2024-11-21T08:14:09.340000 @@ -230985,7 +230985,7 @@ CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d CVE-2023-38817,0,0,7edd4aee8397d7ea6c17893642f9290cb29a5d9fd7c9db5652d62d6ce572c9ec,2024-11-21T08:14:13.280000 CVE-2023-3882,0,0,444c96bf639eaba5c5e11c4b1be3fd64667922722cd1e3c7603c25d682c81b4f,2024-11-21T08:18:16.887000 CVE-2023-38823,0,0,aa44355d2943f6c9f7a40cdea13d12711a8057a15c5a620712fe9a0a751b47f2,2024-11-21T08:14:13.427000 -CVE-2023-38825,0,1,2ebe0a9eb1b1f0d76abf8825614933fc2a71679cf14dbb2e89d6c8c2068271e0,2025-03-05T18:24:35.503000 +CVE-2023-38825,0,0,2ebe0a9eb1b1f0d76abf8825614933fc2a71679cf14dbb2e89d6c8c2068271e0,2025-03-05T18:24:35.503000 CVE-2023-38826,0,0,d70943162fe82eb28a7a7256c113a957db59bad2f162c4e502e1cf20871c0cca,2024-11-21T08:14:14.593000 CVE-2023-38827,0,0,15d6e2facfb6109aa5168ffa504a04d99bba843862c4ade896b7f160a2676a7a,2024-11-21T08:14:14.737000 CVE-2023-38829,0,0,f18a04dc8235c21595d960d1c76e0c18e8aba026cbaca717e8d078afcc182e76,2024-11-21T08:14:14.883000 @@ -237826,7 +237826,7 @@ CVE-2023-48194,0,0,89ed483ac6c22c85dd7489b795e294c3a4fb1883ed272f16d543b93969275 CVE-2023-48197,0,0,541e2e2dbadf4c1fc33a37b79d38875bdb81d89915a88dc61cd7177cc00c0dd6,2024-11-21T08:31:11.990000 CVE-2023-48198,0,0,e914d510dc94ba3802fedfbde5ce0c09e7bbfb1ed10c2616609647a73a58c5bc,2024-11-21T08:31:12.140000 CVE-2023-48199,0,0,02d93cf4dc9ab71c968304332cfbd654d91ace976c5191aacfefe4728b8d3636,2024-11-21T08:31:12.297000 -CVE-2023-4820,0,1,a231d8e236cec098509c357874409b1b9aff7f97a915cf7a95f688fac9290237,2025-03-05T17:15:12.883000 +CVE-2023-4820,0,0,a231d8e236cec098509c357874409b1b9aff7f97a915cf7a95f688fac9290237,2025-03-05T17:15:12.883000 CVE-2023-48200,0,0,fbfc5e0c489665bcb01d8e14e6d6b763e9cbbdcee8a1ff2cd7b0fc1f61290fb8,2024-11-21T08:31:12.443000 CVE-2023-48201,0,0,dbdf050d7637fb8c488f5371adb6e2911c873544375aa79ea8e9bb41794a6e18,2024-11-21T08:31:12.597000 CVE-2023-48202,0,0,c4cf6de9326f69551c604d14ed634dac9d8db2b3477f1beb69561a58b00e76a0,2024-11-21T08:31:12.747000 @@ -238560,7 +238560,7 @@ CVE-2023-49028,0,0,1fe6cffd82021764ce68fd3a53c4875910ce33e674fe2677a56e372e5a7b2 CVE-2023-49029,0,0,c614567def59347336438740b811220368c65599cc4c871c14425dc96c92f919,2024-11-21T08:32:42.833000 CVE-2023-4903,0,0,4e15f764aaa4b079f24341cacdb9f278af35d9bba3f5d8eb18a330cc8e32e94b,2024-11-21T08:36:13.627000 CVE-2023-49030,0,0,05a1c83003c2661094ba87a267d63d6f1ebc1176bdaa7cc3b41d9bda2fa7cad0,2024-11-21T08:32:42.990000 -CVE-2023-49031,0,0,701f12fe4b4ed942bc1b9e2b2bc62466e80497326b3c152997ffb8bc7eca6f0c,2025-03-03T18:15:28.330000 +CVE-2023-49031,0,1,3a1898c6166f0e4f546c41396b3dfdfdcaeadd674967e2c103e6c1f470c937cb,2025-03-05T19:15:37.110000 CVE-2023-49032,0,0,bf0051df9f823bcff03622a71e492c2e2c8f0b2e1823ce4c4a928e1018ed932e,2024-11-21T08:32:43.220000 CVE-2023-49034,0,0,1d1efe3d808290b90ce8e37a8c591816f90907f686b935dadde78588546b498b,2024-11-21T08:32:43.363000 CVE-2023-49038,0,0,c9ba25652a66916f2762c9c471fc85f429fa7f7f0cea2238a2047f0c789b591f,2024-11-21T08:32:43.590000 @@ -239270,11 +239270,11 @@ CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda795 CVE-2023-49974,0,0,7f488a86d0ae45569225fc0c424bbd7132352109d96dc64d8e092ba38bbad293,2024-11-21T08:34:07.537000 CVE-2023-49976,0,0,dc813de2d491266ed91a01eb71b0caae473397cd5b519c212f1230a701290a59,2024-11-21T08:34:07.757000 CVE-2023-49977,0,0,e2d356c1ee7ec3d1bf058adc4ff2c7dbd4c712f6da8f95ff297395fbe12d4026,2024-11-21T08:34:07.977000 -CVE-2023-49978,0,1,f33dc6df28163653e0eba878b0b1b2ae63bcfe1716cc8b30d649aad67f839d2a,2025-03-05T18:24:35.503000 -CVE-2023-49979,0,1,b393eaa4772ccd6c91eac4215afed4811b29adb40f1977eff5503a328f979fff,2025-03-05T18:24:35.503000 +CVE-2023-49978,0,0,f33dc6df28163653e0eba878b0b1b2ae63bcfe1716cc8b30d649aad67f839d2a,2025-03-05T18:24:35.503000 +CVE-2023-49979,0,0,b393eaa4772ccd6c91eac4215afed4811b29adb40f1977eff5503a328f979fff,2025-03-05T18:24:35.503000 CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000 -CVE-2023-49980,0,1,11f1889928627963033bce52659f6b90cf8834b8b57d4603428b3b001cac90d6,2025-03-05T18:24:35.503000 -CVE-2023-49981,0,1,47b1907a24244cf4bc6fda61b58b3dc83b438d2c9b6b8a652217622526e3a6c2,2025-03-05T18:24:35.503000 +CVE-2023-49980,0,0,11f1889928627963033bce52659f6b90cf8834b8b57d4603428b3b001cac90d6,2025-03-05T18:24:35.503000 +CVE-2023-49981,0,0,47b1907a24244cf4bc6fda61b58b3dc83b438d2c9b6b8a652217622526e3a6c2,2025-03-05T18:24:35.503000 CVE-2023-49982,0,0,49748c665b0d81c052b0e65878252a172d2e7e02392d816e186ea7fe6dae95da,2024-11-21T08:34:09.123000 CVE-2023-49983,0,0,432d16b576a25a2bf374e9f77773480ee41728c6ea59233467e43b6f3c10665c,2024-11-21T08:34:09.350000 CVE-2023-49984,0,0,8fde47656eaf23c1499783ecedf1880bc620212ebe787cb9504bc990dcf37eec,2024-11-21T08:34:09.587000 @@ -245183,7 +245183,7 @@ CVE-2024-11029,0,0,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62ab CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000 CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000 CVE-2024-11034,0,0,3ab7c1e6f92ed311ef7c84bc99d8afea9fbbf7ceee2269128230e97b66af0fb8,2024-11-23T12:15:16.090000 -CVE-2024-11035,1,1,e116ea7bf6efc76b9fedb36d61f39965068a01b85d4a74c57dac256bea83dfbe,2025-03-05T18:15:36.523000 +CVE-2024-11035,0,0,e116ea7bf6efc76b9fedb36d61f39965068a01b85d4a74c57dac256bea83dfbe,2025-03-05T18:15:36.523000 CVE-2024-11036,0,0,cb568211d88e95057f50625b3b2d9e73f075acca4f066000c5f19e1ceef18c3a,2025-02-04T15:44:41.967000 CVE-2024-11038,0,0,b081c95425ffdb28a4796f93241b66af2f4b7d8ba42742ef93d502aa5f9c9555,2024-11-19T21:57:32.967000 CVE-2024-1104,0,0,1eae50c75d8d746ca0f746c7f8113a7b95b6cc5ee3b09f81f9dcc34a01c59d82,2024-11-21T08:49:48.370000 @@ -246962,7 +246962,7 @@ CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa CVE-2024-12979,0,0,ae24db0e4f2a66f4e1de36af93143ab82962ea0c4d3e66e74916a1e08a75a73b,2025-02-18T18:50:22.963000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 CVE-2024-12980,0,0,6000ffa079d16649502ca9127ef4a551b968e4d7369085deb6f16c832355001b,2025-02-18T18:49:54.517000 -CVE-2024-12981,0,1,88d3a494d58de8d312ad259c317bc3ddcd4ff7877c68d51a0008cf91275cfba5,2025-03-05T18:25:53.837000 +CVE-2024-12981,0,0,88d3a494d58de8d312ad259c317bc3ddcd4ff7877c68d51a0008cf91275cfba5,2025-03-05T18:25:53.837000 CVE-2024-12982,0,0,e7fb56a3ab6559658c6d7a80dd35f9732df0dd37c08bc66d7cc5ed7d2da0d409,2024-12-27T16:15:23.540000 CVE-2024-12983,0,0,f0f1274b31531cd87e4ac88beea7a68c21418dc0cc88382516efb32282ea81e5,2024-12-27T16:15:23.683000 CVE-2024-12984,0,0,2f1f6d47358f5bf062b046e597be4abadb2d2163986aa69703e28be2bc64f2f0,2024-12-27T15:15:11.957000 @@ -246987,7 +246987,7 @@ CVE-2024-13001,0,0,010f40b62ec28cea03ab6bff561e40d6190a637e7819f3ec9b21dc829c096 CVE-2024-13002,0,0,73f802eb9f8b9e1d720b28d5d5fec7836df95b40b314e093b6ac0ef85aa4689b,2024-12-31T17:15:07.460000 CVE-2024-13003,0,0,8ea4a997164608756dd4ca16f93d14ecebb42d80183088df88f6df822d4c84d1,2024-12-31T17:15:07.870000 CVE-2024-13004,0,0,9707627fb86085899aa842f9c227ffb6175dfb5ca910be29cf96038d4be94ef4,2024-12-29T07:15:05.643000 -CVE-2024-13005,0,1,e8d159934018fcc7ce9b57641c4b8f208310db66a38966320061a8f56b9152b8,2025-03-05T18:25:53.837000 +CVE-2024-13005,0,0,e8d159934018fcc7ce9b57641c4b8f208310db66a38966320061a8f56b9152b8,2025-03-05T18:25:53.837000 CVE-2024-13006,0,0,5148b7261791fb288fbd5059061c79d480e819ebaa16915dded55fb50a651772,2024-12-29T08:15:06.840000 CVE-2024-13007,0,0,35e57b6fb4a2cd378f5ff098e8271ea45658be9d391f26affbd975728143f2d3,2025-02-25T22:46:39.787000 CVE-2024-13008,0,0,94f05080bbae6174cb7ea266074a328f76a4e18f0879ea4868287035bab63520,2025-02-25T21:24:58.743000 @@ -255205,7 +255205,7 @@ CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae8235 CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000 CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 -CVE-2024-28784,0,0,698845390ec564cf25ee34e0bc8269c95138382db1a6a41b1e2881822619d518,2024-11-21T09:06:55.913000 +CVE-2024-28784,0,1,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3411,2025-03-05T20:50:02.120000 CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000 CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000 CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000 @@ -255936,7 +255936,7 @@ CVE-2024-29853,0,0,4c9002c0c0fbbb703ad210531603aa769175a9f6320529b3713d1a4749a04 CVE-2024-29855,0,0,2558e9ead7b22223bbaca2c80294fa2333d58137b1a989ec51a3aa934311e1c8,2024-11-21T09:08:28.550000 CVE-2024-29857,0,0,d0f8da7d297215a9aa89339fb466a7b41b1ef03fad42cb6defbc9cbd2e5f42d8,2024-12-06T14:15:20.263000 CVE-2024-29858,0,0,aec2f50579c2c9c0915e18bc8f499c1eb170becbbee3541177ee843aa252f26f,2024-11-21T09:08:28.933000 -CVE-2024-29859,0,1,a96b1e9a60d7d2df04025dafb074db5bc52f61bd155d3662b87098ba1562e976,2025-03-05T18:24:35.503000 +CVE-2024-29859,0,0,a96b1e9a60d7d2df04025dafb074db5bc52f61bd155d3662b87098ba1562e976,2025-03-05T18:24:35.503000 CVE-2024-2986,0,0,034efbed1cd49349cb60af1887d254a911bb02938b066670d6e87e5a67825916,2025-01-14T15:10:34.143000 CVE-2024-29862,0,0,8c5ec88bbec916e77218489c7bbd7314ec051f4063b7c8b8a5e341c9fdbc529d,2024-11-21T09:08:29.393000 CVE-2024-29863,0,0,84604b7c2f2f884038fabd2dac097e571170e075668006e2307925ea311c7c6d,2024-11-21T09:08:29.610000 @@ -256071,7 +256071,7 @@ CVE-2024-29986,0,0,9cebc6375bd62f229f8915ff69e481bc7c94824c63f186ab305a5804aa360 CVE-2024-29987,0,0,b088f25d058e7315318f51b6a3c07eb070d211a07bebf75efa1e733d2f8c02eb,2025-01-17T15:50:06.500000 CVE-2024-29988,0,0,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000 CVE-2024-29989,0,0,c6cfa4e5c4d4e0bcbd4dd9067d2a77e4b5f1b92faef9b769900a9815a1aa29b1,2025-01-09T13:56:22.663000 -CVE-2024-2999,0,1,54f5526107e78302f028396dc619a0394da4727555aaae4127ae3eebbe3f707b,2025-03-05T18:25:53.837000 +CVE-2024-2999,0,0,54f5526107e78302f028396dc619a0394da4727555aaae4127ae3eebbe3f707b,2025-03-05T18:25:53.837000 CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000 CVE-2024-29991,0,0,7497d72bd5d1a58966c800eaffa7741b7aa207b328bcb3f1a4c98147b6508228,2025-01-17T15:50:57.133000 CVE-2024-29992,0,0,cb20ee66fe5ea64bb2e770ccdd8378d7d184401d6d137f3292d293bdb502c2e4,2025-01-09T14:45:52.750000 @@ -256222,12 +256222,12 @@ CVE-2024-30132,0,0,54d98f7843dea94372252c73cd7990d839c54a6dd19fa7023c76c99fef58d CVE-2024-30133,0,0,e08425978db173a70b5a5b6cbb9315d57d44524a2c8d71711218342162ea4294,2024-11-13T17:01:58.603000 CVE-2024-30134,0,0,0cef8ce1964aae6b64f5864e5e70c720c24b9d27f4ed9dcc50f333c0826d36fa,2024-09-30T12:46:20.237000 CVE-2024-30135,0,0,22cdcc2f12827ed25b0e7c8dae426864d180e7d98fe178047460a585e791d16e,2024-11-21T09:11:19.007000 -CVE-2024-3014,0,1,e289832c0662b91cbbe7b6de2743a13fe7f3ec6e960ea8d16a0083470fabd7f5,2025-03-05T18:25:53.837000 +CVE-2024-3014,0,0,e289832c0662b91cbbe7b6de2743a13fe7f3ec6e960ea8d16a0083470fabd7f5,2025-03-05T18:25:53.837000 CVE-2024-30140,0,0,97eb4e1fdb06d6da2480e9307bba333bc05d393382a682951a75739434930a5b,2024-11-08T19:01:03.880000 CVE-2024-30141,0,0,366cb3a10440e3b30cd871e21bbc3f740fac05dab178efaf9985b3ce33a272a9,2024-11-08T19:01:03.880000 CVE-2024-30142,0,0,363bc8d9ef2cad1109db0231f1d9e043ce9476ebb48510d5ff80d7b6f8e54e19,2024-11-08T19:01:03.880000 CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d679,2024-11-01T12:57:03.417000 -CVE-2024-3015,0,1,1506150ce9c24bf5c6495b2770f1f82863089e0097a38aa6e6b97cbe25ca1071,2025-03-05T18:25:53.837000 +CVE-2024-3015,0,0,1506150ce9c24bf5c6495b2770f1f82863089e0097a38aa6e6b97cbe25ca1071,2025-03-05T18:25:53.837000 CVE-2024-30150,0,0,a62c26783832b053b5bcefcdb3738447ad86959ef5b6422f707ac574e115fe4c,2025-02-25T23:15:10.753000 CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959affc,2025-03-04T17:15:12.010000 CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000 @@ -256468,7 +256468,7 @@ CVE-2024-30386,0,0,728341d8909cf772b9833687d550dac7eede79a649bd6afc498a4f6fa8721 CVE-2024-30387,0,0,56c8b449ac604da292fe9ad9e6b47d856515277e3823bb30844bdb634a54ffb0,2025-02-06T20:36:42.403000 CVE-2024-30388,0,0,60dff44e2e2ff8cdb661c390e455741e6d02ab3834355ffee513d12d9ea694e4,2024-11-21T09:11:49.483000 CVE-2024-30389,0,0,ead8de7fc509a64228bbc0cb125c7917e23998253f714220bd2d3acd2fb45034,2025-02-06T20:36:23.717000 -CVE-2024-3039,0,1,fd1ff7c564ec42e61fa3b9f7f46bf52f218469bf40f583b5d685a0203ba03271,2025-03-05T18:25:53.837000 +CVE-2024-3039,0,0,fd1ff7c564ec42e61fa3b9f7f46bf52f218469bf40f583b5d685a0203ba03271,2025-03-05T18:25:53.837000 CVE-2024-30390,0,0,b0c47160df5018fa307d9cdcaedb980fd968b4d66e0d499456354ad6dee30f0a,2025-02-06T20:36:12.843000 CVE-2024-30391,0,0,5f8bb06fbb4dd14695693db6dadd9e1ef2319b0089badf7ca89ab6c8b83db9e0,2024-11-21T09:11:49.877000 CVE-2024-30392,0,0,517e3cf580a7b36ad2c5c6e6ae4afb9008a26bc26c91273ebb59522ceb358b79,2024-11-21T09:11:50.017000 @@ -257367,6 +257367,7 @@ CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7b CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 CVE-2024-3152,0,0,232a7ab8a6c5151aba1982b503cbcc7bcb30e91652e2552e7d49e1b5852760ca,2024-11-21T09:29:00.820000 +CVE-2024-31525,1,1,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000 CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000 CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000 CVE-2024-31544,0,0,b0bccc451dcee5903b366441bb39b229e4ec0f92cdbfeddcea663568e3c62a9a,2024-11-21T09:13:40.747000 @@ -262091,7 +262092,7 @@ CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a0 CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000 CVE-2024-3761,0,0,358bde8f45adfdb9ff52864766059c64ad48fe6ae71748f7258d8d7c971864c2,2025-01-10T14:36:20.713000 CVE-2024-37619,0,0,b796fecf90674fedbf0dfe40b1af68e953925893a23f847b6b6ad0964ef79609,2024-11-21T09:24:06.573000 -CVE-2024-3762,0,1,16ab7f16e3e784fa90a6747464d4fbb49f0a09bf20a96bd3698899248f07a536,2025-03-05T18:25:53.837000 +CVE-2024-3762,0,0,16ab7f16e3e784fa90a6747464d4fbb49f0a09bf20a96bd3698899248f07a536,2025-03-05T18:25:53.837000 CVE-2024-37620,0,0,12c0b8595c5be5a1ef85589c8d5e49e1582f49b44015f171ee6e485fd8ddc4ad,2024-11-21T09:24:06.853000 CVE-2024-37621,0,0,845ad145f9e2fe335a6c0f3eeef77f3d22453599d42a0899db127dbc23d53c9e,2024-11-21T09:24:07.063000 CVE-2024-37622,0,0,bcbf109d92160ad33bf42dc3413114047d28c6ba1f63cbc0e20db8494510cd71,2024-11-21T09:24:07.270000 @@ -262100,7 +262101,7 @@ CVE-2024-37624,0,0,63348aa331b13f4606e2ac0af021ae018a090ea94811188c68517935ef689 CVE-2024-37625,0,0,f458095ad6fd7133034173ff0c45e670bfe51c5cb0b07e4953c85de52169fd33,2024-11-21T09:24:07.870000 CVE-2024-37626,0,0,0270b51ea0f83caa7b336461c7e27dda1fcb2c1add9c3873485df2b3daab9ea1,2024-11-21T09:24:08.087000 CVE-2024-37629,0,0,f3060b80283030da9edba5253b3386a49b066edf49cba675ae668286a6fa671c,2024-11-21T09:24:08.307000 -CVE-2024-3763,0,1,b7f33b926fea6fedac0ad3ed9bb85efe76f1a847c2bf5f05ccdf57e9ef3737c3,2025-03-05T18:25:53.837000 +CVE-2024-3763,0,0,b7f33b926fea6fedac0ad3ed9bb85efe76f1a847c2bf5f05ccdf57e9ef3737c3,2025-03-05T18:25:53.837000 CVE-2024-37630,0,0,5345569b39c659d212f227a8673a6148991560e60d341445685034dcbe85fe68,2024-11-21T09:24:08.467000 CVE-2024-37631,0,0,b94172250324e8145a5270c8aeb579076121342f0c3d04531f4eca530cc0a146,2024-11-21T09:24:08.680000 CVE-2024-37632,0,0,220387fc5e2196b36a8a790a7ef7b06b44f4944d2d626a167d963daa150892df,2024-11-21T09:24:08.883000 @@ -264310,12 +264311,12 @@ CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 CVE-2024-40681,0,0,2b5a5c013480bd5cc87a564fe6701f318e09e1cde3fb5250634972a9f9aebf6b,2024-10-31T17:15:13.143000 CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab406af,2024-11-21T09:31:28.053000 -CVE-2024-4069,0,1,2de2df4dca48bec66b6ef2aa65b4cf9273331d2edc091835c88959a56ebda036,2025-03-05T18:25:53.837000 +CVE-2024-4069,0,0,2de2df4dca48bec66b6ef2aa65b4cf9273331d2edc091835c88959a56ebda036,2025-03-05T18:25:53.837000 CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000 CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000 CVE-2024-40693,0,0,4c2fcccc4f84da1fd3dab504f015de786a85b237d58197aef3700f847f835001,2025-01-24T16:15:36.003000 CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 -CVE-2024-40696,0,1,cf4c544b4c00a3bb7fc7b85a81d387bd231922be37498a21af706aca6ff2815a,2025-03-05T18:17:37.953000 +CVE-2024-40696,0,0,cf4c544b4c00a3bb7fc7b85a81d387bd231922be37498a21af706aca6ff2815a,2025-03-05T18:17:37.953000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,948a33d6a86f753d3a7a713c67741e9f3305f550fabe9dff5357cda0d94549af,2025-02-27T16:24:20.267000 CVE-2024-40700,0,0,2d9c229abc1faaac1cc418f4ae90c891c929abab0867d534c439a3cc25c44edd,2025-02-04T21:15:26.380000 @@ -267696,7 +267697,7 @@ CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16 CVE-2024-45086,0,0,2d2c1612ef6e5a8ce239cd3dcdf490449d1514d9bada7d0d52c5fd5141b8d1fa,2024-11-06T23:04:04.673000 CVE-2024-45087,0,0,5a1fbae564cbb4ee2c9e115b9e60e394ba12f02ef5cac53d3fcf17b309556986,2024-11-18T16:34:23.010000 CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad436655f,2024-11-18T16:33:34.060000 -CVE-2024-45089,0,1,5cc08cb1497632edf112c54efbad2acf03a13e340332ce56070fbaee10980759,2025-03-05T18:17:37.953000 +CVE-2024-45089,0,0,5cc08cb1497632edf112c54efbad2acf03a13e340332ce56070fbaee10980759,2025-03-05T18:17:37.953000 CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000 CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000 CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000 @@ -269076,14 +269077,14 @@ CVE-2024-47095,0,0,3cad230087e8d967e8998024ec473bf552b2e99f02c3b0ebbe36d9dcd1959 CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000 CVE-2024-47100,0,0,bc33fc5a76be564a723b9fb2ec38b7be22b37ba75ce50545dbf45808d11df9cc,2025-01-14T11:15:16.573000 CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000 -CVE-2024-47103,0,1,6771e67ef5c816d19656e97b7a1b0ea749558ddc5479baa3c972619b096bda40,2025-03-05T18:17:37.953000 +CVE-2024-47103,0,0,6771e67ef5c816d19656e97b7a1b0ea749558ddc5479baa3c972619b096bda40,2025-03-05T18:17:37.953000 CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000 CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000 CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000 CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000 CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000 -CVE-2024-47116,0,1,7099687b2c3f4d2e9db25b5ab02b3b7ea919153350004758b9268a0280c9a8fa,2025-03-05T18:17:37.953000 +CVE-2024-47116,0,0,7099687b2c3f4d2e9db25b5ab02b3b7ea919153350004758b9268a0280c9a8fa,2025-03-05T18:17:37.953000 CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000 CVE-2024-47119,0,0,822d29d557ac8a46a432d9833d3741afebbd1611ae551e680e9265032df20c37,2024-12-18T16:15:13.110000 CVE-2024-4712,0,0,72c05213aa50046f03c2ceead2ea0141808f5bcda36c2be58d2e87fc20f17f56,2025-01-30T14:58:45.433000 @@ -269792,7 +269793,7 @@ CVE-2024-47891,0,0,589f151bfbb431a12dbbe664c389c02417f09703d0aa2898a70b48482ecdd CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000 CVE-2024-47894,0,0,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000 CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000 -CVE-2024-47896,0,1,ac5033b7967d89a6dc45f6be553bc426bd15426b07612c8d75a85a0162c10688,2025-03-05T17:15:13.293000 +CVE-2024-47896,0,0,ac5033b7967d89a6dc45f6be553bc426bd15426b07612c8d75a85a0162c10688,2025-03-05T17:15:13.293000 CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000 CVE-2024-47898,0,0,cce74231486c3ab80f60eacc0cea75369d5a573cb99e87ef432e0f8d422293db,2025-02-18T19:15:16.970000 CVE-2024-47899,0,0,f9f806d8192d8d0f2624a3e2583fa5ff6207a910765e6fd3f29aa741332463b7,2025-02-18T19:15:17.117000 @@ -270002,6 +270003,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 +CVE-2024-48246,1,1,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000 CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 @@ -271641,7 +271643,7 @@ CVE-2024-50426,0,0,98769a301248ad186b7e320e6f92bca25c0540eb506a791637c56998d1319 CVE-2024-50427,0,0,702031a1ed6dda9d16b78e1dd7ccc6e9fba388e64e08ea86e6b91ec53c1e826c,2024-10-29T14:34:04.427000 CVE-2024-50428,0,0,f6a29397b6e07e0e346688358b8988e106579ad472c14b68ed9563ab62abfb31,2025-02-25T18:53:45.647000 CVE-2024-50429,0,0,d064b4b20809a127eaac94a65743379f8ff26580e984b69d0ba38477f38c7d2d,2024-10-29T14:34:50.257000 -CVE-2024-5043,0,1,7ddfa08f86a68c3a526b6b6d2028adecf8412d325131e1026ef7dd2cfce76664,2025-03-05T18:25:53.837000 +CVE-2024-5043,0,0,7ddfa08f86a68c3a526b6b6d2028adecf8412d325131e1026ef7dd2cfce76664,2025-03-05T18:25:53.837000 CVE-2024-50430,0,0,725d7f7576c86fce0852ed3ae5587b73e971e125f78fa52d5899ceebd3eecb83,2025-01-31T16:49:46.120000 CVE-2024-50431,0,0,ff73175afdf8e7f009f3fdb9046475e6908c145ad995b39af8e64c656d375e5e,2024-10-29T14:34:50.257000 CVE-2024-50432,0,0,8270652ae6bec401a622c1e4ee2e9ea06cb4956c38a1f454b5c12801f5941a67,2024-10-29T14:34:50.257000 @@ -271652,7 +271654,7 @@ CVE-2024-50436,0,0,96531cefc6ab6e782005c0dd8778d315dd895a5e2ce077de9ba1e793a7882 CVE-2024-50437,0,0,739d49cc4d42f1963c19190ecad7356a01e463cd644cabb1068bc2e0ca912455,2024-10-29T14:34:50.257000 CVE-2024-50438,0,0,811b702df54d5a931e1fef1df934b4df697c64e6863c3cc7f24e918b913c994e,2024-11-08T14:52:53.633000 CVE-2024-50439,0,0,3f3c39d7ff46db6ba7567ad95ecc3017b1a0f61779e45099b690667c7b98c376,2024-11-08T14:53:36.900000 -CVE-2024-5044,0,1,b311b4733ce46b220fa8990c93fc2e82b72bf711d2390bbc88c7ea2701cf1552,2025-03-05T18:25:53.837000 +CVE-2024-5044,0,0,b311b4733ce46b220fa8990c93fc2e82b72bf711d2390bbc88c7ea2701cf1552,2025-03-05T18:25:53.837000 CVE-2024-50440,0,0,51babe83901e352491f2e51d9617c6845693d84cbcc0b5f3123794df196c1105,2024-11-08T20:33:29.843000 CVE-2024-50441,0,0,e17f8f6ebd6d2eb935e9b8e6dc445d67e34b916c8bdf14e2107630a1e65787c3,2024-11-08T20:33:47.027000 CVE-2024-50442,0,0,4546b91be0215ea920bf3897311e25e5e60c7aae79643bbba2ac0c58a791c5f6,2024-10-29T16:04:29.950000 @@ -272075,6 +272077,7 @@ CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c38655 CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000 CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000 CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000 +CVE-2024-51144,1,1,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000 CVE-2024-5115,0,0,63ee4189b26772fc1ce56914807ff994899a5055d7b3d38de495f2ee77931e2d,2025-02-21T20:51:40.910000 CVE-2024-51151,0,0,6043d48b8e54694a9f5dd0791c6e07ebb911ecfc7547aac1163aaf1a70efd3d4,2024-11-22T17:15:09.190000 CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f9037d5,2024-11-13T20:03:06.083000 @@ -273694,7 +273697,7 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065 CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000 CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000 CVE-2024-53382,0,0,2488076516d1ebcfd2ad12e680a94caed7283ef6a09ea27a43a166505c7166e8,2025-03-03T22:15:35.637000 -CVE-2024-53384,0,0,e63525e28645ffd574e4bc5c37cec43657018cac2aeb992a27d57ce5edd4d535,2025-03-03T18:15:29.670000 +CVE-2024-53384,0,1,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000 CVE-2024-53386,0,0,7f05252fb8b0d166f1c2ba66ecc4b7344953d98b8f75dafbb0948fe4c267094e,2025-03-03T22:15:36.583000 CVE-2024-53387,0,0,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d896,2025-03-04T17:15:13.043000 CVE-2024-53388,0,0,8b8dacfab9439ff4969bd847d9389950511a224c15ee4c724e3aaa2186354ee1,2025-03-04T17:15:13.217000 @@ -273717,7 +273720,7 @@ CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db166141872 CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000 CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000 CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000 -CVE-2024-53458,1,1,97d39f76361f25c42034c95d8b9ccf092d5a81242cf9c168f96b864a3e5ef49e,2025-03-05T18:15:37.053000 +CVE-2024-53458,0,0,97d39f76361f25c42034c95d8b9ccf092d5a81242cf9c168f96b864a3e5ef49e,2025-03-05T18:15:37.053000 CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28 CVE-2024-5347,0,0,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000 @@ -274873,7 +274876,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349 CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000 CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000 CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000 -CVE-2024-55570,0,0,6e9d2e652c470456ab2e828a585ea715db809dd2e7d02ec6fe542ca24100e541,2025-03-03T16:15:38.900000 +CVE-2024-55570,0,1,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000 CVE-2024-55573,0,0,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000 CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000 CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000 @@ -280203,7 +280206,7 @@ CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e343 CVE-2025-0367,0,0,ab3acf71ca0537fe4a7d80088a2aafb5561d6238415269bf152b7ed9b1300383,2025-01-30T17:15:18.097000 CVE-2025-0368,0,0,a3cd88f6c2e32d5753c4cc60666c98ec19ead45f71b261b7ea54f7fb575f967d,2025-02-04T19:15:32.070000 CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000 -CVE-2025-0370,0,1,d26baf011b3bc7610507fcfc1e56a5daf45401086cdaaada5d9603c9a2d47f6f,2025-03-05T16:39:32.083000 +CVE-2025-0370,0,0,d26baf011b3bc7610507fcfc1e56a5daf45401086cdaaada5d9603c9a2d47f6f,2025-03-05T16:39:32.083000 CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000 CVE-2025-0373,0,0,c896e2039f1868b25d47604a1b505a94cc3030671c646849df8ad1a697ac14ca,2025-02-07T17:15:30.760000 CVE-2025-0374,0,0,8869dd713bc48baec5d2bd3f0b3f9adaccbc12e420edf3f19dd609cc3be6ee1a,2025-02-07T17:15:30.903000 @@ -280308,7 +280311,7 @@ CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22 CVE-2025-0509,0,0,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 CVE-2025-0511,0,0,208876e26427d3b8f218407b81a5b4afa8bcd5e931fdeb6575b6f455a23596eb,2025-02-20T20:35:03.573000 -CVE-2025-0512,0,1,cf90a8890112925e9d3690628010cacdb7ff24fc40e2313e40394963b6695fe7,2025-03-05T16:39:32.083000 +CVE-2025-0512,0,0,cf90a8890112925e9d3690628010cacdb7ff24fc40e2313e40394963b6695fe7,2025-03-05T16:39:32.083000 CVE-2025-0513,0,0,16e90cd60d3f0b990d0a506119738b488f3ad7bf5bf01e1849a16f8301021207,2025-02-11T15:15:19.257000 CVE-2025-0514,0,0,0ea869b55fb06aba02ed9e48860e6595c30b3a11be9cc65554e0ffc514b5fb9a,2025-02-25T22:15:14.887000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 @@ -280580,7 +280583,7 @@ CVE-2025-0953,0,0,921a82da6ab0ef8d3d98803db3946d447f0517778af0c3f71c90d1c8292a15 CVE-2025-0954,0,0,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000 CVE-2025-0956,0,0,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000 CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000 -CVE-2025-0958,0,1,6a8abacfef7e74902962072738d5b34e6ea938b59880ac4107bc2c79fd800440,2025-03-05T16:39:32.083000 +CVE-2025-0958,0,0,6a8abacfef7e74902962072738d5b34e6ea938b59880ac4107bc2c79fd800440,2025-03-05T16:39:32.083000 CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000 CVE-2025-0961,0,0,059a317a12e25a50163b21bef6bea5a610b1a05de1674dda2e4a2359a3f086cd,2025-02-10T13:15:26.413000 CVE-2025-0967,0,0,d8c64e0386338d50f41e26d5ea4b324d68ccfa9e57d63544f495e90b3a5b315a,2025-02-25T19:05:40.627000 @@ -280789,7 +280792,7 @@ CVE-2025-1295,0,0,24bdaaeb758634ffe52b87573cb2760c08e1a07ac9682ba1ed20b65d22033c CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000 CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000 CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000 -CVE-2025-1306,0,1,1ee42c9c738fb719918d183e21eaf97d7c5ffad4c1efdf287d4d8d62c7af94e4,2025-03-05T16:39:32.083000 +CVE-2025-1306,0,0,1ee42c9c738fb719918d183e21eaf97d7c5ffad4c1efdf287d4d8d62c7af94e4,2025-03-05T16:39:32.083000 CVE-2025-1307,0,0,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000 CVE-2025-1316,0,0,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 @@ -280861,8 +280864,8 @@ CVE-2025-1463,0,0,d248ef273a3b5e888e172d8fd07cc9fd97f2fb7f97e8edd42c6b6898096b1d CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000 CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000 CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000 -CVE-2025-1470,0,0,0e5ee1e50bc02678d0d86bc8a53fa6fbb96027ca758410a0d5522fcad0a613bd,2025-02-21T10:15:11.243000 -CVE-2025-1471,0,0,6064c97c452ac9fb7d0e4763e4deed4dbc0fb1f138c1888c72fbd3ee304679cd,2025-02-21T10:15:11.413000 +CVE-2025-1470,0,1,3848028ffff60fd580115e36417f30f6dc535781a178d2b984e388a8c98d4795,2025-03-05T18:54:18.150000 +CVE-2025-1471,0,1,ce8174d2ec3ea90fee94fa4dcc9877166339de4d02332b4e10279e4dda90d352,2025-03-05T18:54:18.150000 CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000 CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e53733175,2025-02-24T11:15:10.193000 CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 @@ -281059,17 +281062,17 @@ CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9 CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000 CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000 CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000 -CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000 +CVE-2025-1889,0,1,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000 CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000 -CVE-2025-1891,0,0,48564a83b01094f027d40be0fc2e0faa1b03fdb1978bf68de11e33632eeefdd9,2025-03-04T17:15:14.510000 -CVE-2025-1892,0,0,2fa96864979ccd34da4a094f4e313760a12e68561a0843aec1e575c6ac276b4a,2025-03-04T17:15:15.700000 +CVE-2025-1891,0,1,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000 +CVE-2025-1892,0,1,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000 CVE-2025-1893,0,0,9be412d2514b9be0790e5a4193b6955597746daf900e90c81d514cf9ccc312d7,2025-03-04T17:15:15.890000 CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000 CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000 CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000 CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000 CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000 -CVE-2025-1899,0,1,a77691b4c448ef2bbbe9d4136b221ec0c7528d9c510c1bc782c445389d323e3c,2025-03-05T18:47:21.313000 +CVE-2025-1899,0,0,a77691b4c448ef2bbbe9d4136b221ec0c7528d9c510c1bc782c445389d323e3c,2025-03-05T18:47:21.313000 CVE-2025-1900,0,0,d3082e94b9592441088dc165b99a15ab6d554db678fa3c756afc71794924b0d3,2025-03-04T17:15:16.023000 CVE-2025-1901,0,0,6a0e0b6d920b5be207e384b12f77ca4dbc6181d350853bd89c4970865324796a,2025-03-04T17:15:16.150000 CVE-2025-1902,0,0,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000 @@ -281087,7 +281090,7 @@ CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000 -CVE-2025-1930,0,1,e0eeca60a40599b41d4e2503f5a7e0f6e6ab961d2b56420baaf24ed1ff9b0d96,2025-03-05T17:15:13.583000 +CVE-2025-1930,0,0,e0eeca60a40599b41d4e2503f5a7e0f6e6ab961d2b56420baaf24ed1ff9b0d96,2025-03-05T17:15:13.583000 CVE-2025-1931,0,0,b5e38c0da3bd8580a8ad8790659a66faed6e8c8f7d9210cfe046349c16f0890a,2025-03-05T00:15:36.227000 CVE-2025-1932,0,0,3b32c1102832d0715d404745294706e7b7d7e3b874c1ef4c9ed7f047a9dcc442,2025-03-05T00:15:36.320000 CVE-2025-1933,0,0,04dc26cfd0f75d21b5341faee8a41387b97852f82dfb1cd03c11f7e09550a4b7,2025-03-05T00:15:36.470000 @@ -281096,7 +281099,7 @@ CVE-2025-1935,0,0,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997 CVE-2025-1936,0,0,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000 CVE-2025-1937,0,0,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000 CVE-2025-1938,0,0,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000 -CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000 +CVE-2025-1939,0,1,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000 CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000 CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000 CVE-2025-1942,0,0,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000 @@ -281108,12 +281111,12 @@ CVE-2025-1952,0,0,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f43 CVE-2025-1953,0,0,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000 CVE-2025-1954,0,0,3f34d4e968cd36d80c9294c76386f7fccfdd6b744481da9a458dbc8dc7f57722,2025-03-04T21:15:12.750000 CVE-2025-1955,0,0,37a5842ab02dcbdf807bbf6b0629cfaa7bc44f4f542caddab49f2045e2592b24,2025-03-04T21:15:12.940000 -CVE-2025-1956,0,1,f0a904af2ab36cc78e6f3ccc8c53add0b2dee0e784cd212da1dec839459a2817,2025-03-05T17:15:13.737000 -CVE-2025-1957,0,1,b2496b85ba41c4ab1b02cd0cc0fb17abfffe8fc3453c13480490893f07df6d0d,2025-03-05T17:15:13.860000 -CVE-2025-1958,0,1,a6ea7a774774a955bd844f163cea508be42ab5b7c91820027ccf4422256f7ae3,2025-03-05T17:15:13.980000 -CVE-2025-1959,0,1,903168fc67c7c5275c7c2870d1ac319422187d69065abf239ddb565e47d12776,2025-03-05T17:15:14.100000 -CVE-2025-1961,0,1,bca97fcfdd845552ca69481196a8059555d85ff9de4d132aae90bef8f0351f80,2025-03-05T17:15:14.220000 -CVE-2025-1962,0,1,710aa406891e8653130d6958a046896a88ec2343aa771ea2ce2bf76c55db1d00,2025-03-05T17:15:14.337000 +CVE-2025-1956,0,0,f0a904af2ab36cc78e6f3ccc8c53add0b2dee0e784cd212da1dec839459a2817,2025-03-05T17:15:13.737000 +CVE-2025-1957,0,0,b2496b85ba41c4ab1b02cd0cc0fb17abfffe8fc3453c13480490893f07df6d0d,2025-03-05T17:15:13.860000 +CVE-2025-1958,0,0,a6ea7a774774a955bd844f163cea508be42ab5b7c91820027ccf4422256f7ae3,2025-03-05T17:15:13.980000 +CVE-2025-1959,0,0,903168fc67c7c5275c7c2870d1ac319422187d69065abf239ddb565e47d12776,2025-03-05T17:15:14.100000 +CVE-2025-1961,0,0,bca97fcfdd845552ca69481196a8059555d85ff9de4d132aae90bef8f0351f80,2025-03-05T17:15:14.220000 +CVE-2025-1962,0,0,710aa406891e8653130d6958a046896a88ec2343aa771ea2ce2bf76c55db1d00,2025-03-05T17:15:14.337000 CVE-2025-1963,0,0,e716dc9db11e4c1f600581dc5831d63020e89d0b334c585d4ffe68d4995bcc15,2025-03-05T16:15:37.307000 CVE-2025-1964,0,0,07710436d9e737e6da480fa71767564d9bba5024aeb8fd1d210868a19af62be9,2025-03-05T01:15:10.020000 CVE-2025-1965,0,0,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b78855204,2025-03-05T15:15:17.107000 @@ -281127,6 +281130,7 @@ CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543 CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000 CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000 +CVE-2025-2003,1,1,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000 @@ -281179,9 +281183,9 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-20204,0,0,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000 CVE-2025-20205,0,0,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000 -CVE-2025-20206,1,1,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb36866f3,2025-03-05T17:15:14.450000 +CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb36866f3,2025-03-05T17:15:14.450000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 -CVE-2025-20208,1,1,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 +CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 @@ -281450,7 +281454,7 @@ CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000 CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000 CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000 -CVE-2025-21355,0,0,fbbb33ae44474f3a12572a93c51f17695f5def15437d1b6b0d2c0bba8998ca0e,2025-02-19T23:15:12.963000 +CVE-2025-21355,0,1,7a3bd7c08e7fa8cfe7141fb458e4393082fe5fb614b47716a343605b5ca5af95,2025-03-05T18:54:18.150000 CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0b95,2025-01-21T19:37:28.987000 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000 @@ -281493,7 +281497,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000 CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 -CVE-2025-21401,0,0,e4d9e7c879800da1629474ad618445ce941bd3b909c5b2d4a6d10765a7fe87ae,2025-02-18T17:15:20.057000 +CVE-2025-21401,0,1,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000 @@ -281737,19 +281741,19 @@ CVE-2025-21739,0,0,744890e3cb1b9afcafda7c757903b6daa82212d794f0c9620286b179d883b CVE-2025-21740,0,0,7249c4b68e96d97177baa5eae9d79ee979e7ed8b572bfb8e81aa81e7f83677fe,2025-02-27T03:15:14.630000 CVE-2025-21741,0,0,df36a0330c927b9091228821306a4f8407b97e29af863546770c389d0454bb68,2025-02-27T03:15:14.730000 CVE-2025-21742,0,0,948b6be9d312397d4e03fb9c5c1c202768d0b546febb18e7cb94d44bd8082a56,2025-02-27T03:15:14.830000 -CVE-2025-21743,0,1,9a9acf545dda075999a27b2c6861db1133404fa1f33a76b52eb77a04cdf73400,2025-03-05T18:47:21.313000 -CVE-2025-21744,0,1,4b24b592f92e54ef2bc8ba435c4dc52efe3ad202fb9364b0c791aa7b879e6019,2025-03-05T18:47:21.313000 -CVE-2025-21745,0,1,bacd274e8d326f43626f4106545cf6113091b8569b7bec5b3c07f641bfe243d8,2025-03-05T18:47:21.313000 +CVE-2025-21743,0,0,9a9acf545dda075999a27b2c6861db1133404fa1f33a76b52eb77a04cdf73400,2025-03-05T18:47:21.313000 +CVE-2025-21744,0,0,4b24b592f92e54ef2bc8ba435c4dc52efe3ad202fb9364b0c791aa7b879e6019,2025-03-05T18:47:21.313000 +CVE-2025-21745,0,0,bacd274e8d326f43626f4106545cf6113091b8569b7bec5b3c07f641bfe243d8,2025-03-05T18:47:21.313000 CVE-2025-21746,0,0,1ee314b044325cb6832b9024139b545954b150d19940e994adf048b94f49bbe9,2025-02-27T13:15:12.240000 CVE-2025-21747,0,0,6400bcce395bf84c52fa3436092d751ea5fa058f369becb0959f791181b26ec2,2025-02-27T03:15:15.337000 -CVE-2025-21748,0,1,b964a4b0ac576b01a488115cdaa0d4697dc2ef94e6ae097aa4d58183b75b70ee,2025-03-05T18:47:21.313000 +CVE-2025-21748,0,0,b964a4b0ac576b01a488115cdaa0d4697dc2ef94e6ae097aa4d58183b75b70ee,2025-03-05T18:47:21.313000 CVE-2025-21749,0,0,eaa9fd0414462e5b49890035dc4e954753ea87ebaa27652098bda7dd71dd80a1,2025-02-27T03:15:15.543000 CVE-2025-21750,0,0,3f89ce029b33cfaec565a43f99a0525c2420236592fa5889e24afe1f380aa9a7,2025-02-27T03:15:15.647000 CVE-2025-21751,0,0,8a197ae6782df801e2a541438b33ed82eebbce4090ab110a58cdcee46734dd2e,2025-02-27T19:15:50.220000 CVE-2025-21752,0,0,c2974074e387a328c8499c10426a3da35c790fc55dbe59575556eba739344dd1,2025-02-27T03:15:15.853000 CVE-2025-21753,0,0,0f56054fada13f570a10fe8b6dd42a0dc420d6c19af58c463804e1b3a3ba75fd,2025-02-27T19:15:50.360000 CVE-2025-21754,0,0,9e143d4e1cc862ca1a82cdd8bdbad7c857fe073fd85407cb24bd1b95b213770f,2025-02-27T03:15:16.050000 -CVE-2025-21755,0,1,7cc3ec63f6725242273f8cbc23eebb3420db3097c40b5fa3bf11ed8a61085403,2025-03-05T18:47:21.313000 +CVE-2025-21755,0,0,7cc3ec63f6725242273f8cbc23eebb3420db3097c40b5fa3bf11ed8a61085403,2025-03-05T18:47:21.313000 CVE-2025-21756,0,0,dc188990e3b8c70a37078365ed81a0191bca4f32ab383180d9de6da4b4bb1c62,2025-02-27T19:15:50.513000 CVE-2025-21757,0,0,0c50a7fe6d1a998d76dd3b3b4c166df239e2743c19dcb58f99495712b43a4902,2025-02-27T03:15:16.353000 CVE-2025-21758,0,0,c2d6cf4c3d839362a58ddb1e93fe02e57279379ea402cdc5a026ab2807420329,2025-02-27T03:15:16.450000 @@ -281763,14 +281767,14 @@ CVE-2025-21765,0,0,91fa7695367ef2a1292f9af15cfffbcc0b7b3e439b4e1dae435b7f14cd84e CVE-2025-21766,0,0,d0367d7cb1d8f614c3b30e8079ee2d659aac2d6d2e7ceb4602ff5eba3167e29e,2025-02-27T03:15:17.273000 CVE-2025-21767,0,0,398faf27cd714380eddf109a4a4ee7ca071cf733f34f2f483126f60537563dda,2025-02-27T03:15:17.383000 CVE-2025-21768,0,0,fab85da59464054a0c06d6abf9fe27a81bd38e6519833028624744556f6d799c,2025-02-27T03:15:17.480000 -CVE-2025-21769,0,1,465a0fd3da4b598eff2632f2705705ae4f861bf8e098c888236f0515d394acfe,2025-03-05T18:47:21.313000 -CVE-2025-21770,0,1,2865c184890e78724cefdb4f589fabf53b5957b5dd3e00eb0e011be22f7f235a,2025-03-05T18:47:21.313000 +CVE-2025-21769,0,0,465a0fd3da4b598eff2632f2705705ae4f861bf8e098c888236f0515d394acfe,2025-03-05T18:47:21.313000 +CVE-2025-21770,0,0,2865c184890e78724cefdb4f589fabf53b5957b5dd3e00eb0e011be22f7f235a,2025-03-05T18:47:21.313000 CVE-2025-21771,0,0,3818d138b8d1343bf0f49f29d7fa35cdcfaf6c6ff91dcd7ac6ca07c094f2ec44,2025-02-27T03:15:17.767000 CVE-2025-21772,0,0,7b5cfa08778d8cc41745844b9b53cf8178cd6b0966cd03b1d4f08be11167b183,2025-02-27T03:15:17.867000 -CVE-2025-21773,0,1,ab430056760c36e1695c5fa9c00fcaaed1b3ab0fb08b952fadd4ec297216523d,2025-03-05T18:47:21.313000 -CVE-2025-21774,0,1,858931aaea3796764a62d299f99fabcd2d9796c2ddaf6dbfa78e3dab0cbfaba7,2025-03-05T18:47:21.313000 -CVE-2025-21775,0,1,21bff2c4f59b589cf6579f23a9a0708f2e5369d184b5e68c20da450df9b049cc,2025-03-05T18:47:21.313000 -CVE-2025-21776,0,1,2285f9f4f1f0489f10c97509d1529eff5f7414a56148324b0566091a37814911,2025-03-05T18:47:21.313000 +CVE-2025-21773,0,0,ab430056760c36e1695c5fa9c00fcaaed1b3ab0fb08b952fadd4ec297216523d,2025-03-05T18:47:21.313000 +CVE-2025-21774,0,0,858931aaea3796764a62d299f99fabcd2d9796c2ddaf6dbfa78e3dab0cbfaba7,2025-03-05T18:47:21.313000 +CVE-2025-21775,0,0,21bff2c4f59b589cf6579f23a9a0708f2e5369d184b5e68c20da450df9b049cc,2025-03-05T18:47:21.313000 +CVE-2025-21776,0,0,2285f9f4f1f0489f10c97509d1529eff5f7414a56148324b0566091a37814911,2025-03-05T18:47:21.313000 CVE-2025-21777,0,0,69b31dc4b94ebf20c66ca6a7fcca7c6a0932ed8d76b3b0b3e936bc24f9114624,2025-02-27T03:15:18.377000 CVE-2025-21778,0,0,f05defc3851911043287d6d6d9a4c2180235c847c966c21650ef64ffb301376e,2025-02-27T03:15:18.533000 CVE-2025-21779,0,0,7f2262822b8af8b72c1f5561d2448abb42a1390f002983fa85f8130af6592d54,2025-02-27T03:15:18.690000 @@ -283629,8 +283633,8 @@ CVE-2025-25330,0,0,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070 CVE-2025-25331,0,0,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000 CVE-2025-25333,0,0,48db7a0795e1d6c60f3c9b54235bb299f37a35fd06d70db1a48b26f45e2b3776,2025-02-27T20:16:05.073000 CVE-2025-25334,0,0,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000 -CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000 -CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 +CVE-2025-25343,0,1,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000 +CVE-2025-25349,0,1,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000 CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6d06,2025-02-14T19:39:33.147000 @@ -283641,7 +283645,7 @@ CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 -CVE-2025-25426,0,1,84bb50c8c6b6e219a0ae287a577f7850da18ad1418a69fecce68e26966885369,2025-03-05T17:15:15.320000 +CVE-2025-25426,0,0,84bb50c8c6b6e219a0ae287a577f7850da18ad1418a69fecce68e26966885369,2025-03-05T17:15:15.320000 CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000 CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 @@ -283705,10 +283709,10 @@ CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314b CVE-2025-25729,0,0,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000 CVE-2025-25730,0,0,5698d9d4b3d086c1c265c033d8b8d6ebf52c1e553b08fab79bfe6eec41adf00a,2025-02-28T20:15:46.803000 CVE-2025-25740,0,0,773eb69d9fa04e004e72a74faf22d133a852d69f49836b1bbebb7a8b7833c66c,2025-02-14T15:15:13.190000 -CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 -CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000 -CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cdf04,2025-02-19T19:02:47.650000 -CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000 +CVE-2025-25741,0,1,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000 +CVE-2025-25742,0,1,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000 +CVE-2025-25743,0,1,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000 +CVE-2025-25744,0,1,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 @@ -283763,12 +283767,12 @@ CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431f CVE-2025-25945,0,0,a135cb8b6e7bd92832108ad425fd681184321fd3911817b0fa3751ad82620c01,2025-02-20T15:15:15.073000 CVE-2025-25946,0,0,dd68555679ad8b07f36b669fbde20639acf7f7115a512ba533c880a157808efa,2025-02-20T15:15:15.227000 CVE-2025-25947,0,0,c7879e4f126007a6472b19a25e66309955a18ccc3104a8ec27cf1080eaf6c736,2025-02-20T15:15:15.530000 -CVE-2025-25948,0,1,c0d45d53d910d217a44b76bcd89bc887e2d47f813f59d9123c9c4e5044437d07,2025-03-05T17:15:15.487000 +CVE-2025-25948,0,0,c0d45d53d910d217a44b76bcd89bc887e2d47f813f59d9123c9c4e5044437d07,2025-03-05T17:15:15.487000 CVE-2025-25949,0,0,29482f12ffd0f2b6fd752f7c5eba6fa6abde4b17a1f82f01edef5f8dee7003ca,2025-03-04T17:15:17.890000 -CVE-2025-25950,0,1,ffd1d8dacd21df5a4530e7d8d066d195d430124e5eed2d4b6c0925ea1b40533c,2025-03-05T17:15:15.647000 +CVE-2025-25950,0,0,ffd1d8dacd21df5a4530e7d8d066d195d430124e5eed2d4b6c0925ea1b40533c,2025-03-05T17:15:15.647000 CVE-2025-25951,0,0,db8b0e1dd6f4e9fc11d938b0110ae2cb606ddf2c5d30cabb88033ad3680ab6fe,2025-03-05T15:15:18.463000 -CVE-2025-25952,0,1,733f7d41a569ab0086bde2648edacf6a1480bd27bad80edec358adfce1ddda98,2025-03-05T18:15:38.050000 -CVE-2025-25953,0,1,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b025,2025-03-05T17:15:15.810000 +CVE-2025-25952,0,0,733f7d41a569ab0086bde2648edacf6a1480bd27bad80edec358adfce1ddda98,2025-03-05T18:15:38.050000 +CVE-2025-25953,0,0,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b025,2025-03-05T17:15:15.810000 CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000 CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000 CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000 @@ -283787,11 +283791,11 @@ CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922ec CVE-2025-26047,0,0,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 CVE-2025-26091,0,0,de888ac48b9f6b5458a595acd54af619dbe9af0acc8f88bc90bf02904e83c7b4,2025-03-04T17:15:18.243000 -CVE-2025-26136,0,1,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec741,2025-03-05T17:15:16.017000 +CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec741,2025-03-05T17:15:16.017000 CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 -CVE-2025-26182,0,0,6a92295a726305134e0425c70d4139d9e04662ca5b2a45afb0e0f0461299a57f,2025-03-04T17:15:18.363000 +CVE-2025-26182,0,1,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000 CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000 CVE-2025-26202,0,0,faf1da73f05d445d952dd532cee33fae2a2ae5a854a8d484ad2405b4354fa0d8,2025-03-05T16:15:40.130000 @@ -283806,9 +283810,9 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000 -CVE-2025-26318,0,1,954b8e579069ffbba2c1644cd56a790bd60e4a5ad19eb604706c56f01984d999,2025-03-05T17:15:16.180000 -CVE-2025-26319,0,1,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a721,2025-03-05T17:15:16.340000 -CVE-2025-26320,0,0,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000 +CVE-2025-26318,0,0,954b8e579069ffbba2c1644cd56a790bd60e4a5ad19eb604706c56f01984d999,2025-03-05T17:15:16.180000 +CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a721,2025-03-05T17:15:16.340000 +CVE-2025-26320,0,1,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000 CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 @@ -284186,23 +284190,26 @@ CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000 CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000 CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369f59,2025-03-04T17:15:20.250000 -CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000 -CVE-2025-27501,0,0,585f2e0737e182b22f02653235a04e243ed477e6e20bf1f8010304d8d76990c5,2025-03-03T19:15:36.300000 +CVE-2025-27500,0,1,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000 +CVE-2025-27501,0,1,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000 CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000 -CVE-2025-27510,0,1,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000 +CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000 +CVE-2025-27513,1,1,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000 +CVE-2025-27515,1,1,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000 +CVE-2025-27517,1,1,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000 CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000 CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 -CVE-2025-27583,0,1,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 +CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 -CVE-2025-27638,0,1,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 -CVE-2025-27639,0,1,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000 -CVE-2025-27640,0,1,b630dc974545d9f67fba85dfa1922285fca382bf7c8ef944014c9ef5e7da0dae,2025-03-05T17:15:17.250000 -CVE-2025-27641,0,1,e00fcfcdda4ca65f506722aa33e3fc2808ef53a5c2f863874f47768f8a9a6a18,2025-03-05T17:15:17.427000 -CVE-2025-27642,0,1,5b8e208a9248521650816b22a37509c58dc012b954572086c7bae255201add83,2025-03-05T17:15:17.603000 +CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 +CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000 +CVE-2025-27640,0,0,b630dc974545d9f67fba85dfa1922285fca382bf7c8ef944014c9ef5e7da0dae,2025-03-05T17:15:17.250000 +CVE-2025-27641,0,0,e00fcfcdda4ca65f506722aa33e3fc2808ef53a5c2f863874f47768f8a9a6a18,2025-03-05T17:15:17.427000 +CVE-2025-27642,0,0,5b8e208a9248521650816b22a37509c58dc012b954572086c7bae255201add83,2025-03-05T17:15:17.603000 CVE-2025-27643,0,0,1e7e42e492f06ba614ed9e1c5091ad093090fe50a4868cf449f85baaf4ea0949,2025-03-05T06:15:35.847000 CVE-2025-27644,0,0,aceda647f9fba77bd6fd5bdb575ee6502574725ea989be8bcb7964e672dbac85,2025-03-05T06:15:35.990000 CVE-2025-27645,0,0,79335b2d00fc3b81c5d00789938fc04e8f3525330ebb50ceab6a6dc7cdef01d0,2025-03-05T06:15:36.117000 @@ -284215,15 +284222,15 @@ CVE-2025-27651,0,0,2268f00520bf4992136d976faa8dc8169a6a419db2460587b8c479b3e1d43 CVE-2025-27652,0,0,5148740c543bf87d5b1166b079693a23ac8922c32846a4339e8b98d0bbf9af12,2025-03-05T06:15:37.077000 CVE-2025-27653,0,0,c5dbd899dc4e9b32ebd02b603edfdedde4876912e079c638e2ef2e2a12af53bd,2025-03-05T16:15:40.880000 CVE-2025-27654,0,0,71bd2de24a90bbf3394e7753a34a6c0e91a286c50c9892093c8520514154b9bb,2025-03-05T16:15:41.043000 -CVE-2025-27655,0,1,09df5001fb7d473c43f0502d38dbd2679fe2955d2231dcc9c0a973db780aec1c,2025-03-05T17:15:17.763000 -CVE-2025-27656,0,1,79f463c80cd6428b35c97c286b7721b5951a1472a8a1ca6306d95e14d25df1c5,2025-03-05T17:15:17.950000 -CVE-2025-27657,0,1,2167ecae42fd6585a4ab304085d1443c83c28fbd46d89fe385db0943ac38826d,2025-03-05T17:15:18.110000 -CVE-2025-27658,0,1,a083ea842525cad1ef1d84fbfa3f1a9173fb521c086ba7fc587ae2fa6a9634d8,2025-03-05T17:15:18.263000 -CVE-2025-27659,0,1,5e324b86618f95ffa1a500d40f256958eb3dbeee62f69fe4aa1d81a61934f9d8,2025-03-05T17:15:18.423000 -CVE-2025-27660,0,1,495fcf6542c9a03bb64a1091d57a0cfd620fcaf798f1b4fe67d475e731c86c38,2025-03-05T17:15:18.573000 -CVE-2025-27661,0,1,077e0a7c9f0328c4a8804f90f903f07a90ac4b28f56f68d85b06a8b026cf7837,2025-03-05T17:15:18.747000 -CVE-2025-27662,0,1,26de84e5d6d05c1ade03ac48d67a789bfae45aae7ac630e401e4cff30f3687c2,2025-03-05T17:15:18.933000 -CVE-2025-27663,0,1,b7f0aadd4cd6e28b1095cd15329f2e0e2629014cd6ac45c04843ac7b6fb8012c,2025-03-05T17:15:19.090000 +CVE-2025-27655,0,0,09df5001fb7d473c43f0502d38dbd2679fe2955d2231dcc9c0a973db780aec1c,2025-03-05T17:15:17.763000 +CVE-2025-27656,0,0,79f463c80cd6428b35c97c286b7721b5951a1472a8a1ca6306d95e14d25df1c5,2025-03-05T17:15:17.950000 +CVE-2025-27657,0,0,2167ecae42fd6585a4ab304085d1443c83c28fbd46d89fe385db0943ac38826d,2025-03-05T17:15:18.110000 +CVE-2025-27658,0,0,a083ea842525cad1ef1d84fbfa3f1a9173fb521c086ba7fc587ae2fa6a9634d8,2025-03-05T17:15:18.263000 +CVE-2025-27659,0,0,5e324b86618f95ffa1a500d40f256958eb3dbeee62f69fe4aa1d81a61934f9d8,2025-03-05T17:15:18.423000 +CVE-2025-27660,0,0,495fcf6542c9a03bb64a1091d57a0cfd620fcaf798f1b4fe67d475e731c86c38,2025-03-05T17:15:18.573000 +CVE-2025-27661,0,0,077e0a7c9f0328c4a8804f90f903f07a90ac4b28f56f68d85b06a8b026cf7837,2025-03-05T17:15:18.747000 +CVE-2025-27662,0,0,26de84e5d6d05c1ade03ac48d67a789bfae45aae7ac630e401e4cff30f3687c2,2025-03-05T17:15:18.933000 +CVE-2025-27663,0,0,b7f0aadd4cd6e28b1095cd15329f2e0e2629014cd6ac45c04843ac7b6fb8012c,2025-03-05T17:15:19.090000 CVE-2025-27664,0,0,2783c537a522312ab4b34337c2271a824caf7a36c61210c1e66b329e00e34a74,2025-03-05T16:15:41.217000 CVE-2025-27665,0,0,a1c30f1d141bf5a0c772b56c1d2031c79a2728572211947b83e103825d5cf842,2025-03-05T06:15:38.840000 CVE-2025-27666,0,0,6c9cc4a29e2417a709d6ef0cd4cd75ec3ebb86d235a3f6c61ace5d7f64120945,2025-03-05T06:15:38.970000