From 7e8738e16793f8114d43577a450d500d896821c4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Feb 2025 21:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-02-28T21:00:20.769370+00:00 --- CVE-2020/CVE-2020-09xx/CVE-2020-0954.json | 32 ++- CVE-2020/CVE-2020-09xx/CVE-2020-0973.json | 32 ++- CVE-2020/CVE-2020-09xx/CVE-2020-0978.json | 32 ++- CVE-2020/CVE-2020-10xx/CVE-2020-1055.json | 32 ++- CVE-2020/CVE-2020-10xx/CVE-2020-1099.json | 32 ++- CVE-2020/CVE-2020-11xx/CVE-2020-1100.json | 32 ++- CVE-2020/CVE-2020-11xx/CVE-2020-1101.json | 32 ++- CVE-2020/CVE-2020-11xx/CVE-2020-1106.json | 32 ++- CVE-2020/CVE-2020-11xx/CVE-2020-1177.json | 32 ++- CVE-2020/CVE-2020-11xx/CVE-2020-1183.json | 32 ++- CVE-2020/CVE-2020-12xx/CVE-2020-1297.json | 32 ++- CVE-2020/CVE-2020-12xx/CVE-2020-1298.json | 32 ++- CVE-2020/CVE-2020-13xx/CVE-2020-1318.json | 32 ++- CVE-2020/CVE-2020-13xx/CVE-2020-1320.json | 32 ++- CVE-2020/CVE-2020-14xx/CVE-2020-1450.json | 32 ++- CVE-2020/CVE-2020-14xx/CVE-2020-1451.json | 32 ++- CVE-2020/CVE-2020-14xx/CVE-2020-1454.json | 32 ++- CVE-2020/CVE-2020-14xx/CVE-2020-1456.json | 32 ++- CVE-2021/CVE-2021-311xx/CVE-2021-31173.json | 12 +- CVE-2021/CVE-2021-311xx/CVE-2021-31195.json | 12 +- CVE-2021/CVE-2021-312xx/CVE-2021-31209.json | 12 +- CVE-2021/CVE-2021-319xx/CVE-2021-31937.json | 14 +- CVE-2022/CVE-2022-204xx/CVE-2022-20467.json | 22 +- CVE-2022/CVE-2022-204xx/CVE-2022-20499.json | 22 +- CVE-2022/CVE-2022-205xx/CVE-2022-20532.json | 32 ++- CVE-2022/CVE-2022-205xx/CVE-2022-20542.json | 32 ++- CVE-2022/CVE-2022-301xx/CVE-2022-30184.json | 12 +- CVE-2023/CVE-2023-217xx/CVE-2023-21719.json | 14 +- CVE-2023/CVE-2023-217xx/CVE-2023-21794.json | 14 +- CVE-2023/CVE-2023-245xx/CVE-2023-24533.json | 22 +- CVE-2023/CVE-2023-248xx/CVE-2023-24892.json | 14 +- CVE-2023/CVE-2023-249xx/CVE-2023-24935.json | 14 +- CVE-2023/CVE-2023-278xx/CVE-2023-27898.json | 32 ++- CVE-2023/CVE-2023-278xx/CVE-2023-27899.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27900.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27901.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27902.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27903.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27904.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27905.json | 32 ++- CVE-2023/CVE-2023-282xx/CVE-2023-28261.json | 14 +- CVE-2023/CVE-2023-282xx/CVE-2023-28284.json | 14 +- CVE-2023/CVE-2023-282xx/CVE-2023-28286.json | 14 +- CVE-2023/CVE-2023-283xx/CVE-2023-28301.json | 14 +- CVE-2023/CVE-2023-293xx/CVE-2023-29333.json | 14 +- CVE-2023/CVE-2023-293xx/CVE-2023-29334.json | 14 +- CVE-2023/CVE-2023-293xx/CVE-2023-29354.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33140.json | 14 +- CVE-2023/CVE-2023-353xx/CVE-2023-35392.json | 14 +- CVE-2023/CVE-2023-360xx/CVE-2023-36022.json | 12 +- CVE-2023/CVE-2023-360xx/CVE-2023-36024.json | 12 +- CVE-2023/CVE-2023-367xx/CVE-2023-36769.json | 12 +- CVE-2023/CVE-2023-368xx/CVE-2023-36883.json | 14 +- CVE-2023/CVE-2023-368xx/CVE-2023-36888.json | 14 +- CVE-2023/CVE-2023-368xx/CVE-2023-36894.json | 14 +- CVE-2023/CVE-2023-381xx/CVE-2023-38157.json | 14 +- CVE-2023/CVE-2023-381xx/CVE-2023-38158.json | 14 +- CVE-2023/CVE-2023-381xx/CVE-2023-38173.json | 14 +- CVE-2023/CVE-2023-381xx/CVE-2023-38187.json | 14 +- CVE-2024/CVE-2024-134xx/CVE-2024-13488.json | 62 ++++- CVE-2024/CVE-2024-570xx/CVE-2024-57034.json | 70 ++++- CVE-2024/CVE-2024-570xx/CVE-2024-57035.json | 70 ++++- CVE-2024/CVE-2024-579xx/CVE-2024-57943.json | 100 ++++++- CVE-2024/CVE-2024-579xx/CVE-2024-57946.json | 159 ++++++++++- CVE-2025/CVE-2025-01xx/CVE-2025-0159.json | 56 ++++ CVE-2025/CVE-2025-01xx/CVE-2025-0160.json | 56 ++++ CVE-2025/CVE-2025-03xx/CVE-2025-0364.json | 6 +- CVE-2025/CVE-2025-07xx/CVE-2025-0769.json | 82 ++++++ CVE-2025/CVE-2025-09xx/CVE-2025-0938.json | 50 ++-- CVE-2025/CVE-2025-13xx/CVE-2025-1335.json | 103 +++++-- CVE-2025/CVE-2025-13xx/CVE-2025-1336.json | 102 +++++-- CVE-2025/CVE-2025-14xx/CVE-2025-1441.json | 59 +++- CVE-2025/CVE-2025-15xx/CVE-2025-1578.json | 122 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1581.json | 121 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1583.json | 121 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1586.json | 122 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1588.json | 121 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1589.json | 116 ++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1590.json | 116 ++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1591.json | 116 ++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1592.json | 116 ++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1593.json | 116 ++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1596.json | 122 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1597.json | 122 +++++++-- CVE-2025/CVE-2025-15xx/CVE-2025-1598.json | 122 +++++++-- CVE-2025/CVE-2025-17xx/CVE-2025-1795.json | 90 +++++++ CVE-2025/CVE-2025-216xx/CVE-2025-21661.json | 100 ++++++- CVE-2025/CVE-2025-232xx/CVE-2025-23218.json | 91 +++++-- CVE-2025/CVE-2025-232xx/CVE-2025-23219.json | 91 +++++-- CVE-2025/CVE-2025-232xx/CVE-2025-23220.json | 91 +++++-- CVE-2025/CVE-2025-254xx/CVE-2025-25428.json | 21 ++ CVE-2025/CVE-2025-254xx/CVE-2025-25429.json | 21 ++ CVE-2025/CVE-2025-256xx/CVE-2025-25609.json | 21 ++ CVE-2025/CVE-2025-256xx/CVE-2025-25610.json | 21 ++ CVE-2025/CVE-2025-256xx/CVE-2025-25635.json | 21 ++ CVE-2025/CVE-2025-257xx/CVE-2025-25730.json | 6 +- CVE-2025/CVE-2025-266xx/CVE-2025-26606.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26607.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26608.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26609.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26610.json | 86 ++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26611.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26612.json | 86 ++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26613.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26614.json | 86 ++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26615.json | 58 +++- CVE-2025/CVE-2025-266xx/CVE-2025-26616.json | 96 +++++-- CVE-2025/CVE-2025-266xx/CVE-2025-26617.json | 96 +++++-- CVE-2025/CVE-2025-270xx/CVE-2025-27096.json | 86 ++++-- README.md | 81 +++--- _state.csv | 281 ++++++++++---------- 111 files changed, 4929 insertions(+), 1025 deletions(-) create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0159.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0160.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0769.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1795.json create mode 100644 CVE-2025/CVE-2025-254xx/CVE-2025-25428.json create mode 100644 CVE-2025/CVE-2025-254xx/CVE-2025-25429.json create mode 100644 CVE-2025/CVE-2025-256xx/CVE-2025-25609.json create mode 100644 CVE-2025/CVE-2025-256xx/CVE-2025-25610.json create mode 100644 CVE-2025/CVE-2025-256xx/CVE-2025-25635.json diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0954.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0954.json index 4fa03aeee57..22f2841e812 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0954.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0954.json @@ -2,7 +2,7 @@ "id": "CVE-2020-0954", "sourceIdentifier": "secure@microsoft.com", "published": "2020-04-15T15:15:17.417", - "lastModified": "2024-11-21T04:54:32.017", + "lastModified": "2025-02-28T20:15:35.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0973.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0973.json index cb02fbc7782..cb9fc23bb36 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0973.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0973.json @@ -2,7 +2,7 @@ "id": "CVE-2020-0973", "sourceIdentifier": "secure@microsoft.com", "published": "2020-04-15T15:15:18.387", - "lastModified": "2024-11-21T04:54:34.420", + "lastModified": "2025-02-28T20:15:35.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0978.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0978.json index ead2e02808a..d762053913b 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0978.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0978.json @@ -2,7 +2,7 @@ "id": "CVE-2020-0978", "sourceIdentifier": "secure@microsoft.com", "published": "2020-04-15T15:15:18.683", - "lastModified": "2024-11-21T04:54:34.970", + "lastModified": "2025-02-28T20:15:35.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-10xx/CVE-2020-1055.json b/CVE-2020/CVE-2020-10xx/CVE-2020-1055.json index 970885f4d1b..0fa89573d42 100644 --- a/CVE-2020/CVE-2020-10xx/CVE-2020-1055.json +++ b/CVE-2020/CVE-2020-10xx/CVE-2020-1055.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1055", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:12.133", - "lastModified": "2024-11-21T05:09:39.197", + "lastModified": "2025-02-28T20:15:35.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-10xx/CVE-2020-1099.json b/CVE-2020/CVE-2020-10xx/CVE-2020-1099.json index 945a529a099..9b6cc936552 100644 --- a/CVE-2020/CVE-2020-10xx/CVE-2020-1099.json +++ b/CVE-2020/CVE-2020-10xx/CVE-2020-1099.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1099", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:14.180", - "lastModified": "2024-11-21T05:09:44.763", + "lastModified": "2025-02-28T20:15:35.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-11xx/CVE-2020-1100.json b/CVE-2020/CVE-2020-11xx/CVE-2020-1100.json index dd822b9c46f..a5cbf33b18a 100644 --- a/CVE-2020/CVE-2020-11xx/CVE-2020-1100.json +++ b/CVE-2020/CVE-2020-11xx/CVE-2020-1100.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1100", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:14.257", - "lastModified": "2024-11-21T05:09:44.880", + "lastModified": "2025-02-28T20:15:36.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-11xx/CVE-2020-1101.json b/CVE-2020/CVE-2020-11xx/CVE-2020-1101.json index 3fe2f8b4e31..1c5d6f71f04 100644 --- a/CVE-2020/CVE-2020-11xx/CVE-2020-1101.json +++ b/CVE-2020/CVE-2020-11xx/CVE-2020-1101.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1101", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:14.337", - "lastModified": "2024-11-21T05:09:44.993", + "lastModified": "2025-02-28T20:15:36.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-11xx/CVE-2020-1106.json b/CVE-2020/CVE-2020-11xx/CVE-2020-1106.json index 2b4a5cf1010..f8c6fcf3d6b 100644 --- a/CVE-2020/CVE-2020-11xx/CVE-2020-1106.json +++ b/CVE-2020/CVE-2020-11xx/CVE-2020-1106.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1106", "sourceIdentifier": "secure@microsoft.com", "published": "2020-05-21T23:15:14.727", - "lastModified": "2024-11-21T05:09:45.563", + "lastModified": "2025-02-28T20:15:36.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-11xx/CVE-2020-1177.json b/CVE-2020/CVE-2020-11xx/CVE-2020-1177.json index 57685365714..8d6385f899a 100644 --- a/CVE-2020/CVE-2020-11xx/CVE-2020-1177.json +++ b/CVE-2020/CVE-2020-11xx/CVE-2020-1177.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1177", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:12.710", - "lastModified": "2024-11-21T05:09:54.793", + "lastModified": "2025-02-28T20:15:36.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-11xx/CVE-2020-1183.json b/CVE-2020/CVE-2020-11xx/CVE-2020-1183.json index d35a89c7dbb..0bcd73dbfb1 100644 --- a/CVE-2020/CVE-2020-11xx/CVE-2020-1183.json +++ b/CVE-2020/CVE-2020-11xx/CVE-2020-1183.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1183", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:13.240", - "lastModified": "2024-11-21T05:09:55.550", + "lastModified": "2025-02-28T20:15:36.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-12xx/CVE-2020-1297.json b/CVE-2020/CVE-2020-12xx/CVE-2020-1297.json index 98b763cdd58..73b5359d019 100644 --- a/CVE-2020/CVE-2020-12xx/CVE-2020-1297.json +++ b/CVE-2020/CVE-2020-12xx/CVE-2020-1297.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1297", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:19.600", - "lastModified": "2024-11-21T05:10:11.423", + "lastModified": "2025-02-28T20:15:36.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-12xx/CVE-2020-1298.json b/CVE-2020/CVE-2020-12xx/CVE-2020-1298.json index 7ca55b2acf5..6d631b296cc 100644 --- a/CVE-2020/CVE-2020-12xx/CVE-2020-1298.json +++ b/CVE-2020/CVE-2020-12xx/CVE-2020-1298.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1298", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:19.663", - "lastModified": "2024-11-21T05:10:11.547", + "lastModified": "2025-02-28T20:15:37.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-13xx/CVE-2020-1318.json b/CVE-2020/CVE-2020-13xx/CVE-2020-1318.json index 032324e773c..17d6f39194a 100644 --- a/CVE-2020/CVE-2020-13xx/CVE-2020-1318.json +++ b/CVE-2020/CVE-2020-13xx/CVE-2020-1318.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1318", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:21.117", - "lastModified": "2024-11-21T05:10:14.317", + "lastModified": "2025-02-28T20:15:37.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-13xx/CVE-2020-1320.json b/CVE-2020/CVE-2020-13xx/CVE-2020-1320.json index e463fdb269d..d33cdc250a1 100644 --- a/CVE-2020/CVE-2020-13xx/CVE-2020-1320.json +++ b/CVE-2020/CVE-2020-13xx/CVE-2020-1320.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1320", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:21.193", - "lastModified": "2024-11-21T05:10:14.603", + "lastModified": "2025-02-28T20:15:37.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1450.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1450.json index 21dd81e4712..040240f5372 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1450.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1450.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1450", "sourceIdentifier": "secure@microsoft.com", "published": "2020-07-14T23:15:20.150", - "lastModified": "2024-11-21T05:10:34.547", + "lastModified": "2025-02-28T20:15:37.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1451.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1451.json index c491cb4b2d9..ec6c37a3556 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1451.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1451.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1451", "sourceIdentifier": "secure@microsoft.com", "published": "2020-07-14T23:15:20.247", - "lastModified": "2024-11-21T05:10:34.667", + "lastModified": "2025-02-28T20:15:37.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1454.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1454.json index cd75ae12655..e0a9817885a 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1454.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1454.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1454", "sourceIdentifier": "secure@microsoft.com", "published": "2020-07-14T23:15:20.323", - "lastModified": "2024-11-21T05:10:35.097", + "lastModified": "2025-02-28T20:15:37.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-14xx/CVE-2020-1456.json b/CVE-2020/CVE-2020-14xx/CVE-2020-1456.json index 75f237575b9..d1194c6217f 100644 --- a/CVE-2020/CVE-2020-14xx/CVE-2020-1456.json +++ b/CVE-2020/CVE-2020-14xx/CVE-2020-1456.json @@ -2,7 +2,7 @@ "id": "CVE-2020-1456", "sourceIdentifier": "secure@microsoft.com", "published": "2020-07-14T23:15:20.387", - "lastModified": "2024-11-21T05:10:35.333", + "lastModified": "2025-02-28T20:15:38.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31173.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31173.json index 6911f7e0576..8f23bae335b 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31173.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31173.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31173", "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:09.560", - "lastModified": "2024-11-21T06:05:14.020", + "lastModified": "2025-02-28T20:15:38.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-311xx/CVE-2021-31195.json b/CVE-2021/CVE-2021-311xx/CVE-2021-31195.json index 08c9f649af9..d232d627723 100644 --- a/CVE-2021/CVE-2021-311xx/CVE-2021-31195.json +++ b/CVE-2021/CVE-2021-311xx/CVE-2021-31195.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31195", "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:10.227", - "lastModified": "2024-11-21T06:05:16.940", + "lastModified": "2025-02-28T20:15:38.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-312xx/CVE-2021-31209.json b/CVE-2021/CVE-2021-312xx/CVE-2021-31209.json index 8eb5f38d207..025e4058ef2 100644 --- a/CVE-2021/CVE-2021-312xx/CVE-2021-31209.json +++ b/CVE-2021/CVE-2021-312xx/CVE-2021-31209.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31209", "sourceIdentifier": "secure@microsoft.com", "published": "2021-05-11T19:15:10.467", - "lastModified": "2024-11-21T06:05:18.523", + "lastModified": "2025-02-28T20:15:38.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,6 +94,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json b/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json index f93e38abe32..999605ed955 100644 --- a/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json +++ b/CVE-2021/CVE-2021-319xx/CVE-2021-31937.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31937", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-28T18:15:11.543", - "lastModified": "2024-11-21T06:06:33.127", + "lastModified": "2025-02-28T20:15:38.843", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20467.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20467.json index d57b6b6ae8d..db7e8c55c0d 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20467.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20467.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20467", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:08.583", - "lastModified": "2024-11-21T06:42:52.020", + "lastModified": "2025-02-28T20:15:38.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20499.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20499.json index cd57c489f9d..3f92e724639 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20499.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20499.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20499", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:08.643", - "lastModified": "2024-11-21T06:42:55.867", + "lastModified": "2025-02-28T20:15:39.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20532.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20532.json index 23b148f864d..4d352a2b860 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20532.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20532.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20532", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:08.690", - "lastModified": "2024-11-21T06:42:59.750", + "lastModified": "2025-02-28T20:15:39.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-205xx/CVE-2022-20542.json b/CVE-2022/CVE-2022-205xx/CVE-2022-20542.json index 44bd293bb24..145cae5e99e 100644 --- a/CVE-2022/CVE-2022-205xx/CVE-2022-20542.json +++ b/CVE-2022/CVE-2022-205xx/CVE-2022-20542.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20542", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:08.743", - "lastModified": "2024-11-21T06:43:00.947", + "lastModified": "2025-02-28T20:15:39.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json index 7f98779f6e0..227a4075070 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30184.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30184", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-15T22:15:15.370", - "lastModified": "2025-01-02T19:16:21.950", + "lastModified": "2025-02-28T20:15:39.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json index f70633cdf33..bf4fb1262a9 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21719.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21719", "sourceIdentifier": "secure@microsoft.com", "published": "2023-01-24T00:15:10.497", - "lastModified": "2025-01-01T01:15:19.883", + "lastModified": "2025-02-28T20:15:39.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -69,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json index f000b568da2..90ea976caa9 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21794", "sourceIdentifier": "secure@microsoft.com", "published": "2023-02-14T20:15:14.950", - "lastModified": "2025-01-01T01:15:28.320", + "lastModified": "2025-02-28T20:15:40.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "CWE-290" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24533.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24533.json index 9254b54f1a8..3193b9eac09 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24533.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24533.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24533", "sourceIdentifier": "security@golang.org", "published": "2023-03-08T20:15:09.497", - "lastModified": "2024-11-21T07:48:04.520", + "lastModified": "2025-02-28T20:15:40.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json index 325ed4dabb7..2d253a2f23f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24892.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24892", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:18.197", - "lastModified": "2024-11-21T07:48:43.293", + "lastModified": "2025-02-28T20:15:41.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", @@ -65,6 +65,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json index 1d8255e83ac..422f6f734cc 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24935.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24935", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:20.613", - "lastModified": "2024-11-21T07:48:47.897", + "lastModified": "2025-02-28T20:15:41.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -65,6 +65,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27898.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27898.json index 3600f74f88c..771b5d40de5 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27898.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27898.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27898", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.403", - "lastModified": "2024-11-21T07:53:39.583", + "lastModified": "2025-02-28T19:15:34.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27899.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27899.json index 5246f65941c..6af8f769093 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27899.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27899.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27899", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.460", - "lastModified": "2024-11-21T07:53:39.690", + "lastModified": "2025-02-28T19:15:35.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27900.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27900.json index 0e07dd59dc8..b61dfaf7363 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27900.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27900.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27900", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.517", - "lastModified": "2024-11-21T07:53:39.810", + "lastModified": "2025-02-28T19:15:35.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27901.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27901.json index a303793d026..b6c5219f1f2 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27901.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27901.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27901", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.573", - "lastModified": "2024-11-21T07:53:39.910", + "lastModified": "2025-02-28T19:15:35.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27902.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27902.json index 02d3f9a6477..efa459bd612 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27902.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27902.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27902", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.627", - "lastModified": "2024-11-21T07:53:40.020", + "lastModified": "2025-02-28T19:15:35.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27903.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27903.json index 640879ac4cd..7856a6c6caf 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27903.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27903.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27903", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.677", - "lastModified": "2024-11-21T07:53:40.133", + "lastModified": "2025-02-28T19:15:35.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27904.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27904.json index 23b68821275..42a70d0ad5f 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27904.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27904.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27904", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.733", - "lastModified": "2024-11-21T07:53:40.247", + "lastModified": "2025-02-28T19:15:35.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27905.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27905.json index 52fdfd88bb4..9056115c5c7 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27905.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27905.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27905", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-03-10T21:15:15.790", - "lastModified": "2024-11-21T07:53:40.353", + "lastModified": "2025-02-28T19:15:36.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json index 97f470dcf39..3cbafef7ac0 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28261", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-27T19:15:20.350", - "lastModified": "2025-01-01T01:15:44.280", + "lastModified": "2025-02-28T20:15:42.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json index faf74bad6cc..5bca8d0cc15 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28284.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28284", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:26.817", - "lastModified": "2024-11-21T07:54:45.420", + "lastModified": "2025-02-28T20:15:42.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json index 7d369a2db6c..dc95892de62 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28286", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-27T19:15:20.467", - "lastModified": "2025-01-01T01:15:44.420", + "lastModified": "2025-02-28T20:15:42.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json index 95968c55c48..865b886d4c8 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28301", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:27.840", - "lastModified": "2024-11-21T07:54:47.467", + "lastModified": "2025-02-28T20:15:42.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json index 258b897c0d9..f12d83bc85e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29333", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.727", - "lastModified": "2024-11-21T07:56:52.937", + "lastModified": "2025-02-28T20:15:42.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json index ae11ac85c53..41dd396d5ab 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29334", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-28T18:15:26.390", - "lastModified": "2025-01-01T02:15:32.397", + "lastModified": "2025-02-28T20:15:42.943", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json index 852190a115e..8d0ee5dec82 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29354", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-05T23:15:09.333", - "lastModified": "2025-01-01T02:15:34.737", + "lastModified": "2025-02-28T20:15:43.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json index 4524febd553..92518cbae39 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33140.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33140", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:12.433", - "lastModified": "2024-11-21T08:04:58.230", + "lastModified": "2025-02-28T20:15:43.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json index b4d888ec701..91802496ab6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35392.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35392", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-21T18:15:10.247", - "lastModified": "2024-11-21T08:08:22.520", + "lastModified": "2025-02-28T20:15:44.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json index 5062257ddcf..0d09c9fa9b5 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36022", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-03T01:15:07.907", - "lastModified": "2025-01-01T03:15:13.217", + "lastModified": "2025-02-28T20:15:44.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json index a080762cec7..fb526926c27 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36024", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-10T00:15:08.840", - "lastModified": "2024-11-21T08:09:11.680", + "lastModified": "2025-02-28T20:15:44.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36769.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36769.json index 3b95ef3fbcd..400b5a774c9 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36769.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36769.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36769", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-06T23:15:10.373", - "lastModified": "2024-11-21T08:10:33.830", + "lastModified": "2025-02-28T20:15:45.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json index 86a9f75139b..36268571101 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36883.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36883", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-14T18:15:10.627", - "lastModified": "2024-11-21T08:10:50.363", + "lastModified": "2025-02-28T20:15:45.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json index 64c35cca27a..cd086a57772 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36888.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36888", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-14T18:15:10.750", - "lastModified": "2024-11-21T08:10:50.910", + "lastModified": "2025-02-28T20:15:45.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json index 53f65ebe483..c4e58b8bd57 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36894.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36894", "sourceIdentifier": "secure@microsoft.com", "published": "2023-08-08T18:15:15.633", - "lastModified": "2024-11-21T08:10:51.730", + "lastModified": "2025-02-28T20:15:45.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json index 98255187787..0524dae0140 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38157.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38157", "sourceIdentifier": "secure@microsoft.com", "published": "2023-08-07T18:15:09.877", - "lastModified": "2024-11-21T08:12:58.713", + "lastModified": "2025-02-28T20:15:45.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json index 177da3ad716..d4bf6c5425b 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38158.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38158", "sourceIdentifier": "secure@microsoft.com", "published": "2023-08-21T20:15:08.737", - "lastModified": "2024-11-21T08:12:58.837", + "lastModified": "2025-02-28T20:15:45.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json index 03e4567ee71..eb561097e8e 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38173.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38173", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-21T18:15:10.347", - "lastModified": "2024-11-21T08:13:00.757", + "lastModified": "2025-02-28T20:15:45.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json index c71fe8e7bb8..4050976f4c6 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38187.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38187", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-21T18:15:10.420", - "lastModified": "2024-11-21T08:13:02.403", + "lastModified": "2025-02-28T20:15:46.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json index a13a3929f23..5fcfd92b13f 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13488", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-15T12:15:30.457", - "lastModified": "2025-02-15T12:15:30.457", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:47:07.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:estes:wordpress:*:*", + "versionEndExcluding": "3.3.8", + "matchCriteriaId": "D40F5D91-45B5-4EBE-B930-012FFE3C2CD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-estes-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L250", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-estes-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L364", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3239967%40ltl-freight-quotes-estes-edition&new=3239967%40ltl-freight-quotes-estes-edition&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b77b064d-ab8c-4e84-b5cc-efbdeefbf502?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json index f9e1102d00e..b2135d37797 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57034", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T20:15:29.020", - "lastModified": "2025-02-18T21:15:23.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T19:16:13.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "WeGIA < 3.2.0 es vulnerable a la inyecci\u00f3n SQL en query_geracao_auto.php a trav\u00e9s del par\u00e1metro de consulta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.0", + "matchCriteriaId": "F250BE2A-E47B-44B6-B352-13F0BA6C44DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57034", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wegia.org", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json index 392f0956d2a..ed087c635c3 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57035", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T21:15:10.100", - "lastModified": "2025-02-18T21:15:23.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T19:16:13.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "WeGIA v3.2.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro nextPage en /controle/control.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:3.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0071E4AD-1CE5-4E69-ABB0-94C615FDC583" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nilsonLazarin/WeGIA/issues/827", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json index 4227b3d61da..00f2bb5786f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57943", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-21T13:15:08.837", - "lastModified": "2025-01-21T13:15:08.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T18:59:45.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,105 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: se corrige que el nuevo b\u00fafer no se pusiera a cero antes de escribir. Antes de escribir, si un buffer_head est\u00e1 marcado como nuevo, sus datos deben ponerse a cero; de lo contrario, se escribir\u00e1n datos no inicializados en la cach\u00e9 de p\u00e1ginas. Por lo tanto, esta confirmaci\u00f3n utiliza folio_zero_new_buffers() para poner a cero los nuevos b\u00faferes antes de ->write_end()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "CAA666EC-CF76-46C6-AE86-951E128D4C0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/942c6f91ab8d82a41650e717940b4e577173762f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98e2fb26d1a9eafe79f46d15d54e68e014d81d8c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json index 425d83a97a8..2cf26408003 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57946", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-21T13:15:09.137", - "lastModified": "2025-01-21T13:15:09.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T18:59:45.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,174 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-blk: no mantener la cola congelada durante la suspensi\u00f3n del sistema. Commit 4ce6e2db00de (\"virtio-blk: Aseg\u00farese de que no haya solicitudes en virtqueues antes de eliminar vqs\") reemplaza la inactividad de la cola con el congelamiento de la cola en las devoluciones de llamadas de PM de virtio-blk. Y la motivaci\u00f3n es drenar las E/S en vuelo antes de suspender. El congelamiento de la cola de la capa de bloque parece muy \u00fatil, pero tambi\u00e9n es f\u00e1cil causar un bloqueo, como, por ejemplo, cualquier intento de llamar a bio_queue_enter() puede encontrarse con un bloqueo si la cola est\u00e1 congelada en el contexto actual. Hay todo tipo de ->suspend() llamados en el contexto de suspensi\u00f3n, por lo que mantener la cola congelada en todo el contexto de suspensi\u00f3n no es una buena idea. Y Marek inform\u00f3 una advertencia de lockdep[1] causada por la cola congelada de virtio-blk en virtblk_freeze(). [1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/ Dado que la motivaci\u00f3n es drenar las E/S en vuelo, se puede hacer llamando a congelar y descongelar, mientras tanto restaurar el comportamiento anterior manteniendo la cola inactiva durante la suspensi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.289", + "matchCriteriaId": "EA819787-BFBA-4C7B-80F4-E74FF26CFE9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.233", + "matchCriteriaId": "44569A17-FE4C-4BE3-9C0C-74AC54C7B51B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.176", + "matchCriteriaId": "DDBD8FC6-2357-4347-BFA1-B4A4A3039F35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.123", + "matchCriteriaId": "C6F5378E-B1C8-402E-A256-91DD0F6C30C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json new file mode 100644 index 00000000000..8dc738b38ea --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0159", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-28T19:15:36.243", + "lastModified": "2025-02-28T19:15:36.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7184182", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json new file mode 100644 index 00000000000..7bc65a01254 --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0160", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-28T19:15:36.393", + "lastModified": "2025-02-28T19:15:36.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-114" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7184182", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json index e35ea4a54a2..3f9cf2586a2 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0364.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0364", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-02-04T18:15:35.067", - "lastModified": "2025-02-04T18:15:35.067", + "lastModified": "2025-02-28T20:15:46.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://vulncheck.com/advisories/big-ant-upload-rce", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/vulncheck-oss/cve-2025-0364", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json new file mode 100644 index 00000000000..92d445b173a --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0769.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-0769", + "sourceIdentifier": "help@fluidattacks.com", + "published": "2025-02-28T20:15:46.440", + "lastModified": "2025-02-28T20:15:46.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PixelYourSite - Your smart PIXEL (TAG) and API Manager 10.1.1.1 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/modules/facebook/facebook-server-a sync-task.php." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "help@fluidattacks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "help@fluidattacks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://co.wordpress.org/plugins/pixelyoursite/#developers", + "source": "help@fluidattacks.com" + }, + { + "url": "https://fluidattacks.com/advisories/skims-23/", + "source": "help@fluidattacks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0938.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0938.json index 6db8efe7921..33898cb9dec 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0938.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0938.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0938", "sourceIdentifier": "cna@python.org", "published": "2025-01-31T18:15:38.053", - "lastModified": "2025-02-04T21:15:27.543", + "lastModified": "2025-02-28T20:15:46.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -30,30 +30,30 @@ "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "LOW", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403", "source": "cna@python.org" @@ -82,10 +86,18 @@ "url": "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/105704", "source": "cna@python.org" diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json index 8c6416c8283..c7a8f388474 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1335", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T04:15:23.230", - "lastModified": "2025-02-16T04:15:23.230", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:47:07.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295950", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295950", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.493682", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json index b2635ff0192..3193053d9a0 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1336", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T09:15:09.347", - "lastModified": "2025-02-16T09:15:09.347", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:47:07.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.295951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.493685", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json index 7dd491089fa..f46043cb232 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1441", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T05:15:12.050", - "lastModified": "2025-02-19T05:15:12.050", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:47:07.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.1007", + "matchCriteriaId": "FAF3BE79-D4B4-41D5-8A3A-64CEEC21C74E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1007/classes/modules/wpr-filter-woo-products.php#L1895", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1008/classes/modules/wpr-filter-woo-products.php#L1904", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bc6a436-6df3-4eaf-a16b-d8b3c3ca7d87?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1578.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1578.json index b6c5bf8191c..29a589bf770 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1578.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1578.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1578", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T08:15:08.187", - "lastModified": "2025-02-23T08:15:08.187", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Online Shopping Portal 2.1. This affects an unknown part of the file /search-result.php. The manipulation of the argument product leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Online Shopping Portal 2.1. Afecta a una parte desconocida del archivo /search-result.php. La manipulaci\u00f3n del argumento product provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_shopping_portal:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EF35CC2E-1CB6-401B-B896-9033F6C5C4C7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/panghuanjie/Code-audits/blob/main/PHPGurukul%20Online%20Shopping%20Portal%20v2.1%20Foreground%20SQL%20Injection%20Vulnerability2.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.296553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.502391", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1581.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1581.json index 178e96d751b..d3cd7b96357 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1581.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1581.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1581", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T11:15:09.247", - "lastModified": "2025-02-23T11:15:09.247", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Online Nurse Hiring System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /book-nurse.php?bookid=1. The manipulation of the argument contactname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Online Nurse Hiring System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /book-nurse.php?bookid=1. La manipulaci\u00f3n del argumento contactname conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wqywfvc/CVE/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.296557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.504450", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1583.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1583.json index fac72c290dc..0cdc3b94cc3 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1583.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1583.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1583", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T12:15:09.550", - "lastModified": "2025-02-23T12:15:09.550", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Online Nurse Hiring System 1.0. This affects an unknown part of the file /admin/search-report-details.php. The manipulation of the argument searchinput leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Online Nurse Hiring System 1.0. Afecta a una parte desconocida del archivo /admin/search-report-details.php. La manipulaci\u00f3n del argumento searchinput provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wqywfvc/CVE/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.296559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.504452", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1586.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1586.json index 598e975c5e3..b9a83f406a9 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1586.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1586.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1586", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T15:15:09.407", - "lastModified": "2025-02-23T15:15:09.407", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:36:29.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /Blood/A-.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /Blood/A-.php. La manipulaci\u00f3n del argumento Bloodname conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1337g/bloodbanksystem_poc/blob/main/xss-gu(1).pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.505124", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1588.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1588.json index 805a6c699a9..601acecd2bb 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1588.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1588.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1588", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T16:15:08.637", - "lastModified": "2025-02-23T16:15:08.637", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Online Nurse Hiring System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/manage-nurse.php. The manipulation of the argument profilepic leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting vulnerability classes." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Online Nurse Hiring System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/manage-nurse.php. La manipulaci\u00f3n del argumento profilepic lleva a path traversal: '../filedir'. El ataque se puede iniciar de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona clases de vulnerabilidad contradictorias." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -118,28 +142,73 @@ "value": "CWE-24" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wqywfvc/CVE/issues/16", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.296572", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296572", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.505441", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json index 018d3ff1bff..11a63f3bec3 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1589.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1589", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T18:15:08.427", - "lastModified": "2025-02-23T18:15:08.427", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester E-Learning System 1.0 and classified as problematic. This issue affects some unknown processing of the file /register.php of the component User Registration Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester E-Learning System 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /register.php del componente User Registration Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:e-learning_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D92133-21C1-489C-B3D8-6B5EE506BC1E" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.296573", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296573", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.504039", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1590.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1590.json index 9b6f1e1c65b..df8364d461c 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1590.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1590.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1590", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T19:15:08.780", - "lastModified": "2025-02-23T19:15:08.780", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester E-Learning System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/modules/lesson/index.php of the component List of Lessons Page. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester E-Learning System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/modules/lesson/index.php del componente List of Lessons Page. La manipulaci\u00f3n permite la carga sin restricciones. Es posible lanzar el ataque de forma remota." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,24 +142,66 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:e-learning_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D92133-21C1-489C-B3D8-6B5EE506BC1E" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.296574", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296574", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.504045", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1591.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1591.json index 6be967c3595..538934873be 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1591.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1591.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1591", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T19:15:09.407", - "lastModified": "2025-02-23T19:15:09.407", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /department.php of the component Department Page. The manipulation of the argument Department Name leads to cross site scripting. The attack can be launched remotely." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en SourceCodester Employee Management System 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /department.php del componente Department Page. La manipulaci\u00f3n del argumento Department Name provoca cross site scripting. El ataque se puede ejecutar de forma remota." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C87F89-B8F6-412D-8E3F-3C35A1EBAD6F" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.296575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.504048", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1592.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1592.json index b0fd6730c97..c89e74a5074 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1592.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1592.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1592", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T20:15:08.243", - "lastModified": "2025-02-23T20:15:08.243", - "vulnStatus": "Received", + "lastModified": "2025-02-28T18:33:35.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Employee Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/Operations/Role.php of the component Add Role Page. The manipulation of the argument assign_name/description leads to cross site scripting. The attack may be launched remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Employee Management System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /admin/Operations/Role.php del componente Add Role Page. La manipulaci\u00f3n del argumento allow_name/description provoca cross site scripting. El ataque puede ejecutarse de forma remota." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.296576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.296576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.505210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1593.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1593.json index d698fb158d8..5c8ca878ced 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1593.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1593.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1593", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T20:15:09.210", - "lastModified": "2025-02-23T20:15:09.210", - "vulnStatus": "Received", + "lastModified": "2025-02-28T18:33:35.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Best Employee Management System 1.0. This affects an unknown part of the file /_hr_soft/assets/uploadImage/Profile/ of the component Profile Picture Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Best Employee Management System 1.0. Afecta a una parte desconocida del archivo /_hr_soft/assets/uploadImage/Profile/ del componente Profile Picture Handler. La manipulaci\u00f3n permite la carga sin restricciones. Es posible iniciar el ataque de forma remota." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,24 +142,66 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.296577", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296577", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.505212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1596.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1596.json index 9681b7da12b..f11128fca10 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1596.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1596.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1596", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T23:15:09.070", - "lastModified": "2025-02-23T23:15:09.070", - "vulnStatus": "Received", + "lastModified": "2025-02-28T18:33:35.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.0 and classified as critical. This issue affects some unknown processing of the file /fpassword.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best Church Management Software 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /fpassword.php. La manipulaci\u00f3n del argumento email conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha revelado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5E9D36FA-56A6-4BBB-B0B3-0873DB9716C9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.497868", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1597.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1597.json index 912fd9d6009..2f20a58b891 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1597.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1597.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1597", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-23T23:15:10.120", - "lastModified": "2025-02-23T23:15:10.120", - "vulnStatus": "Received", + "lastModified": "2025-02-28T18:33:35.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/redirect.php. The manipulation of the argument a leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/redirect.php. La manipulaci\u00f3n del argumento a provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5E9D36FA-56A6-4BBB-B0B3-0873DB9716C9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296592", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.497883", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1598.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1598.json index a50b7c0aab6..48986a5945f 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1598.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1598.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1598", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-24T00:15:09.220", - "lastModified": "2025-02-24T00:15:09.220", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:04.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/asset_crud.php. The manipulation of the argument photo1 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Best Church Management Software 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/app/asset_crud.php. La manipulaci\u00f3n del argumento photo1 permite la carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -26,30 +30,30 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "LOW", - "vulnerableSystemAvailability": "LOW", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,74 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5E9D36FA-56A6-4BBB-B0B3-0873DB9716C9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Arbitrary-File-Upload.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296593", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.497891", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json new file mode 100644 index 00000000000..89f5d5f41b8 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1795.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-1795", + "sourceIdentifier": "cna@python.org", + "published": "2025-02-28T19:15:36.550", + "lastModified": "2025-02-28T20:15:46.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/issues/100884", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/100885", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/119099", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json index 5f93041cbdf..55aff49f4d5 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21661.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21661", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-21T13:15:09.747", - "lastModified": "2025-01-21T13:15:09.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T18:59:45.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,105 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: virtuser: corregir limpiezas de tablas de b\u00fasqueda faltantes Cuando se crea un dispositivo virtuser a trav\u00e9s de configfs y la sonda falla debido a una tabla de b\u00fasqueda incorrecta, la tabla no se elimina. Esto evita que los intentos de sonda posteriores tengan \u00e9xito, incluso si se corrige el problema, a menos que se libere el dispositivo. Adem\u00e1s, tambi\u00e9n se necesita limpieza en el caso menos probable de que falle platform_device_register_full(). Adem\u00e1s, se detect\u00f3 una p\u00e9rdida de memoria constante en lookup_table->dev_id usando kmemleak alternando el estado activo entre 0 y 1 con una tabla de b\u00fasqueda correcta. Introduzca gpio_virtuser_remove_lookup_table() como contraparte del gpio_virtuser_make_lookup_table() existente y ll\u00e1melo desde todos los puntos necesarios para garantizar una limpieza adecuada. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "AD20F8BA-D1BC-4584-8C68-17E958381157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a619cba8c69c434258ff4101d463322cd63e1bdc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d72d0126b1f6981f6ce8b4247305f359958c11b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json index 0e5bd33c198..6df8c3d009d 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23218.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23218", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-20T16:15:28.317", - "lastModified": "2025-02-18T20:15:27.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.10", + "matchCriteriaId": "D0DAA48F-2211-4AE8-986C-01B766B8DF15" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7465f785651c0cff65059bba96b015ab54235de4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xhv4-88gx-hvgh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json index 59ff7bbd258..02b43b5281c 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23219.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23219", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-20T16:15:28.460", - "lastModified": "2025-02-18T21:15:28.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.10", + "matchCriteriaId": "D0DAA48F-2211-4AE8-986C-01B766B8DF15" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/ae9c859006143bd0087b3e6e48a0677e1fff5c7e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h2mg-4c7q-w69v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json index 2b70253503d..d30781c1e9a 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23220.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23220", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-20T16:15:28.593", - "lastModified": "2025-02-18T21:15:28.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.10", + "matchCriteriaId": "D0DAA48F-2211-4AE8-986C-01B766B8DF15" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/1739e1589948a207b8a82b9bfe078cb826d420de", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-425j-h4cf-g52j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json new file mode 100644 index 00000000000..bfbc76c5123 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25428.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25428", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T19:15:36.773", + "lastModified": "2025-02-28T19:15:36.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-Hardcoded-password-17815d9d4d2680d5a2becf32425d93fd", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json new file mode 100644 index 00000000000..82596501b29 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25429.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25429", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T19:15:36.883", + "lastModified": "2025-02-28T19:15:36.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the r_name variable inside the have_same_name function on the /addschedule.htm page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-10315d9d4d26801f8985c11a22389e6b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json new file mode 100644 index 00000000000..f4f64cf852d --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25609.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25609", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T19:15:36.993", + "lastModified": "2025-02-28T19:15:36.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_ipv6 parameter in the formIpv6Setup interface of /bin/boa" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_ipv6.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json new file mode 100644 index 00000000000..a1a2549fde7 --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25610.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25610", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T19:15:37.107", + "lastModified": "2025-02-28T19:15:37.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the static_gw parameter in the formIpv6Setup interface of /bin/boa." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-static_gw.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json new file mode 100644 index 00000000000..9f7a20ae5ea --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25635.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25635", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-28T19:15:37.223", + "lastModified": "2025-02-28T19:15:37.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-pppoe_dns1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json index a3d2e9c2858..c3361c3d982 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25730.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25730", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.820", - "lastModified": "2025-02-28T17:15:17.420", + "lastModified": "2025-02-28T20:15:46.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://gainsec.com/2025/02/27/cve-2025-25730-developer-options-and-usb-debugging-authorization-bypass/", "source": "cve@mitre.org" + }, + { + "url": "https://gainsec.com/2025/02/27/cve-2025-25730-developer-options-and-usb-debugging-authorization-bypass/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json index a96ce67ab10..c2538a1eb89 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26606", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:28.583", - "lastModified": "2025-02-18T21:15:28.583", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-rxjr-cw9q-cwwg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json index 1ca1754562d..9c2ca18ba2e 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26607", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:28.730", - "lastModified": "2025-02-18T21:15:28.730", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g6wj-3vm2-c59m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json index 8ca737b11c7..6433afe5b19 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26608", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:28.893", - "lastModified": "2025-02-18T21:15:28.893", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-65h2-7484-2pww", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json index be144fb614a..d559f5588c0 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26609", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.110", - "lastModified": "2025-02-18T21:15:29.110", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-h7jx-ggv8-v2rh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json index 280c6e76d79..a0fb75aac3e 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26610", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.233", - "lastModified": "2025-02-18T21:15:29.233", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6p7c-9hcx-jpqj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json index dbcf1395401..20f382bc637 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26611", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.357", - "lastModified": "2025-02-18T21:15:29.357", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-q273-4vcj-qqp4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json index 383429f7e6b..31204a1a640 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26612", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.480", - "lastModified": "2025-02-18T21:15:29.480", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "F000C11C-CDF1-4B99-A1F7-11357DF030BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-9cwj-p4x6-pp88", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json index 8ea962f086f..921d0ad00a0 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26613", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.607", - "lastModified": "2025-02-18T21:15:29.607", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-g3w6-m6w8-p6r2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json index 750ec470a13..bce7ba96633 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26614", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.737", - "lastModified": "2025-02-18T21:15:29.737", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-3qhx-gfqj-vm2j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json index 227233f0b90..57e75304f6c 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26615", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:29.867", - "lastModified": "2025-02-18T21:15:29.867", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -53,12 +73,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-p5wx-pv8j-f96h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json index f616ed7bb62..0950c128c54 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26616", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:30.010", - "lastModified": "2025-02-18T21:15:30.010", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xxqg-p22h-3f32", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json index 591915a733d..54ef8dcfb6f 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26617", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T21:15:30.137", - "lastModified": "2025-02-18T21:15:30.137", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,44 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-f654-c5r5-jx77", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json index 96dc14010d9..9888f0ebb4e 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27096", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-20T19:15:12.157", - "lastModified": "2025-02-20T19:15:12.157", - "vulnStatus": "Received", + "lastModified": "2025-02-28T19:18:34.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -30,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "LOW", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.14", + "matchCriteriaId": "89844E59-1EDD-4F24-8959-13E7687F2B9C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j856-wh9m-9vpm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 80d5480752d..eb51aefb302 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-28T19:00:19.756624+00:00 +2025-02-28T21:00:20.769370+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-28T18:33:35.540000+00:00 +2025-02-28T20:15:46.803000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283533 +283542 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `9` -- [CVE-2024-54175](CVE-2024/CVE-2024-541xx/CVE-2024-54175.json) (`2025-02-28T17:15:15.487`) -- [CVE-2025-0985](CVE-2025/CVE-2025-09xx/CVE-2025-0985.json) (`2025-02-28T17:15:15.937`) -- [CVE-2025-20049](CVE-2025/CVE-2025-200xx/CVE-2025-20049.json) (`2025-02-28T17:15:16.277`) -- [CVE-2025-20060](CVE-2025/CVE-2025-200xx/CVE-2025-20060.json) (`2025-02-28T17:15:16.440`) -- [CVE-2025-23405](CVE-2025/CVE-2025-234xx/CVE-2025-23405.json) (`2025-02-28T17:15:16.637`) -- [CVE-2025-24316](CVE-2025/CVE-2025-243xx/CVE-2025-24316.json) (`2025-02-28T17:15:16.790`) -- [CVE-2025-24318](CVE-2025/CVE-2025-243xx/CVE-2025-24318.json) (`2025-02-28T17:15:16.937`) -- [CVE-2025-24843](CVE-2025/CVE-2025-248xx/CVE-2025-24843.json) (`2025-02-28T17:15:17.103`) -- [CVE-2025-24849](CVE-2025/CVE-2025-248xx/CVE-2025-24849.json) (`2025-02-28T17:15:17.253`) -- [CVE-2025-25430](CVE-2025/CVE-2025-254xx/CVE-2025-25430.json) (`2025-02-28T18:15:28.263`) -- [CVE-2025-25431](CVE-2025/CVE-2025-254xx/CVE-2025-25431.json) (`2025-02-28T18:15:28.407`) -- [CVE-2025-27408](CVE-2025/CVE-2025-274xx/CVE-2025-27408.json) (`2025-02-28T18:15:28.983`) +- [CVE-2025-0159](CVE-2025/CVE-2025-01xx/CVE-2025-0159.json) (`2025-02-28T19:15:36.243`) +- [CVE-2025-0160](CVE-2025/CVE-2025-01xx/CVE-2025-0160.json) (`2025-02-28T19:15:36.393`) +- [CVE-2025-0769](CVE-2025/CVE-2025-07xx/CVE-2025-0769.json) (`2025-02-28T20:15:46.440`) +- [CVE-2025-1795](CVE-2025/CVE-2025-17xx/CVE-2025-1795.json) (`2025-02-28T19:15:36.550`) +- [CVE-2025-25428](CVE-2025/CVE-2025-254xx/CVE-2025-25428.json) (`2025-02-28T19:15:36.773`) +- [CVE-2025-25429](CVE-2025/CVE-2025-254xx/CVE-2025-25429.json) (`2025-02-28T19:15:36.883`) +- [CVE-2025-25609](CVE-2025/CVE-2025-256xx/CVE-2025-25609.json) (`2025-02-28T19:15:36.993`) +- [CVE-2025-25610](CVE-2025/CVE-2025-256xx/CVE-2025-25610.json) (`2025-02-28T19:15:37.107`) +- [CVE-2025-25635](CVE-2025/CVE-2025-256xx/CVE-2025-25635.json) (`2025-02-28T19:15:37.223`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `100` -- [CVE-2021-34125](CVE-2021/CVE-2021-341xx/CVE-2021-34125.json) (`2025-02-28T18:15:25.293`) -- [CVE-2022-3767](CVE-2022/CVE-2022-37xx/CVE-2022-3767.json) (`2025-02-28T18:15:25.663`) -- [CVE-2022-4331](CVE-2022/CVE-2022-43xx/CVE-2022-4331.json) (`2025-02-28T18:15:25.947`) -- [CVE-2023-1205](CVE-2023/CVE-2023-12xx/CVE-2023-1205.json) (`2025-02-28T17:15:13.583`) -- [CVE-2023-26948](CVE-2023/CVE-2023-269xx/CVE-2023-26948.json) (`2025-02-28T17:15:14.537`) -- [CVE-2023-27114](CVE-2023/CVE-2023-271xx/CVE-2023-27114.json) (`2025-02-28T17:15:14.700`) -- [CVE-2023-27115](CVE-2023/CVE-2023-271xx/CVE-2023-27115.json) (`2025-02-28T17:15:14.880`) -- [CVE-2023-27850](CVE-2023/CVE-2023-278xx/CVE-2023-27850.json) (`2025-02-28T17:15:15.147`) -- [CVE-2024-3769](CVE-2024/CVE-2024-37xx/CVE-2024-3769.json) (`2025-02-28T18:13:00.173`) -- [CVE-2024-3771](CVE-2024/CVE-2024-37xx/CVE-2024-3771.json) (`2025-02-28T18:13:00.173`) -- [CVE-2024-38290](CVE-2024/CVE-2024-382xx/CVE-2024-38290.json) (`2025-02-28T18:15:27.187`) -- [CVE-2024-38291](CVE-2024/CVE-2024-382xx/CVE-2024-38291.json) (`2025-02-28T18:15:27.397`) -- [CVE-2024-38292](CVE-2024/CVE-2024-382xx/CVE-2024-38292.json) (`2025-02-28T18:15:27.607`) -- [CVE-2024-41336](CVE-2024/CVE-2024-413xx/CVE-2024-41336.json) (`2025-02-28T17:15:15.283`) -- [CVE-2024-43201](CVE-2024/CVE-2024-432xx/CVE-2024-43201.json) (`2025-02-28T18:15:27.813`) -- [CVE-2024-51139](CVE-2024/CVE-2024-511xx/CVE-2024-51139.json) (`2025-02-28T18:15:28.047`) -- [CVE-2024-56973](CVE-2024/CVE-2024-569xx/CVE-2024-56973.json) (`2025-02-28T17:15:15.730`) -- [CVE-2025-1606](CVE-2025/CVE-2025-16xx/CVE-2025-1606.json) (`2025-02-28T18:33:35.540`) -- [CVE-2025-1613](CVE-2025/CVE-2025-16xx/CVE-2025-1613.json) (`2025-02-28T18:33:35.540`) -- [CVE-2025-1614](CVE-2025/CVE-2025-16xx/CVE-2025-1614.json) (`2025-02-28T18:33:35.540`) -- [CVE-2025-1615](CVE-2025/CVE-2025-16xx/CVE-2025-1615.json) (`2025-02-28T18:33:35.540`) -- [CVE-2025-25570](CVE-2025/CVE-2025-255xx/CVE-2025-25570.json) (`2025-02-28T18:15:28.550`) -- [CVE-2025-25730](CVE-2025/CVE-2025-257xx/CVE-2025-25730.json) (`2025-02-28T17:15:17.420`) -- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-02-28T18:15:28.773`) -- [CVE-2025-26325](CVE-2025/CVE-2025-263xx/CVE-2025-26325.json) (`2025-02-28T17:15:17.553`) +- [CVE-2025-1590](CVE-2025/CVE-2025-15xx/CVE-2025-1590.json) (`2025-02-28T19:18:04.507`) +- [CVE-2025-1591](CVE-2025/CVE-2025-15xx/CVE-2025-1591.json) (`2025-02-28T19:18:04.507`) +- [CVE-2025-1592](CVE-2025/CVE-2025-15xx/CVE-2025-1592.json) (`2025-02-28T18:33:35.540`) +- [CVE-2025-1593](CVE-2025/CVE-2025-15xx/CVE-2025-1593.json) (`2025-02-28T18:33:35.540`) +- [CVE-2025-1596](CVE-2025/CVE-2025-15xx/CVE-2025-1596.json) (`2025-02-28T18:33:35.540`) +- [CVE-2025-1597](CVE-2025/CVE-2025-15xx/CVE-2025-1597.json) (`2025-02-28T18:33:35.540`) +- [CVE-2025-1598](CVE-2025/CVE-2025-15xx/CVE-2025-1598.json) (`2025-02-28T19:18:04.507`) +- [CVE-2025-21661](CVE-2025/CVE-2025-216xx/CVE-2025-21661.json) (`2025-02-28T18:59:45.207`) +- [CVE-2025-23218](CVE-2025/CVE-2025-232xx/CVE-2025-23218.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-23219](CVE-2025/CVE-2025-232xx/CVE-2025-23219.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-23220](CVE-2025/CVE-2025-232xx/CVE-2025-23220.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-25730](CVE-2025/CVE-2025-257xx/CVE-2025-25730.json) (`2025-02-28T20:15:46.803`) +- [CVE-2025-26606](CVE-2025/CVE-2025-266xx/CVE-2025-26606.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26607](CVE-2025/CVE-2025-266xx/CVE-2025-26607.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26608](CVE-2025/CVE-2025-266xx/CVE-2025-26608.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26609](CVE-2025/CVE-2025-266xx/CVE-2025-26609.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26610](CVE-2025/CVE-2025-266xx/CVE-2025-26610.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26611](CVE-2025/CVE-2025-266xx/CVE-2025-26611.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26612](CVE-2025/CVE-2025-266xx/CVE-2025-26612.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26613](CVE-2025/CVE-2025-266xx/CVE-2025-26613.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26614](CVE-2025/CVE-2025-266xx/CVE-2025-26614.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26615](CVE-2025/CVE-2025-266xx/CVE-2025-26615.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26616](CVE-2025/CVE-2025-266xx/CVE-2025-26616.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-26617](CVE-2025/CVE-2025-266xx/CVE-2025-26617.json) (`2025-02-28T19:18:34.167`) +- [CVE-2025-27096](CVE-2025/CVE-2025-270xx/CVE-2025-27096.json) (`2025-02-28T19:18:34.167`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 061230fa7ea..34d297a3c3f 100644 --- a/_state.csv +++ b/_state.csv @@ -145219,7 +145219,7 @@ CVE-2020-0950,0,0,9f5413ec13002e656ee2b0e9cea88e3514dd13c311518a0a8971f19a421a89 CVE-2020-0951,0,0,d9bff183d8f378cb8ea7d6729a9ce4b9e8852fb922839ce2b48ec3f32df27e31,2024-11-21T04:54:31.610000 CVE-2020-0952,0,0,30ce326c29e8fe771bbc3e26f24850b8797d9de78c0f928604ea054dfad69ec4,2024-11-21T04:54:31.750000 CVE-2020-0953,0,0,62e2a29c8609aadb88f8e4367f47b2c05215ab815a59e60ac4ddb05cfddabe93,2024-11-21T04:54:31.883000 -CVE-2020-0954,0,0,aa4dc0aa428264f96cdcf528074d8e425624213759b2337e4e534da5b9331be0,2024-11-21T04:54:32.017000 +CVE-2020-0954,0,1,f5a8df038981539e8d465eb9e0ff8dcc975dc0e018acb6f5d2ee8784b28a15fb,2025-02-28T20:15:35.153000 CVE-2020-0955,0,0,ab677440feb966d60666fa8855cc6219ce69a64240db2bf0f64181d83af41464,2024-11-21T04:54:32.127000 CVE-2020-0956,0,0,0dbdb75b10b4102a9e49bda17d232b062b1dc7e9621dec2cff00eac1fb9a859b,2024-11-21T04:54:32.253000 CVE-2020-0957,0,0,ab41cba529dbdd6a5c3a7d84c5af94a5506d5a07429d6d27bdaba378834258f7,2024-11-21T04:54:32.397000 @@ -145238,12 +145238,12 @@ CVE-2020-0969,0,0,305dff45dad5edb067fb145265c7c279a8515319d3ea119f1365f17ec833fc CVE-2020-0970,0,0,dcd238d5ed6a07262a1af1841cf52b8cd1e1ad25eb66d1c935c2cb624a868a7a,2024-11-21T04:54:34.077000 CVE-2020-0971,0,0,caab7228a0e604bae512e12a0e27f0e870f7f5ac48a3efecd36daf07a177b286,2024-11-21T04:54:34.200000 CVE-2020-0972,0,0,b1f2e2e1f303af6fdec9477b37304349502414c2fcd8e6d9cbb94bea2f75725f,2024-11-21T04:54:34.310000 -CVE-2020-0973,0,0,68ed2a66c1785bc72a2ff38012d80a7f98306ceaaa5e486d1050387063f509dc,2024-11-21T04:54:34.420000 +CVE-2020-0973,0,1,4e51d8655882b51f572ab7829998d8726fe777c199b8543b41a9862dad15fdfd,2025-02-28T20:15:35.367000 CVE-2020-0974,0,0,0411891ce1eb889e7971386a098ce0cde1e19f013ba07379b7db2ae92475cafb,2024-11-21T04:54:34.527000 CVE-2020-0975,0,0,3ac8e7803209d3eeacc9df8ec164014261a78d597c6b6d4c47157a5f1fda9466,2024-11-21T04:54:34.633000 CVE-2020-0976,0,0,a3042a06ff5254d8cdd3852c77f71c70cc63d5dfe2f61d3ffb99d6a43205ea3f,2024-11-21T04:54:34.750000 CVE-2020-0977,0,0,19d573e1bc2bea7d962e028b7583a22a182373e3662a51e7a8c792d0bf441dbe,2024-11-21T04:54:34.860000 -CVE-2020-0978,0,0,ed80f07fa81b9328b28eec987c95ce4c266c0c63e3247b029f4032caebaf7a4d,2024-11-21T04:54:34.970000 +CVE-2020-0978,0,1,2558dfa63ca1bd2a70a08e712232708a81831edf52c4ea2945548ef5d76ab955,2025-02-28T20:15:35.553000 CVE-2020-0979,0,0,1cdb722713aecd4b08ce54637f690e2d062e2cbbd801d4e2c1a0f567901138f6,2024-11-21T04:54:35.077000 CVE-2020-0980,0,0,7a1819934d4edb6b0a4c1450c5fac6bbb9425b5aa4c0a3c525d0909ce0cff1f0,2024-11-21T04:54:35.187000 CVE-2020-0981,0,0,cd0668f5e698ae77797975c72dc7878d01c212e44847d460467182be89ddcc12,2024-11-21T04:54:35.307000 @@ -145724,7 +145724,7 @@ CVE-2020-10546,0,0,f484b87efff57ab17c9be9dad56dda0a4fb0adc2d6bb6498416ff07dc011d CVE-2020-10547,0,0,378b9840a0f13abe8e4d29f53dbc340484c83a314965d28b06422a69ac165381,2024-11-21T04:55:33.493000 CVE-2020-10548,0,0,b64f96f5e731cfe6425dbd5b3f2930e31d4486760507313dc32b1cd58a5f7bd2,2024-11-21T04:55:33.637000 CVE-2020-10549,0,0,fb5ada918979b6ba37bd0ce5b1af0ef356be7941a60c2bbe7be4cff96f46f2e7,2024-11-21T04:55:33.780000 -CVE-2020-1055,0,0,a8497f998f73a8e77c812b2bff57c4a32fc8d7e39eafe84b19d4580a754c69a0,2024-11-21T05:09:39.197000 +CVE-2020-1055,0,1,46bf4cb6886b501ad4e06cadc6a99ad1b049d53943e5e556b2d5383cb4c10d69,2025-02-28T20:15:35.713000 CVE-2020-10551,0,0,121b1bae0bee79946a2d3e405c9f337b936e3b41246ea4195089b686fad10be2,2024-11-21T04:55:33.927000 CVE-2020-10552,0,0,09f93174c6fc029964472ea50d57fa3cf33d46575c1fb8cad34ba10755238efd,2024-11-21T04:55:34.073000 CVE-2020-10553,0,0,a5ff5282964124febfa09d9cac0b36fd343ac677204d4d78bcde47a2bd389baf,2024-11-21T04:55:34.227000 @@ -146172,7 +146172,7 @@ CVE-2020-10986,0,0,0c2327488df563e6dcf432e4adc714b8bc4cefca516722f73471a6512fa96 CVE-2020-10987,0,0,4fc41c9a56ec25efcc2b5468d6e96af4ece196c110b1fdcde7f71707b63b03ab,2025-02-04T20:15:34.827000 CVE-2020-10988,0,0,aa7daa4c6aa62e796430926190367c0b1968bfad583ef530820120923c274fbe,2024-11-21T04:56:31.627000 CVE-2020-10989,0,0,e418f5cd4a47560024781f2def1f09ae65c3e9468a8ba947f1cf12e2b3ba636f,2024-11-21T04:56:31.787000 -CVE-2020-1099,0,0,d13cd68078bee227a5d13c6d002fb5853a1c3489303cef35ac6a8078d4fac9ea,2024-11-21T05:09:44.763000 +CVE-2020-1099,0,1,550bb303aba9c544890e28e9ad2969a692ea90cd99e24b5156c3b1655de53ae9,2025-02-28T20:15:35.900000 CVE-2020-10990,0,0,9c471ef37b77619db1000e2e34c093641b64fc6cc0e9cfc3cfe18273b56f3475,2024-11-21T04:56:31.927000 CVE-2020-10991,0,0,62049fa50dda9f395e49c62702464dce254ed0d890f1cdd81dbf9a45e288c23e,2024-11-21T04:56:32.063000 CVE-2020-10992,0,0,22a160c5abfabc360deb0b11f89ca12b849be4275ac7c47c001c7bb557140b5b,2024-11-21T04:56:32.207000 @@ -146181,7 +146181,7 @@ CVE-2020-10994,0,0,452ad5e945c9b7aebd53f9c5827888c6e20d1a4ed2764bd30f1cb10ae6d2f CVE-2020-10995,0,0,e3eaa075338587815f5ee5d7a32ee778e25a9e671eba560deb4c55f218bca393,2024-11-21T04:56:32.650000 CVE-2020-10996,0,0,054c91e97691a8a0b1f30fd1c054a6b8994ea3689b4c66f04c701936b0132670,2024-11-21T04:56:32.813000 CVE-2020-10997,0,0,b8a87c898061c1cbc0aa7d61d3007415ecb0c22eda7a8dab47190fac8213b85a,2024-11-21T04:56:32.980000 -CVE-2020-1100,0,0,893da37935a1fd117a55786a73907c9575f6f3c0c75f70750705e493430a6fa5,2024-11-21T05:09:44.880000 +CVE-2020-1100,0,1,c8d45774a68d9f1b86c5852bb7c0c8d9f09df77ea6b40a2cd30adce174eba26a,2025-02-28T20:15:36.073000 CVE-2020-11000,0,0,e8e1aafbec9d3537f3ff7a10b8c8fc8c9778539e7d7077b1ec0242f505e6c179,2024-11-21T04:56:33.133000 CVE-2020-11001,0,0,36904cb9f22bfd979baecad783c8e2b0c8113ad051f511a94ad63d660c54b9b7,2024-11-21T04:56:33.267000 CVE-2020-11002,0,0,24d47557401cb96ff1211fd1df511b5b9a798737fde3c8c16f391fa5cc2b217b,2024-11-21T04:56:33.427000 @@ -146192,7 +146192,7 @@ CVE-2020-11006,0,0,f83c968eb46362c516fee01e77c6824468225f59f4808587527ad23da3673 CVE-2020-11007,0,0,12efe8ee7e21359bb3b4e827b7197ee891e4ccfd74b6527fa52dd1aeebbac4f6,2024-11-21T04:56:34.113000 CVE-2020-11008,0,0,9b67a34377855de2dff104095f19831a3b80cd85d254b03d241a3aa840f69f25,2024-11-21T04:56:34.263000 CVE-2020-11009,0,0,19c0890785f730e855b69ae90962344b027f60f23976cce439bb61513186a67c,2024-11-21T04:56:34.437000 -CVE-2020-1101,0,0,e070b5b3199d5e1678a371b7306403c0923fb2a893f2baa0f5271ba38524b0b3,2024-11-21T05:09:44.993000 +CVE-2020-1101,0,1,57411755de17eb71baafb2a708fdfd8db64d7c1a7a333507adb3cf5481bdf6db,2025-02-28T20:15:36.240000 CVE-2020-11010,0,0,32132925c967493e76792fb11e1a083a47d07cd9764a8d26d7d37d166c6f4232,2024-11-21T04:56:34.570000 CVE-2020-11011,0,0,e4f0fbd214e298df9f90df6597264033178ed30d1f57ba4e06d49a430510a005,2024-11-21T04:56:34.697000 CVE-2020-11012,0,0,ae53b5fb6fea77d6c0b9b7889df6b6401b6315a158599f4a62863a604512ca14,2024-11-21T04:56:34.820000 @@ -146247,7 +146247,7 @@ CVE-2020-11056,0,0,1a69e378b98ea8207c2a22a11c0bfba45e8a74fac5387d855418f7ea99df8 CVE-2020-11057,0,0,131016b9ff3f6dc014f0b41888510cd069bc0cdb97c115eb9597bbc68955cae7,2024-11-21T04:56:41.800000 CVE-2020-11058,0,0,38ef3b5a8e7dc2eb0f7530ac5aea3564b540b0ae752b75acc651a59aaa5ca8ce,2024-11-21T04:56:41.940000 CVE-2020-11059,0,0,c9db5ed54ff47e0ea880c779f2cbe5ce26e45df924606bfb8a11e96f971f2157,2024-11-21T04:56:42.070000 -CVE-2020-1106,0,0,e26aa543c9402a44c707b92994ab5121739125fd515652f8efa6ed676f584f5c,2024-11-21T05:09:45.563000 +CVE-2020-1106,0,1,2f814eb5ec6ff0642db981987c7dbc91d4a0ce49f672bb7d7e5d87730b344edf,2025-02-28T20:15:36.397000 CVE-2020-11060,0,0,526f2caf3a06ef1ff4067beb1c69728e202f96aca49ac10037c3321ec8b6fe00,2024-11-21T04:56:42.190000 CVE-2020-11061,0,0,42b5252e95129789fbcaf3bf036c0f6ad9e31ede2a326fae894bde1fcf16f42b,2024-11-21T04:56:42.313000 CVE-2020-11062,0,0,01f000707681ab0bfcf807497a2e5e007fd3c67bf6c8decfca00c4851071bec1,2024-11-21T04:56:42.440000 @@ -146936,7 +146936,7 @@ CVE-2020-11766,0,0,259dd40bed2f4e177ea3a89efcc6c6516fd4541baeaddc3339798fc48cc61 CVE-2020-11767,0,0,3b1b34901335ae8eeed836bf191297f547e345c59083f9791714efa1e9020ecd,2024-11-21T04:58:34.233000 CVE-2020-11768,0,0,4942d2343635c3f607a6308eec40285fafe3acb67cf9b3ababc51058d89c1587,2024-11-21T04:58:34.393000 CVE-2020-11769,0,0,0f4bd00a5107e658928222114cb192dd70d1f7bf28cc8512712f17330c3fb8b8,2024-11-21T04:58:34.580000 -CVE-2020-1177,0,0,3b6202c4207b55cafc9666407234353036eea529456ebe26e65b41cb30f32265,2024-11-21T05:09:54.793000 +CVE-2020-1177,0,1,d531a07790e25fa6a97dad88544a387d075d893ea8b55dc855c4fbf9b64e5215,2025-02-28T20:15:36.560000 CVE-2020-11770,0,0,9a3d0a694dd96c3ec3e01ee61cc7881847a2a9422783685347e1e2b8dd80cc4e,2024-11-21T04:58:34.790000 CVE-2020-11771,0,0,10302530838bb820057e9ef1f9b6d780351110932f07ee6d641f93b2654c196d,2024-11-21T04:58:34.960000 CVE-2020-11772,0,0,001f56dd059f3fbbf2321be4aca2b5dd331359e0b76de03cf03035452f7ffe0a,2024-11-21T04:58:35.110000 @@ -146996,7 +146996,7 @@ CVE-2020-11826,0,0,ceb5b550408b7bdbf16f5bdef68d8a4a8f7170bb1723c5af8e8d579a04015 CVE-2020-11827,0,0,14b40a188849864ba7f1ed2871eabeb72f7e3fe442b690fda2d37f444f25c582,2024-11-21T04:58:42.833000 CVE-2020-11828,0,0,c1e0bf2141619f2673650698c19874c52ea493778f6ab0afe5ab9cadf0b2cc08,2024-11-21T04:58:42.963000 CVE-2020-11829,0,0,27d2bc90ce159002588db09eec20f768b1eddc7fc225477e2a9d3ef1e747dfe5,2024-11-21T04:58:43.063000 -CVE-2020-1183,0,0,59797e4cc0b3afad35f91a8355107012fc8b4c2e15eb8b5b14c2595598e06907,2024-11-21T05:09:55.550000 +CVE-2020-1183,0,1,5320b8c920e94b8bc514b5c10f178cf51e23d40f607a598da8515b2a0f5dceab,2025-02-28T20:15:36.723000 CVE-2020-11830,0,0,9885098679ac98b573fa1d61e25749c4bd6353907b69e7a9d6e09cb552adbcbb,2024-11-21T04:58:43.160000 CVE-2020-11831,0,0,2dbf313dd083a70ef0abbc6c7e99755867eede89212d17797d48f2e8ee499d42,2024-11-21T04:58:43.257000 CVE-2020-11832,0,0,350818a6efa4765b554a55dc9325d265dee3e272adb4067f6c5b7ee1f8334504,2024-11-21T04:58:43.357000 @@ -148018,7 +148018,7 @@ CVE-2020-12966,0,0,0458305d2a1c670b6110502997fdd29b2362503978da73ac169d175168a61 CVE-2020-12967,0,0,eb011c047e9dd59dae530146897c5c6cc7440793d4c2556258f468c132881e66,2024-11-21T05:00:36.230000 CVE-2020-12968,0,0,bb7ab8e383cdcc25fd11c4125e074d038e9fd44606c13d7bcc228114e47e1f10,2023-11-07T03:15:55.950000 CVE-2020-12969,0,0,0a13cdd357438cc8a67c5537dd9513562e9f9006382b431d6eca432f2200a041,2023-11-07T03:15:56.197000 -CVE-2020-1297,0,0,53961ac257e1c87f3960e7baf7cec9d19d6d30720013a7ebbd52f553018fb3f1,2024-11-21T05:10:11.423000 +CVE-2020-1297,0,1,8662d25e391bd7edae910f81a4f4ee657871a70beb5897d7d3b84e6b7fa1fc1c,2025-02-28T20:15:36.890000 CVE-2020-12970,0,0,73bc6cb117fd19e6175a0d692feabb1077b2fc7417519847fd5b711678e33785,2023-11-07T03:15:56.433000 CVE-2020-12971,0,0,b85d49f00139d4643344fa8fe088d7df264c9b4c475eda85b0b0c9bee15aa34f,2023-11-07T03:15:56.670000 CVE-2020-12972,0,0,a709da250cbd396abbc2763ef894d0ec41aa0af4f3cc2b56cd3363db4a21d6b4,2023-11-07T03:15:56.920000 @@ -148029,7 +148029,7 @@ CVE-2020-12976,0,0,ba525395f29328dec82346e8db201e5c40cbdd02fe1755dcc92ba9c7cc4e6 CVE-2020-12977,0,0,27cfb11dac25bd3d36ec7a8267a17c06d29d7b5576f4a4e94a231793022d07d3,2023-11-07T03:15:58.133000 CVE-2020-12978,0,0,5804b3fc41f4c8e1895c67c5a37db7500f597140bd6ac894383a12372bda9272,2023-11-07T03:15:58.367000 CVE-2020-12979,0,0,b430d524ff739bd138c7d2be6101680d669be1d343552dbf228a1053422826ce,2023-11-07T03:15:58.600000 -CVE-2020-1298,0,0,0ca28701575725ab0819e09300341dbe95d12d56faca56d45e641a40c3705807,2024-11-21T05:10:11.547000 +CVE-2020-1298,0,1,95cde73832b3b9059f560291e6a9531d1422d8bfd9449885fd2fec3ffcbdd180,2025-02-28T20:15:37.063000 CVE-2020-12980,0,0,94c41d41fedfbd2c124a3e5b7c3a7d119762a87b496c196ea12e6744e8bf3287,2024-11-21T05:00:36.517000 CVE-2020-12981,0,0,ba27fd3b7e8c797025865ff44330f56286c197d90d32e8cbd282d66c23a880e5,2024-11-21T05:00:36.650000 CVE-2020-12982,0,0,2f21fb4f9abe0c33009a962756ee544aba846ad82ab877b15ec52bad7ba6d009,2024-11-21T05:00:36.770000 @@ -148221,7 +148221,7 @@ CVE-2020-13176,0,0,ad328dce427eadce144306ce1da6c9c560440703a0e53b89cedd2514a7e8f CVE-2020-13177,0,0,e35f597686a2fc36f9373add0bf6775ba4452d7ea869894b047b60ba0c629137,2024-11-21T05:00:48.640000 CVE-2020-13178,0,0,5abf5dbfac513e5f26031120bf40e50ab516b0810b391ceb7607bca0b0d3c18e,2024-11-21T05:00:48.797000 CVE-2020-13179,0,0,ad735755db8a83111e3d26bdc19adf135269479fbb98a9cd4a9190d2dccd4797,2024-11-21T05:00:48.907000 -CVE-2020-1318,0,0,0a2b5687931e7783652208207a998c2909ddd0ce3c5d83217c1ed0467323c780,2024-11-21T05:10:14.317000 +CVE-2020-1318,0,1,2270b26b3bd47b211c85a6c9d4113ccd515da4ac9b414a38d55881a1159cbdb8,2025-02-28T20:15:37.217000 CVE-2020-13183,0,0,ac7f3c5f52b4b354ec248f2749b08317a5fccf7c4edc190245310933eb8c9628,2024-11-21T05:00:49.037000 CVE-2020-13185,0,0,0a1ef86f0e5ac7b5e62037cf2670438a04b1ceeb2664981adb172fa91a35c5b9,2024-11-21T05:00:49.150000 CVE-2020-13186,0,0,d8353ca8abf2bda469b64db1f2a981f360a5b67e7d9204e4a76ad97a86322152,2024-11-21T05:00:49.280000 @@ -148239,7 +148239,7 @@ CVE-2020-13196,0,0,09a63e7c027ae02397285936a1a79f68fcd04f00971604c58c9aeb549c5b9 CVE-2020-13197,0,0,850d1aa8a1f87945eaecf19671fcf3c8d0ef328212c914226997c14ae552119c,2023-11-07T03:16:30.447000 CVE-2020-13198,0,0,48fa01c3ff993af5e4bd13dc93bc4af4445096180dbb7aef7a04c7cdbec3ac13,2023-11-07T03:16:30.687000 CVE-2020-13199,0,0,76fee5aba2c425db355b38b8a24e567c04b3a66fec68a313d0f587264a303e69,2023-11-07T03:16:30.933000 -CVE-2020-1320,0,0,35edd4b1e163869eab4de474b74ac6ad5f8ed0c9ac75460f26b6af798c926432,2024-11-21T05:10:14.603000 +CVE-2020-1320,0,1,b49db9f726f55a5f5b1abc4f024ae0db080116a0bddc5e1e045a146a71cf0148,2025-02-28T20:15:37.373000 CVE-2020-13200,0,0,6a0fe55b09b05eb157ba55d8f857d46ae3c10d46cc3c5e0bbe9a67f0f61f6e36,2023-11-07T03:16:31.173000 CVE-2020-13201,0,0,1edf60c32e0a4abf6dbed1c792f8fa2def481d3bdc28c8c7ef4887a687c3b58b,2023-11-07T03:16:31.440000 CVE-2020-13202,0,0,a83afafede6ae4fbf03fec9b22dec7b0bbb208a516afd6b3723fd8e8497ce1dc,2023-11-07T03:16:31.680000 @@ -149448,7 +149448,7 @@ CVE-2020-14496,0,0,777a066b92eeb7ca8df9815a605876591aeed1b3a9ee28bcd6c6f032996c9 CVE-2020-14497,0,0,cc6d51d5d0694358460396afa26012c300f660cc0d7bbdbd4ef94be4f4975f73,2024-11-21T05:03:23.890000 CVE-2020-14498,0,0,9cde59b2721feecf42755f788b380f59132421771bcaac4bc6ff8bd54c77de27,2024-11-21T05:03:24.080000 CVE-2020-14499,0,0,a83c8a8d6c73e8d1b94ab994b6d97c60d18246b24b0d484289295ea0e76a3031,2024-11-21T05:03:24.210000 -CVE-2020-1450,0,0,963a70cf5d9862a07159d17f28f65590e8a0abcbb3d24887447f048b7a6000e0,2024-11-21T05:10:34.547000 +CVE-2020-1450,0,1,6e535d538d110f0fa8daf31776c814dcb05b6b67e248992b1b111c9c1f322ef9,2025-02-28T20:15:37.523000 CVE-2020-14500,0,0,63dae6eeae8d7f423b84018ea02d3d57a9d641bb88e1ba3ec4fb7d834d9b717e,2024-11-21T05:03:24.343000 CVE-2020-14501,0,0,fc5f3aec1a7ec29a239ce11135e0a86500f2b29c951500fa70ff5367f58247cd,2024-11-21T05:03:24.480000 CVE-2020-14502,0,0,30c9ed9c52ea2005ca3080b01b4051a8a5bf30d532df3b284d615313523cad6b,2024-11-21T05:03:24.597000 @@ -149459,7 +149459,7 @@ CVE-2020-14506,0,0,c97f5393c5e1cb22290fb650c55da1c306aaa18dd4f695de9cb5968df40ec CVE-2020-14507,0,0,c6043b27a10585ddeba7db9b3895e55331733efa15aa94a9f94280f6034fb298,2024-11-21T05:03:25.207000 CVE-2020-14508,0,0,7d08f2830fc0a2ee16b47ee3eec8893574789e1cdd009b8acd622e988dd18736,2024-11-21T05:03:25.337000 CVE-2020-14509,0,0,d5a10c25e5c4ce2fd5824eaaf356a35d862235b1f19294e58aca0cdb29773054,2024-11-21T05:03:25.453000 -CVE-2020-1451,0,0,b90c04736b6ec9ac50be88b5e00f5f90125dd91036610a9d0580b4894cb8a90e,2024-11-21T05:10:34.667000 +CVE-2020-1451,0,1,a671a795d44b4cd1dc93619494731eb1f5f8cef70e8e2a88fb319b07f9b06ca4,2025-02-28T20:15:37.707000 CVE-2020-14510,0,0,99366c75a5848174c6f808a60fdbe65d7e218eaf754b413ba4bed26421c5bbf4,2024-11-21T05:03:25.577000 CVE-2020-14511,0,0,80ecaefae13c0c730ac35d3d6ea6bdcc8227c3e10d6efbd7d93cba75e6806c93,2024-11-21T05:03:25.703000 CVE-2020-14512,0,0,aa303d04d250bb66187983a472450a5cbb944e2f232740f89bb00cf418a88cac,2024-11-21T05:03:25.827000 @@ -149490,7 +149490,7 @@ CVE-2020-14535,0,0,e22f959ab5045d553054802c5d6a0c04a586fc77c92ee6c5e0796a9d92a48 CVE-2020-14536,0,0,9ed33cb5a33c6473bd5ffd69dd9e6c17fcd44a58b16730600734c916014946d2,2024-11-21T05:03:29.040000 CVE-2020-14537,0,0,ccd927b245c85c990ed63e0715c6111233d45592bdea1c1e032ef95bac06fec1,2024-11-21T05:03:29.177000 CVE-2020-14539,0,0,ec33cf000a20d27423600eef9235e718ede836794e386f996a50b047f9eee049,2024-11-21T05:03:29.317000 -CVE-2020-1454,0,0,102d3bda9578732be34083ac8a4ce88450249890ece06e3e4129dc9ab5729c3b,2024-11-21T05:10:35.097000 +CVE-2020-1454,0,1,eec4908922c76951b3f9721f29f135e2a4f2dfb6ee0e07165180ddee9bec15bd,2025-02-28T20:15:37.863000 CVE-2020-14540,0,0,a4f66b3cd1b61d31b7faf176289196804b5bede947f0dc5add8e750baa662e59,2024-11-21T05:03:29.490000 CVE-2020-14541,0,0,a65ea418c6ad7abe70485bda741854c6f23cfced643a475c9e387d2f5c5c62ce,2024-11-21T05:03:29.660000 CVE-2020-14542,0,0,ddb54854d8a34e3baf5e2734efc9758f67f7da260bc37923b6c796b8b4e5190d,2024-11-21T05:03:29.813000 @@ -149512,7 +149512,7 @@ CVE-2020-14556,0,0,40f75dd9f0039ebcf932da6d7f2c3fb99b4265e7e5479e3b61220a60539d3 CVE-2020-14557,0,0,4c39d8c3e2ddb71ad82c08b59232db64e85f027bdd6dc156ecd130cc405de97b,2024-11-21T05:03:32.277000 CVE-2020-14558,0,0,89258deec56db86b49ef85122db20db42a5f11b71d4cb54f09e7f0a8588d765a,2024-11-21T05:03:32.417000 CVE-2020-14559,0,0,6a07ceab572c5bf250b42a793e6d1234f0b80f55f8a44d19d20e7976479bc0f4,2024-11-21T05:03:32.567000 -CVE-2020-1456,0,0,8d61767e13b78d7264436945d84914f18995f9ac74bea58049549c6087dcd478,2024-11-21T05:10:35.333000 +CVE-2020-1456,0,1,ea5e55b05a10bd8be4fe33f5833e1fa341049f5db07937a478f4348103097e0e,2025-02-28T20:15:38.010000 CVE-2020-14560,0,0,b2fdb32f00deefb5c53ca1b2eaaf416745be8fef27107af0206aed542b693fcc,2024-11-21T05:03:32.733000 CVE-2020-14561,0,0,d287e0c6c1d82fe55d1ecd12b7688fa6e9be475146719950d240e712fe8eed29,2024-11-21T05:03:32.887000 CVE-2020-14562,0,0,a39d86651b8d0bdc75e5730fc1116b4ae2e1b91622032b18c2633160b58a4b6d,2024-11-21T05:03:33.037000 @@ -175566,7 +175566,7 @@ CVE-2021-31169,0,0,447b3efcde908dac8046ec7a333cb9a072959aa97a8adb964c4ffb40557ef CVE-2021-31170,0,0,40131331621efbe32c243bf7b55ce85bdf7ccf8228f381138514cdf380c7887b,2024-11-21T06:05:13.657000 CVE-2021-31171,0,0,a58701c6a4cf7bc31686207b1a48e8c64e4b7f686f4baf2099c5af86b85bd273,2024-11-21T06:05:13.787000 CVE-2021-31172,0,0,76547b305fd5663f53a41e8b6f3237739bb7e98e228857c2c707668b8a3a99e9,2024-11-21T06:05:13.900000 -CVE-2021-31173,0,0,61517093d037c4a722988de7be314ba48fb833802c236c322f5cd7a834f8183a,2024-11-21T06:05:14.020000 +CVE-2021-31173,0,1,6dbd68e90bd3c6bfc212fd7bda58a44a145a4efe2fa37f4aaaf13db736068a5f,2025-02-28T20:15:38.377000 CVE-2021-31174,0,0,b25794a3e9dd1801aa7627445ae502c12f21fe1f725afab4db4a311416e23ef1,2024-11-21T06:05:14.150000 CVE-2021-31175,0,0,2459cbc56ad42e8ddde42040fd687d256dba28d4e8a202f117f9ede5d2fd3fd8,2024-11-21T06:05:14.277000 CVE-2021-31176,0,0,c332463115be9e7a86a1c2431f67439f529d670189f483ce228d8f7696391801,2024-11-21T06:05:14.413000 @@ -175589,7 +175589,7 @@ CVE-2021-31191,0,0,7e2f161ccbad483edd7a6a7cde20462a0ccfffeb1a852f28b9b93b68c67be CVE-2021-31192,0,0,f07ef651578ca9860c64ae55919cc415bc34f952a26a3c22506cd89556b08f09,2024-11-21T06:05:16.480000 CVE-2021-31193,0,0,23aa20450819871fc24e6a5975ecd1defd4313ad2c6c4bbc2cce4665b72887d1,2024-11-21T06:05:16.630000 CVE-2021-31194,0,0,f6d0a81f0c364cc20dab4b9702435b1cab296ad6ac5379fa6b7c529c010b76bb,2024-11-21T06:05:16.790000 -CVE-2021-31195,0,0,24586e87802e942a2ec45671a68d27180595e49a5e88881c18f83219471b8393,2024-11-21T06:05:16.940000 +CVE-2021-31195,0,1,9f863898bd9e969b2def3de1f906368bf88bdb18f77e1d61ae70d6cf8852ee8f,2025-02-28T20:15:38.533000 CVE-2021-31196,0,0,5bd2b20f4c797e4403b16ef472d84aaeaff3147da601441171f7c7ed4f735236,2024-11-21T06:05:17.070000 CVE-2021-31198,0,0,e532369bd52ba0f23975c6d116bd36427381517e49a6856208c7ea4cbf4d91e9,2024-11-21T06:05:17.210000 CVE-2021-31199,0,0,8a60c80d1a2930ff613791bbbc9f609dd71865f7524a339b687deeba554dc19b,2024-11-21T06:05:17.340000 @@ -175601,7 +175601,7 @@ CVE-2021-31205,0,0,2b1f22e4a9affd3ec177218e6e1f7a3797503f61f2b5e94c9b10bbc1cf49a CVE-2021-31206,0,0,d800ed47a3c2c2e4e60c6740beeb55e2111afbd5a2ed66aad11870b68ab8c567,2024-11-21T06:05:18.140000 CVE-2021-31207,0,0,f1ad0ab3196e20cd0a4444b35be993bc5dd9fe47864911ff483832ee10522c55,2025-02-04T19:15:24.310000 CVE-2021-31208,0,0,73a829c7364bad95d494eb610c61f0f6aa6db53a37e9339b4eb71792b20005e7,2024-11-21T06:05:18.403000 -CVE-2021-31209,0,0,594bb0a565b66fe20bcdcd2d102fe4da974eab1763e07f9a441e1a9457aaf2a5,2024-11-21T06:05:18.523000 +CVE-2021-31209,0,1,ce7c14a31b399a369b6067a4ad1a495029ab40e4a159a71f303eed5a345df5e0,2025-02-28T20:15:38.687000 CVE-2021-3121,0,0,3b94eae29042e2bc3082dd38a3f462cd10b39dd24187bbe3f6e06e20f97f418d,2024-11-21T06:20:55.957000 CVE-2021-31211,0,0,b861733dffe829a08e653091cb221ac5eb242eeceba32812acd13fadc86c3261,2024-11-21T06:05:18.623000 CVE-2021-31213,0,0,dd81c13f6cb369c08b96a1d4db764d6be31a3d033973d0f38f2b0a9edb64cdfa,2024-11-21T06:05:18.733000 @@ -176158,7 +176158,7 @@ CVE-2021-31933,0,0,308e3c4348898d39657c0252fb3fc84ba036f2d9d72096f4351a9aa18599b CVE-2021-31934,0,0,bdcdeba76ec796043a39460f835f19770c9eeb92f443398fde42216fc1cd3eca,2024-11-21T06:06:32.700000 CVE-2021-31935,0,0,b1b518ea7de708064c4d14f9e1a5510624d7d2ea8821b6cd9bde2f0fd2a223dc,2024-11-21T06:06:32.850000 CVE-2021-31936,0,0,a53d6f6a47090064b46686326c81a36c301029f3211d9a1515f16dd39e89e560,2024-11-21T06:06:33.003000 -CVE-2021-31937,0,0,c20a769f306f4a681a4e7e5f1bc2b306262912648172b4c2d38583154f5c8b08,2024-11-21T06:06:33.127000 +CVE-2021-31937,0,1,109c410ccb58a94eae7f9ea386724c05402efedd2e36bdc642c1f8d94bdbbe96,2025-02-28T20:15:38.843000 CVE-2021-31938,0,0,1ce1e819a4c1d075df6f8f39678c802c2b7e6b246a221bed61bf3c4636cb840d,2024-11-21T06:06:33.253000 CVE-2021-31939,0,0,0d89a9a3d121dda56441416aa9d0cd520a48a18a6f63fc5855265b0bb6960ba7,2024-11-21T06:06:33.377000 CVE-2021-31940,0,0,5ab9c4eeed983df268b1b803bde589fcb04960a48582e82ddc7fcc7437f5bb71,2024-11-21T06:06:33.530000 @@ -177721,7 +177721,7 @@ CVE-2021-3412,0,0,969aea9f7608ee2e680dd204564a144bea3f1efb6905996914633fe17dd48a CVE-2021-34121,0,0,b5867846d0acdb409b6dac5a79e0fb08f07abb2f06f8adeffd6242b203d43d82,2024-11-21T06:09:55.387000 CVE-2021-34122,0,0,2bc15579b9cc238d8626ce04004c284bc6eead07e16aae58171e388cb25cc407,2024-11-21T06:09:55.550000 CVE-2021-34123,0,0,f75c9823e103b6de4f6bb6fe04f2f6dedeb20c5f2c3e35438f2f75c4b7f38b02,2024-11-21T06:09:55.717000 -CVE-2021-34125,0,1,795bfc78c84a96f180a39d99b490ece3e1e62c9c282c0028db2f4c7ceefa10a0,2025-02-28T18:15:25.293000 +CVE-2021-34125,0,0,795bfc78c84a96f180a39d99b490ece3e1e62c9c282c0028db2f4c7ceefa10a0,2025-02-28T18:15:25.293000 CVE-2021-34128,0,0,012752ae8799e8d1007277e12c59d85c4c04e0e33eed92a4ebcde33769de6b7c,2024-11-21T06:09:56.077000 CVE-2021-34129,0,0,d9d780c5649458314f7ca9a2120f65f607a01d82603806e945998e4b9f6c0353,2024-11-21T06:09:56.237000 CVE-2021-3413,0,0,c1e9656bd343e0163cd16fec7abce6f7ee2844ff100e8adbf0e7e1a44320ed60,2024-11-21T06:21:26.967000 @@ -190272,7 +190272,7 @@ CVE-2022-20463,0,0,f740ca12bd3ad11a241afab7b7f7cf6b59dd2ba49cf45cb3de7e3d883d4bd CVE-2022-20464,0,0,924ac0a427fcdb5d15a9bf14c8336ad304f74297ac2ad48bdef4b94f344cb0e4,2024-11-21T06:42:51.647000 CVE-2022-20465,0,0,57d7367c78c2147772238aea84e8db3dcf4efba2509eae14c2e80467bbb9a5b1,2024-11-21T06:42:51.770000 CVE-2022-20466,0,0,32a0433bed28941a8103b3344d1447b9cb911f7efc25d6bbfb1496836a908a64,2024-11-21T06:42:51.893000 -CVE-2022-20467,0,0,15a9da92c401294558cdeffd535713368b1610e46dd47399f41c938498b7fd3f,2024-11-21T06:42:52.020000 +CVE-2022-20467,0,1,584132663346540064320e798d49e2aa4fbdf54a027a5f0c50ff68159bf30e0e,2025-02-28T20:15:38.990000 CVE-2022-20468,0,0,9151d324d88787d69f259c8dbdfe3acec69b9a15e7ec128a5933db2090baa8e0,2024-11-21T06:42:52.140000 CVE-2022-20469,0,0,19bb0e53183e02ee3a8962b45e7e9265744ef4217b69cff6d041c870d24d8dbd,2024-11-21T06:42:52.270000 CVE-2022-2047,0,0,809879af7488392da6cd8bb497d9ed2446df52f5a2aabcb79fa3c240fbc918e2,2024-11-21T07:00:13.840000 @@ -190307,7 +190307,7 @@ CVE-2022-20495,0,0,21ad4e5b9b5d1c0d56cc0ef67c2f0759937846d2aa7e72708898439c2a4b4 CVE-2022-20496,0,0,497a123efc361bc88daf1d6be6a9218cd9d8132728563eb2b2b72eef9db95f25,2024-11-21T06:42:55.523000 CVE-2022-20497,0,0,7079a93c3c8e1db9ad47b5d7e9397c6e9d81e511293ccf4fd65da2bec3caadbd,2024-11-21T06:42:55.640000 CVE-2022-20498,0,0,a9cc13963965e24d05819fb724d3ae95ce3070b2708b014d334c1353dfb294fe,2024-11-21T06:42:55.750000 -CVE-2022-20499,0,0,cd2c90562745c19ae101486c3a828cb55f0549082eca767f0ec09d019c443b03,2024-11-21T06:42:55.867000 +CVE-2022-20499,0,1,877e44e366e643c1614f7ddfe19db6480f131d92c9de4223d1d6c47aeba61347,2025-02-28T20:15:39.160000 CVE-2022-2050,0,0,65167bb8fbf844311b8804ba174c061c4decb2dabb828b56ce409f93a3c4cdbf,2024-11-21T07:00:14.217000 CVE-2022-20500,0,0,d55c16770263b57db932a1375eff15a0b98edf158a7f94d8a5a9d4a08bcd968a,2024-11-21T06:42:55.973000 CVE-2022-20501,0,0,55e265ce782a4aac411ee1b5f173a652cbf2894482298e7d9d6f4b9d22fb93ba,2024-11-21T06:42:56.087000 @@ -190343,7 +190343,7 @@ CVE-2022-20529,0,0,c10925cdaffe15fb9860ee60a74b3a9360fb5238c15ae41a6de4f5b4311c1 CVE-2022-2053,0,0,cc9b887742bbbeace6488a9dbc429fdb75f322878b6d18cc1605f54162663d83,2024-11-21T07:00:14.433000 CVE-2022-20530,0,0,672ba474de294fc820ca352bbd7b27bad57b19022f3c53ef17f56542b1949f2c,2024-11-21T06:42:59.487000 CVE-2022-20531,0,0,d9b7ba2f252ce907e717f820d7fd155d14db1564aa098bf87d8199d3dd950122,2024-11-21T06:42:59.630000 -CVE-2022-20532,0,0,dffbce4a2501f5aef5cec5fe789f09e41905809a36ead76fa52f533c3a15d4e8,2024-11-21T06:42:59.750000 +CVE-2022-20532,0,1,d00abdefedb30af391ac752f2dc3447d8ea1f0f08b56d0e8d70d1ef5c6879dd1,2025-02-28T20:15:39.310000 CVE-2022-20533,0,0,67bbdd3f6ba20871516a29131cdbc61cf847587ba01673810908ba3f5aff8886,2024-11-21T06:42:59.880000 CVE-2022-20535,0,0,d0d2768a6efbd54df7d4b12bacda0e147a509bcda19e149012a38cfabad4ace8,2024-11-21T06:43:00.007000 CVE-2022-20536,0,0,a80ed8b51c921d34c16444f3f85474b25d2452d129eada4ae683f1d6d1fb407b,2024-11-21T06:43:00.150000 @@ -190353,7 +190353,7 @@ CVE-2022-20539,0,0,e3e0f69cd625f3cd82b863845e7ca58fe492ce4630c7a3a494839bb50094f CVE-2022-2054,0,0,e0538643fd243fd3fe056b6ea31ad8492aa4903234e168000c391262ba893b69,2024-11-21T07:00:14.547000 CVE-2022-20540,0,0,e2e08587f8b6d0609d426f4c945d10f5c0f05769d3ead2067aec201ce91e5a06,2024-11-21T06:43:00.697000 CVE-2022-20541,0,0,7f45701da310d03d7ca4f2dad881892c958f09f630cf567175fd13e3a21d6ace,2024-11-21T06:43:00.817000 -CVE-2022-20542,0,0,abf619556dca0818b810fd44ef6d21cd9c951c9b0d17a5611d353b7b6bfceb90,2024-11-21T06:43:00.947000 +CVE-2022-20542,0,1,64fe4d3130513c3db633bc64d55dad919c1c5c4a7e5108c42a25de1dc64e1b69,2025-02-28T20:15:39.460000 CVE-2022-20543,0,0,f2989ef58f36a64988137a817cc2a061fef8a3af1d9296c1bb5f0dc11fc37468,2024-11-21T06:43:01.060000 CVE-2022-20544,0,0,61d3c3083c43fe435f5f16b44de976cfccfa10c84bd764afeb5c767e5b48b0ec,2024-11-21T06:43:01.183000 CVE-2022-20545,0,0,0b5e966404159755a60b369665b116b20384ff4f6633d2c0e8e854755cd522d6,2024-11-21T06:43:01.303000 @@ -198682,7 +198682,7 @@ CVE-2022-30179,0,0,fd9668375b6bdc3bbfea5f72d745b1473aa042f289e2c883e8a137fd37d57 CVE-2022-3018,0,0,fcc44e78c68b11dc92b17355841993dd0b2a77f1eba045ea9989392d732c7f26,2024-11-21T07:18:38.860000 CVE-2022-30180,0,0,ef416089ad2d88b702e949cca9ea6f4be67e8fa84bed56c547b187dfcad29d89,2025-01-02T19:16:21.833000 CVE-2022-30181,0,0,c9b0f146019b01be1080759318f36da7768f0728182545d48514b79e0ba4f88c,2024-11-21T07:02:19.587000 -CVE-2022-30184,0,0,be446bb73e4c82066f7b19391d2395ea019095f5528720820f48c0606a602584,2025-01-02T19:16:21.950000 +CVE-2022-30184,0,1,a94d9c34dcb1c6f60070b3b81f33bee31c58491724c4daf0af0f8253e33d5631,2025-02-28T20:15:39.620000 CVE-2022-30187,0,0,607501c778be3bc5fa6c061564ec771fb1c2e5b83fbd551538ed55c8ae29f7a3,2024-11-21T07:02:19.837000 CVE-2022-30188,0,0,a0c743b3654516de00b971a72bafa2b41635bed46aff12fadc9168b8bf5de200,2025-01-02T19:16:22.083000 CVE-2022-30189,0,0,be04064b3ad5b3a61777506296101d3f2b4c2ab93a2314c9119d43cc77b86c28,2025-01-02T19:16:22.197000 @@ -204696,7 +204696,7 @@ CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a0061 CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000 CVE-2022-37660,0,0,58491ea394aa7c735141b394ba0276aa3a15bbc95058da85744c30737dcefd81,2025-02-12T22:15:29.167000 CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000 -CVE-2022-3767,0,1,ed3cd922c5ded514b552cac9f45e3c1a4d69fd46472e97df4ac10ba5025d6152,2025-02-28T18:15:25.663000 +CVE-2022-3767,0,0,ed3cd922c5ded514b552cac9f45e3c1a4d69fd46472e97df4ac10ba5025d6152,2025-02-28T18:15:25.663000 CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000 CVE-2022-3768,0,0,857736c58330b0e35ff7a3d6b161358f07f0524bacac925a9a494e5203d72703,2024-11-21T07:20:12.563000 CVE-2022-37680,0,0,0f45f78801f17e1f85d2fa1a73ca26a0150735d21b0b3cb11777a8712f135f61,2024-11-21T07:15:04.530000 @@ -209022,7 +209022,7 @@ CVE-2022-43305,0,0,12c27bf76a3d51e933d67b2c21d011066d54bef11315e21d3959af0ec4462 CVE-2022-43306,0,0,daa702927085118174c9cf30f54cfa5109f225e65533a274b75cecccec70508b,2024-11-21T07:26:14.587000 CVE-2022-43308,0,0,a3c32d5f52554878946f0e8e173050faa4c314234b1af4d9eb5b16ebf4a896c5,2024-11-21T07:26:14.757000 CVE-2022-43309,0,0,25335bc44ff0eaaf094c1babc3cc34e726365ea079646d7153cb7f44379d21bc,2025-02-11T21:15:09.697000 -CVE-2022-4331,0,1,324c3e522222b33aaeb07e99c338d86895ba38dd3746448869cd7624cb0108c3,2025-02-28T18:15:25.947000 +CVE-2022-4331,0,0,324c3e522222b33aaeb07e99c338d86895ba38dd3746448869cd7624cb0108c3,2025-02-28T18:15:25.947000 CVE-2022-43310,0,0,ccc191578241357ed39d1d7217e9ce9b105d084e09c97025bcc9eaacd64cc88e,2024-11-21T07:26:15.830000 CVE-2022-43317,0,0,5c92f7affa1327a88b24e08ee8c4c96db343d2ada2927900f507c838f8b56ec4,2024-11-21T07:26:16.077000 CVE-2022-43318,0,0,a2668c71bbd2a17809493decbc0772fa85c9c43e6b0a838d5b02acd868707dd7,2024-11-21T07:26:16.237000 @@ -215072,7 +215072,7 @@ CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a CVE-2023-1202,0,0,e995e212ebe63e7f0467b64e16d67f68aa9e5461a685e3b0d682958b41fe5915,2025-02-20T21:15:24.633000 CVE-2023-1203,0,0,2c91a011fc8bd4ea016cf3e67f1e6f2936594e64abfa5a016428f0a01e709b9b,2024-11-21T07:38:39.760000 CVE-2023-1204,0,0,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000 -CVE-2023-1205,0,1,7664848268797b770afb2d9857c52c62b388924b546ea4cdebbf8dc8b5f1f08f,2025-02-28T17:15:13.583000 +CVE-2023-1205,0,0,7664848268797b770afb2d9857c52c62b388924b546ea4cdebbf8dc8b5f1f08f,2025-02-28T17:15:13.583000 CVE-2023-1206,0,0,61a6d8638c87f97f2726781e2179014defc8f0359aad79a22aeca86d4eb775a3,2024-11-21T07:38:40.070000 CVE-2023-1207,0,0,be4a7cb974be7ce9f2ad18230d631fe96a11eb7b0083b1d0ef328f835a67382f,2025-01-24T21:15:09.660000 CVE-2023-1208,0,0,d52a776035eb97ed9d642bd10d0f32d65b328ec14e7ea80bd31af7065808200d,2024-11-21T07:38:40.303000 @@ -217351,7 +217351,7 @@ CVE-2023-21715,0,0,d2e7a81f7d68f0c480379ac2ccdeb9b3ebceea8616532ef965c0a4fa347f3 CVE-2023-21716,0,0,ad0f14110c9c94a0a58aeed9fd7dd6b2c2c61bbba9c251e02ff545f237448e86,2024-11-21T07:43:29.853000 CVE-2023-21717,0,0,5d705bca19752be9d11d65ce9f294a675e0c7c2df02156816b58f244babbdff8,2024-11-21T07:43:29.993000 CVE-2023-21718,0,0,c9cb58903163963e0ff91d227721f5a6f31d7c877cdb3900ef3f4e255ae68d11,2024-11-21T07:43:30.117000 -CVE-2023-21719,0,0,6bf855c0325c540cf5651a8f35de080cd8ed66ade29e6c11d17fb04757949e00,2025-01-01T01:15:19.883000 +CVE-2023-21719,0,1,632458b500b3d5fd2489ad1a27f5dfbeda95127f6686f3ece9e719688c4b197a,2025-02-28T20:15:39.963000 CVE-2023-2172,0,0,b692d9bcc456a5c1dda926a32bf1ec3dd5514f32c3576a77142f581d1744f846,2024-11-21T07:58:04.720000 CVE-2023-21720,0,0,23a004a91d4f53c918e14fb5d3f548a63b17913fe196a14cf34c80a5209c1f3c,2025-01-01T01:15:20.017000 CVE-2023-21721,0,0,df46aca9340b0d535ccdd066275fbff36c6f99a481aa893df56abe263edcf234,2024-11-21T07:43:30.490000 @@ -217430,7 +217430,7 @@ CVE-2023-21790,0,0,bbfea0e558d87b03c2717255d3e5c811dd971e1f0844b973600036e2ad6b5 CVE-2023-21791,0,0,118ecf5763039dd5ddd198cac11cb242ef8a9526e35d74843524710cd3bdd4e8,2024-11-21T07:43:39.450000 CVE-2023-21792,0,0,125ad34890fe142688e3f25013ef35654f8d00e9736a23df582592c2c001e600,2024-11-21T07:43:39.570000 CVE-2023-21793,0,0,9d598276b1ee22af7777b3c64e60212e953f9126bc3af5a3aba73f42f54c9107,2024-11-21T07:43:39.683000 -CVE-2023-21794,0,0,315c4b37a7c778e4b1db504418650187e322892d7606b1bd98638d3a2af9332f,2025-01-01T01:15:28.320000 +CVE-2023-21794,0,1,6b662c094bbf3d093b5cc3badc09605872bd9b803e42bf523aec3e0d6d54e5b3,2025-02-28T20:15:40.183000 CVE-2023-21795,0,0,c1d9ba786ae7a3af62f29ca85c28a9f375806b466cf2bc2a0dffa744808ae1b8,2024-11-21T07:43:39.923000 CVE-2023-21796,0,0,46ea9df62ce1e27b6c4fa0899508598812d4a3a13138697d29e6c3c61964e7b4,2025-01-01T01:15:28.520000 CVE-2023-21797,0,0,caf33020db36bcce29f533019a9e71b5b3a000ceb1d373b108122c8a16c4128b,2024-11-21T07:43:40.163000 @@ -219683,7 +219683,7 @@ CVE-2023-2453,0,0,b4682b88f88afa2ebdcd456dc9795ff06061b8bff91c0bd4d2c1492887ecb5 CVE-2023-24530,0,0,7ef676a634c8aba369f9683a0389e1bdb2255cfb96b6e799493b54b2b4a9416e,2024-11-21T07:48:04.043000 CVE-2023-24531,0,0,b51c2dd327b8e15296fde49ea9eaeabb04a4dbd8bd91fd75e870ab4f55e86066,2024-11-21T07:48:04.190000 CVE-2023-24532,0,0,88581f6b3392e74b951288a160bd414980d6e6f0465084eb25057ace37266e39,2024-11-21T07:48:04.383000 -CVE-2023-24533,0,0,9c25eae470ab995f4601fccaddde73c53913b219aa31ffd47e784ec337cdbe9f,2024-11-21T07:48:04.520000 +CVE-2023-24533,0,1,6648d1bdd94fa7bb91a5be3a6508c5c3313b2cbdedd755f8162815954988667d,2025-02-28T20:15:40.550000 CVE-2023-24534,0,0,3f190c9bf555ba8a80f7c40ca4f179383ac59048cc10bea8746879b358c59684,2025-02-12T18:15:19.837000 CVE-2023-24535,0,0,9101527fd9107c5386236adaf2ee7bf3fcaeec19ee7ec12624ba60305ac5f307,2025-01-06T20:15:25.153000 CVE-2023-24536,0,0,b0ff09854d2912b9bfc6717ac421bb1d2734a1f17276fb3732fd29efba47acc3,2025-02-12T18:15:20.083000 @@ -219949,7 +219949,7 @@ CVE-2023-24887,0,0,0a51b2549252711cc2c924f14ac2cf21056ec8d5ec46b8caa58ba29516c9a CVE-2023-2489,0,0,5a424baee54accf15cb35e970432f5c16b21b4a2d25b4c6512fb478e634bdc3a,2025-01-08T17:15:11.450000 CVE-2023-24890,0,0,0c9591a70fb15e43dbe8f570343175177ad2f9d0f1b8dbedbc9cedc1c2972968,2024-11-21T07:48:43.077000 CVE-2023-24891,0,0,6d09c3103d23416d7e1f9cd2dcfc7ab06bdff03290f23f0e1a8fefe151239e3d,2024-11-21T07:48:43.183000 -CVE-2023-24892,0,0,00f38f29ce286e181827dcd91d90594c674ac3abd8ce9bca3b40489f44f45951,2024-11-21T07:48:43.293000 +CVE-2023-24892,0,1,f0dd7a49c48fd986bbcc659d21d01708993109799373639844ff051b4a49b19c,2025-02-28T20:15:41.343000 CVE-2023-24893,0,0,8627a23e388e284cf88678588e944a3f2e53919cf726af6b8c1d2f82c9572708,2024-11-21T07:48:43.397000 CVE-2023-24895,0,0,04bc1307e556e27de816a66d9491db01faddf8128e5015116cdad5aefb041734,2024-11-21T07:48:43.507000 CVE-2023-24896,0,0,51437fa19d80d9021db06310e3a4cd99648d9935ac62052618478ab1d0b7ed93,2024-11-21T07:48:43.680000 @@ -219990,7 +219990,7 @@ CVE-2023-24930,0,0,9f9e561c144213e77edf7be5969762b4d914f545cf0c22227904b800cf15e CVE-2023-24931,0,0,4cb3f680aee2110301457c68ae711581649c05db20ed022c69aef2e15fdee122,2024-11-21T07:48:47.493000 CVE-2023-24932,0,0,69e57209b8f96c1cad11574f2f7d5e74b2418f4aede963515c0c35c6fc327082,2024-11-21T07:48:47.630000 CVE-2023-24934,0,0,b063256a223adfefb231bf44cf66744c128745708e070ccb4c8cf146c607f43b,2024-11-21T07:48:47.787000 -CVE-2023-24935,0,0,a464a2a549bfe1345b9858d182cccaf8f191895f87138caaa3956d068ac27ce5,2024-11-21T07:48:47.897000 +CVE-2023-24935,0,1,44066e8436a2f4e902889f0d88724d97f848e5db883c16437a126b68806e4afc,2025-02-28T20:15:41.810000 CVE-2023-24936,0,0,505bcf4b6a5f58019032a1d5b6159bf29aaa4d730ba53d1a3bb4919bbceffcb1,2024-11-21T07:48:48.003000 CVE-2023-24937,0,0,45be0bdf310f7ea0dae27b5a09535a058dfe5731f6609e52cf4744010d4cb0b0,2024-11-21T07:48:48.187000 CVE-2023-24938,0,0,d12e34f15419e9b00a7c637a8a6db492342337e0d2eee9897fa539eb02d353f6,2024-11-21T07:48:48.330000 @@ -221597,7 +221597,7 @@ CVE-2023-2694,0,0,72e811aa867f48857621314bf4324f5df27a6ae616794e4aec03639605bc66 CVE-2023-26941,0,0,57d4ee1203db9f5ebf62aa2c8bd4974c18b4456e58e83610e5290d9cf41ed223,2024-11-21T07:52:05.183000 CVE-2023-26942,0,0,2339ba278c7f8252ecf4c15ae0752ef4d8eae3096644956b91fbcf8d3b9c7627,2024-11-21T07:52:05.357000 CVE-2023-26943,0,0,40224a5889d9a9d46f084ff88f91a23a22a2c393975db40c4df8c233b125300e,2024-11-21T07:52:05.510000 -CVE-2023-26948,0,1,385254368d76362ed022a3338e9a32f9da4c64e597dcc2197c790fa2beaed98b,2025-02-28T17:15:14.537000 +CVE-2023-26948,0,0,385254368d76362ed022a3338e9a32f9da4c64e597dcc2197c790fa2beaed98b,2025-02-28T17:15:14.537000 CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e6a0,2024-11-21T07:52:05.803000 CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000 CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000 @@ -221712,8 +221712,8 @@ CVE-2023-27108,0,0,1099d4cf449e520df3fbd66a5a4e50d6e79831543c9ea6178d1d6936cf0cd CVE-2023-2711,0,0,c43472a8c20d741979b439e3bc102f5f9559519492c61f60f11a183488cbe254,2024-11-21T07:59:08.223000 CVE-2023-27112,0,0,c774cf85d81c80129533bf646412bf90ea6f5237c5710046800ee4b2a48c7108,2025-02-18T21:15:15.257000 CVE-2023-27113,0,0,69a9cd4406791e0f0edf7b14c6a9730ec8c5d368f7cf21673155b131d43b2144,2025-02-18T21:15:15.423000 -CVE-2023-27114,0,1,6d20106e26ce386d27e886e8c6bae4f20477e5dbadcd54bcb5e95825090db29d,2025-02-28T17:15:14.700000 -CVE-2023-27115,0,1,b589180853fba8be593b3bbd8cb52a4af90c189fa4d468f80d19f72bb70c37b9,2025-02-28T17:15:14.880000 +CVE-2023-27114,0,0,6d20106e26ce386d27e886e8c6bae4f20477e5dbadcd54bcb5e95825090db29d,2025-02-28T17:15:14.700000 +CVE-2023-27115,0,0,b589180853fba8be593b3bbd8cb52a4af90c189fa4d468f80d19f72bb70c37b9,2025-02-28T17:15:14.880000 CVE-2023-27116,0,0,7d525dcb4562516f5c4677c4ad00b6ccdf54bca9cd52069a24c21acf3c3cdd6d,2024-11-21T07:52:21.647000 CVE-2023-27117,0,0,1b564ab1213c636ed1bcb1211fbe55d3326a995724dbdd798730a6c18bee89dd,2024-11-21T07:52:21.810000 CVE-2023-27119,0,0,51fb3235aa7b5f301532d8ee70768c14a0f27923234589bfe8f3e8db5027a9ac,2024-11-21T07:52:21.940000 @@ -222300,7 +222300,7 @@ CVE-2023-27847,0,0,62844f23ee37935036e80ce5acf5576fe72d6fb6cdc26d04ce4f7c19760ca CVE-2023-27848,0,0,0c963388be691de5974f167a6917467d90a4a8da3b959203f2f48699548ee7ad,2025-02-05T16:15:36.227000 CVE-2023-27849,0,0,a672b66aee18b9240ef056f8fa5466105af02d52c649cd6384b53c8d39a9a732,2025-02-04T21:15:23.217000 CVE-2023-2785,0,0,32a4fde4055fab2ae0babd5e2df22df8cc2bf5be43e046bbe98a3b2c6842764b,2024-11-21T07:59:17.157000 -CVE-2023-27850,0,1,e4dc3543b1d3c6676e31fd27c71cc1000c020d326d1cf2d793d1eaf8990b450d,2025-02-28T17:15:15.147000 +CVE-2023-27850,0,0,e4dc3543b1d3c6676e31fd27c71cc1000c020d326d1cf2d793d1eaf8990b450d,2025-02-28T17:15:15.147000 CVE-2023-27851,0,0,e6d6689512d20e5f35b65b78d927887d267ddf3e4c7abef9913d6309dc198226,2025-02-27T22:15:36.340000 CVE-2023-27852,0,0,798a42f761c19dfa9f428a38b58782ea672ff1e555e9d9aaf2c413adeff5ead5,2025-02-27T21:15:20.190000 CVE-2023-27853,0,0,37de4f02aec728af66cd81503dbf0c8e9a5f170d774b180158ed1b3b15508a54,2025-02-27T22:15:36.497000 @@ -222344,15 +222344,15 @@ CVE-2023-27894,0,0,51b9847babfee2e96caec3531c552a8d5a6a7290641f44f4e2e8900de7575 CVE-2023-27895,0,0,3ee7ed528f3e60bde9e8591b88ad1b97f320b1b58ec743d2512e87df6adc9eb5,2024-11-21T07:53:39.167000 CVE-2023-27896,0,0,843001d67bc83f4d91d578097c66211143bff4345647144bbd82f5c4fae41e93,2024-11-21T07:53:39.303000 CVE-2023-27897,0,0,4a603fce579f456f5cc79162ef30f6a4946fae8eee105bca3ad5c856c069c643,2024-11-21T07:53:39.440000 -CVE-2023-27898,0,0,bd7a6f33bab75f875019d369e4526218bc9bf87faa878068f3da139964145ea6,2024-11-21T07:53:39.583000 -CVE-2023-27899,0,0,acd24e74b764b764e7ff85222d21ab04ef1cc1abd941d3a1f64667edea9e371f,2024-11-21T07:53:39.690000 +CVE-2023-27898,0,1,84a6a4e2637cd01511ca4f84a87c76aab67fce6af618b00f5f1c204163e29623,2025-02-28T19:15:34.900000 +CVE-2023-27899,0,1,7c1ee45a4e590d2ef4e21579900f5df88586b9e1b9a04f3611871fea5cd843bd,2025-02-28T19:15:35.080000 CVE-2023-2790,0,0,d3bd5fa1585324842727d9b49fb577f5bbbc290406689dd80c04885a927aab55,2024-11-21T07:59:17.737000 -CVE-2023-27900,0,0,7c71ae593bc493ab9041756fc8548df94247b3c0f5c0de1f63a37080f3abf312,2024-11-21T07:53:39.810000 -CVE-2023-27901,0,0,75eed83e36f2b6e673c0d8f11b6ab07793e668ba8db84ff911a5ee2a6a2ce673,2024-11-21T07:53:39.910000 -CVE-2023-27902,0,0,5a7afa3bd09cb30d11e99cd3a7fc28e0609fc9be329ddd95f34a4a77cfee3ec0,2024-11-21T07:53:40.020000 -CVE-2023-27903,0,0,e46e5f40543432cc18c3b6e9bf1c927ce04a641d4fa05d71e34520ad1a9a2e72,2024-11-21T07:53:40.133000 -CVE-2023-27904,0,0,6241dd57d127cc2d03349dfb0f3a19dace4df51e8dd9b7affe039a9ed5d7e8ee,2024-11-21T07:53:40.247000 -CVE-2023-27905,0,0,74532d28f54c06cfde21f7f83bdd9076b93ab08f5f555eff743588e0ef9c0dde,2024-11-21T07:53:40.353000 +CVE-2023-27900,0,1,e3285dbf097ed8d8b02dad241d9d404d1cbc50522f258d0ef7ec8e92a78ad6c7,2025-02-28T19:15:35.247000 +CVE-2023-27901,0,1,00afbb94d39fa9163eeda1de41529e82e98af2055db426644c011b245c63c08e,2025-02-28T19:15:35.403000 +CVE-2023-27902,0,1,f161a8a93192c8048027541b7d1c81591d69c0f147783b37f05147b79e04bd96,2025-02-28T19:15:35.577000 +CVE-2023-27903,0,1,9f1e67879177bbd7dceafc1c4f917a5eefa6f6205b9b673750a191132be23433,2025-02-28T19:15:35.723000 +CVE-2023-27904,0,1,c9e29d23bf4a5b61198fead0a2f7cde47c8f21f6bdb39d76f451d59447a8d24e,2025-02-28T19:15:35.873000 +CVE-2023-27905,0,1,d8a08bf7038de912bc9b0c2b43045765438793602cb27f70ae740fc748090e3b,2025-02-28T19:15:36.040000 CVE-2023-27906,0,0,f84678a5c14a673f495d39cce279b3cafcb33503667872993215ce720672ccc3,2025-02-06T17:15:15.723000 CVE-2023-27907,0,0,529fe9f7de350e05957a30f54fc992aa1ae328976234ed8cc58cc625af878bcb,2025-02-06T17:15:15.877000 CVE-2023-27908,0,0,e5b5aa6cccf644aed2de2858000e2e481e5a1e753a191644f6fd5a2875689fb6,2024-11-21T07:53:40.683000 @@ -222706,7 +222706,7 @@ CVE-2023-28255,0,0,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f179 CVE-2023-28256,0,0,53d012c4f4b9abca5c1a189025597db086560275d3d5102dba44da8993793d55,2024-11-21T07:54:42.730000 CVE-2023-2826,0,0,5f07de1819d0003ff8e578a142827c865b94157521575a450c8869e18dd04831,2025-02-12T17:15:20.110000 CVE-2023-28260,0,0,9d42909900dc5b743b635c40edb3388a3a1b977b27abb173433e9bf06d8a3542,2024-11-21T07:54:42.873000 -CVE-2023-28261,0,0,f824058de5eff95abc36d6f6a46bba4e2c5eb13948639fd11bcfe28268e84d37,2025-01-01T01:15:44.280000 +CVE-2023-28261,0,1,099dfc60fe9cad7829d84140e9f27b8c475cfbabae635b3fd144bb49045f52fa,2025-02-28T20:15:42.067000 CVE-2023-28262,0,0,5688fdb5c21f038bb05742d43ee3ebb92be8fddb0b80ee5d81721383b6735563,2024-11-21T07:54:43.140000 CVE-2023-28263,0,0,48218d485f27fcdc8957f621c7d4aa0fe8187a4dccb65445dc074430a9ec6a34,2024-11-21T07:54:43.273000 CVE-2023-28266,0,0,466ca78921baf11e6120c13a28d81ef39d9861bf4a872c75b075323c4d8d00e0,2024-11-21T07:54:43.407000 @@ -222725,9 +222725,9 @@ CVE-2023-28277,0,0,657a7cb51bcd262ae465b48fb5cc2738f33eaa082d0cf305a1a6b58ccbab4 CVE-2023-28278,0,0,d6e5f85eb923c94d6e2f6deb971e32f2b4acef13e2303b60fc3047f28c83242c,2024-11-21T07:54:45.130000 CVE-2023-2828,0,0,a371c564bc5051c7daa5d723658e0ad0cbde32021c5dc6c3f2f1c91a8f0e860e,2024-11-21T07:59:22.150000 CVE-2023-28283,0,0,02e2f2a7203b3861503e7b160552cadcd206518a229a8ce3d0443ed5fd7c1d2a,2024-11-21T07:54:45.273000 -CVE-2023-28284,0,0,3d921aa1718834b3faeb6fcf3a3a7497450bca669e20eb0e92b4d8b26ac05626,2024-11-21T07:54:45.420000 +CVE-2023-28284,0,1,fe156e3ebe3e09c6a457e0cbf52f3fc401811d50cf4f7171b9dc36366d492897,2025-02-28T20:15:42.217000 CVE-2023-28285,0,0,bffce47a511701c672d6dbb7f2c407c6eba0aa8c1b86a8a603a5ce6bed3d46b4,2025-01-01T02:15:27.993000 -CVE-2023-28286,0,0,906a963bd5dd8f60b9f3b2ac42783ec5daabdeed7322659bbce7bd86fc88eec9,2025-01-01T01:15:44.420000 +CVE-2023-28286,0,1,4aac1cdc197747449758e7312c2d0d352ab13e79b4fc9ceddd49cf317466a488,2025-02-28T20:15:42.360000 CVE-2023-28287,0,0,450f128d8cc60abae7a7311bf9f2f3652ccd28483332b949efd1b7c78aacbfaf,2024-11-21T07:54:45.827000 CVE-2023-28288,0,0,5093b285423c1d16cfa9dcf547b753158acbd3a696c51969307e022d2c719c95,2025-01-01T02:15:28.247000 CVE-2023-2829,0,0,ebbb99be5ef9f212ce39405dbc1217e37028f76941bdca8ccb91a39adaaf1790,2024-11-21T07:59:22.303000 @@ -222742,7 +222742,7 @@ CVE-2023-28298,0,0,27d98d1a1c8be95757d28327184cd0dd130dcb4fd2affc307b1d4802caa63 CVE-2023-28299,0,0,151b97af0fd12592cef19a08217c6ccf186f1c8975a380f67f50bb0eaafb3253,2024-11-21T07:54:47.197000 CVE-2023-2830,0,0,afa9f35d5f92e9adb5e591002c9550a94202603384c5cff69d3a30a0f7b43281,2024-11-21T07:59:22.423000 CVE-2023-28300,0,0,812c280bf87b13295521f04f7cc6bd8d0a2ed615cab7a8fe9c057e24fe6e3637,2024-11-21T07:54:47.337000 -CVE-2023-28301,0,0,11f942d09a75a1f1d36c8760ecffe42cb42cf5fd9f8444c5aa7bd16b75fbfebc,2024-11-21T07:54:47.467000 +CVE-2023-28301,0,1,33dbe5b389b471ce06235096191b35a8b0910a6e76cae89e464bb7cdedd3d421,2025-02-28T20:15:42.503000 CVE-2023-28302,0,0,c0ed64707c937a115ef4295335123a6bc9891a84888456b11a9b02e3ea1c8dd6,2025-01-01T02:15:29.660000 CVE-2023-28303,0,0,177a685c7dbca7f5e511c6e6e701da63dc297ee31accda0a4197f4bb3f5dafc1,2024-11-21T07:54:47.747000 CVE-2023-28304,0,0,d2b1131b10699689d0d11b14f99b769843da22dfff9bef2fe414995080975fba,2024-11-21T07:54:47.887000 @@ -223712,8 +223712,8 @@ CVE-2023-2933,0,0,506fe21d298d60e81cfb459c778ed6f01e9fe9fb433eb44e4e20d5f10537cf CVE-2023-29330,0,0,b081a0b9606df4872e479593d4c39109a0a6e927bc23a0f9a36e4cdff9539df7,2024-11-21T07:56:52.567000 CVE-2023-29331,0,0,2c87d248fb12110e9d3681dbc35a6bacea3b3865feca7228ffb2a45f791233d2,2024-11-21T07:56:52.667000 CVE-2023-29332,0,0,426a3f2d7c6e1861c2689b1ef1d51fd2ed2c65028037d9c2f1e87622c3393c2f,2024-11-21T07:56:52.810000 -CVE-2023-29333,0,0,ebe99c0d1131974e4053f49a1a29c24033d2fe038321772c4830d71e04c90cee,2024-11-21T07:56:52.937000 -CVE-2023-29334,0,0,a2be4617c60955eabc94b1810147ba12fb3f251ab8d5e63a7300da6e524e3635,2025-01-01T02:15:32.397000 +CVE-2023-29333,0,1,796546d619f4f04132c9e8a9764a4f889c4e0aa249cdcdb7ff6170e208484946,2025-02-28T20:15:42.797000 +CVE-2023-29334,0,1,6b2dbb12ec70185bcb42557e8872a943d968b654b42d6f523db3792268bc784d,2025-02-28T20:15:42.943000 CVE-2023-29335,0,0,61181b1a8a11a5838648b960745a60fbd0089db6dfa8e380519644f6fe0f4ebe,2024-11-21T07:56:53.140000 CVE-2023-29336,0,0,d636ef46c4e59eff92a5ec73bf9aff4e82f4d80ff63c06cdba53f2761ef054af,2024-11-21T07:56:53.257000 CVE-2023-29337,0,0,56f7ebb5d77e680d8eedc44e0115faf21d19e36d9a2d179e33c83a37194e5627,2024-11-21T07:56:53.383000 @@ -223733,7 +223733,7 @@ CVE-2023-29350,0,0,e4cb2f7ec0908d2b3b078b0f23e5d927b06a084bd131812f934270e4638eb CVE-2023-29351,0,0,c6062460c858a11fa54fe28b1df1eb831b3681fa11b330d5f4bd8bff873bd007,2024-11-21T07:56:54.710000 CVE-2023-29352,0,0,61aea718674b1cd43fae5ad5029d7058a355bbad52de0a500c7bb8958f696e69,2024-11-21T07:56:54.847000 CVE-2023-29353,0,0,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3695,2024-11-21T07:56:54.950000 -CVE-2023-29354,0,0,cdbbf01d45f9364f6431f7299c4d54db6a7c17ef07bc4a27b4b5c983265d4dab,2025-01-01T02:15:34.737000 +CVE-2023-29354,0,1,22cb0b755ce130acb9b547513bcaa306934a6b0cb0719b856fdbe31b8e21ddb1,2025-02-28T20:15:43.080000 CVE-2023-29355,0,0,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000 CVE-2023-29356,0,0,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000 CVE-2023-29357,0,0,90f01b95361796ecd66f8e6d1f581fd4022b1a9f00b76a98ef1592bdc460b378,2024-11-21T07:56:55.393000 @@ -226638,7 +226638,7 @@ CVE-2023-33136,0,0,99eba898fff23d82c47f2c792c222f3f3ca6ed5327fb5baca69d268d06909 CVE-2023-33137,0,0,103ba212dcba54c28261d5a1e10e51442a71026eccdde0a1b3adbe2e820d70c0,2024-11-21T08:04:57.960000 CVE-2023-33139,0,0,c5c93e304d7d4040bc790da55af757379ee9f4747fd79e0fed8e66046830fc4c,2024-11-21T08:04:58.090000 CVE-2023-3314,0,0,66b3623bcd12750794511e8de7bd12735c80df59f69ad19e4e2815979a9cb344,2024-11-21T08:16:59.577000 -CVE-2023-33140,0,0,236e5e62add43e748eefa94aa27760152c4c2fda24e07ba9e791c64b5403e3be,2024-11-21T08:04:58.230000 +CVE-2023-33140,0,1,25db18a29633d8e74c45d809dbc6b92cea1068417de79ffaa3c20d7ef4837c34,2025-02-28T20:15:43.667000 CVE-2023-33141,0,0,e880fe3c971966a3951b20760badd2a5635eb6ba4eef38878fc8dd765bea29bd,2024-11-21T08:04:58.350000 CVE-2023-33142,0,0,cfbfdce9ccb97bc615b3e8847adfcc51cf9b6f48a434bfa7862a5ca2dad7fdd6,2024-11-21T08:04:58.470000 CVE-2023-33143,0,0,39b8f2547e4a4602a4caf4bdb0635a664485290ebbdc3d4fdc4e3d2d068fd000,2025-01-01T02:15:46.503000 @@ -228265,7 +228265,7 @@ CVE-2023-35389,0,0,5a62eb7d579c869493b8eccc441dd2c6c2d0bdf876845e9ffa41601c68bce CVE-2023-3539,0,0,44eac7bb26efe9fa8f35bebef930a683e7cb2aa7a2bed5694e5228d1009e441a,2024-11-21T08:17:29.673000 CVE-2023-35390,0,0,9888ca187426062a7d12cbca91e60e372647fcea5214b27c9b3d579f113a51ce,2025-01-01T02:16:02.787000 CVE-2023-35391,0,0,bb103be9307ca23d479248deb4e446266c7cfa23c30add9bc5c5b54fe2dc2df8,2024-11-21T08:08:22.370000 -CVE-2023-35392,0,0,efc400cbdace4ab004a7024a0c8474474388f2d5d813132c54ab70eafdd9b187,2024-11-21T08:08:22.520000 +CVE-2023-35392,0,1,b3ab3694c4022fefd55dc9e5985dfd1d2026e934a617434df28388209dd87aa5,2025-02-28T20:15:44.547000 CVE-2023-35393,0,0,e8b92057ca70bdca0d1ebb492b43a66f358d460ebbf5b74d0dfaadd60685e4e7,2024-11-21T08:08:22.650000 CVE-2023-35394,0,0,c1212bf7152173930e08a3ccc6ec822345c4ed792bca80b7bc1d1b4f3b202f2d,2024-11-21T08:08:22.777000 CVE-2023-3540,0,0,fb54c5e79c718e673ee36cfd65d0f38ea01746e1f383e8e3255fd878034c9e15,2024-11-21T08:17:29.813000 @@ -228674,8 +228674,8 @@ CVE-2023-36018,0,0,fac421ccddcc0efdc768e84203ba5cbbfddf7c4786feefcd65f87a9bb3ee8 CVE-2023-36019,0,0,3f57de43b8e578abc2208943c162e1597272c87cc4553c0d5b59d629ba667db1,2024-11-21T08:09:11.147000 CVE-2023-36020,0,0,6e52cf1805649420fe485254b5bc080fca1a44627d59f4db24df0c4c295a3f45,2024-11-21T08:09:11.283000 CVE-2023-36021,0,0,93efd206ec24c5a5cd1ba41da52e992eccc713bd53f82705e116abeecb59e185,2024-11-21T08:09:11.417000 -CVE-2023-36022,0,0,3ebe68ef96e96f7a7c7bf699c2f024d84099726a5ca20eeb8452919b356d6a05,2025-01-01T03:15:13.217000 -CVE-2023-36024,0,0,0858a8314490c2138f6cffc4ae4297f740b629b6e29616bdadfbc0c87cdcf516,2024-11-21T08:09:11.680000 +CVE-2023-36022,0,1,6e1b6e137cdb2526d7453e67b240a93f320278541a8afc609e755193e02b59fe,2025-02-28T20:15:44.700000 +CVE-2023-36024,0,1,1b2ba21f35accaf4e2e281b74916e062ff16df5f6ed0276ff16c0dde350d6f93,2025-02-28T20:15:44.860000 CVE-2023-36025,0,0,685778f3de98317b113104d5a585a070dcfa85c1015b35170b3fbb07e62c9c07,2025-01-23T18:17:42.287000 CVE-2023-36026,0,0,7747f673d119de91a5babf62fbdd99b68d10eaf6ca697cdb11ed1c42b3de6b53,2024-11-21T08:09:11.990000 CVE-2023-36027,0,0,d1d3c5d4589a2b64ccb72b0b197c3808405b30386e3680ea1ca4b31e8b065b8f,2024-11-21T08:09:12.110000 @@ -229249,7 +229249,7 @@ CVE-2023-36764,0,0,2ed2640c7f62092ee8e3d57add2be9f01422b7d7894f595bb2882a305c07e CVE-2023-36765,0,0,3191a1fb39c3c4453dfd567d075f44a6149e4e9cad4575596a6a302131518ca1,2024-11-21T08:10:33.233000 CVE-2023-36766,0,0,b491606b4cdd38b301692b20b38ff2037ff5470f6b1e501dc0a06e28ed5307dd,2024-11-21T08:10:33.383000 CVE-2023-36767,0,0,d04bf6dbd924cb1e0d6b2d73a38a14e57ac5c95e279b2ee207decf7d64aa2d3b,2024-11-21T08:10:33.637000 -CVE-2023-36769,0,0,6d5adc7fe981b364eadc70e6463da15b975b2fd0d39a095b64f0fafa4375a1a5,2024-11-21T08:10:33.830000 +CVE-2023-36769,0,1,edeb754336bcc66848f17ea61b9232093ce25588ec6df16bd895e11e4d7b20e0,2025-02-28T20:15:45.007000 CVE-2023-3677,0,0,8883509e11e66f80a8d05028e5910434f84099aa117660bd254b36accd606842,2024-11-21T08:17:49.027000 CVE-2023-36770,0,0,467d593864e57dceffc567470c02994a6e903a233fcdf5f4b8648467fefde4d9,2024-11-21T08:10:33.983000 CVE-2023-36771,0,0,fbac2e733ae477aafe656d885dfe7384f0830babee47268a31b87be83df9171e,2024-11-21T08:10:34.140000 @@ -229356,18 +229356,18 @@ CVE-2023-3688,0,0,5fb0235848124d0ca2e69f9cddf5a22b5b970c3543d79e582d56c58aa3bfc5 CVE-2023-36880,0,0,6b58bba983600a7c360b5b962803e7997d939ddbb9eac10bb632116cb03f0956,2025-01-01T03:15:21.520000 CVE-2023-36881,0,0,ee6331d63c5bd22b02bd003c1b2796ed5a24b6383a3fb29762ca37a159d887db,2024-11-21T08:10:50.090000 CVE-2023-36882,0,0,4459a20df4e535a2f2f9e1bdcbeff8a7a662c76140ddd20426310cfeb6b914aa,2024-11-21T08:10:50.223000 -CVE-2023-36883,0,0,4040db4a30a03aae750295f9760cb56367802abf8f23bde0d257dc32a689bf28,2024-11-21T08:10:50.363000 +CVE-2023-36883,0,1,5e7feafb7eee49e64e24200bae78428742c74bd1d1b0c7993d991df964c959a0,2025-02-28T20:15:45.167000 CVE-2023-36884,0,0,114b8674f8791d4b0a23fff5b2f9c7cdfbac801128f7861c4f3601033b70d1ff,2025-01-23T18:53:06.180000 CVE-2023-36886,0,0,7e68bc36f62d9e13deee73864578e0c6c386259e473819f67807d3c608101f6e,2024-11-21T08:10:50.650000 CVE-2023-36887,0,0,023d72c61128f7fd56b2bfa340792c950f0b84f8067e8d9bd7a73a8a551828e1,2025-01-01T02:16:23.023000 -CVE-2023-36888,0,0,ddb7c0dc73a6fc7ea3ae92327dc697eebfd048c9132fdd76edcfd5b88325790d,2024-11-21T08:10:50.910000 +CVE-2023-36888,0,1,f1dd5364e900956284fbfb8df035149a378ba8d36854ce879f5b4a4361f2bdbe,2025-02-28T20:15:45.317000 CVE-2023-36889,0,0,1dd3f55346001cb8090ff236c94967460371f64da8d7f980ef8984890769bcd4,2024-11-21T08:10:51.037000 CVE-2023-3689,0,0,3463794b80cec7dea229bc232b3b69e2af12bf6070a2a45b2a13d993bcdb0c61,2024-11-21T08:17:50.787000 CVE-2023-36890,0,0,329c99568f2e68a4432ce2546b452f3a33514ce27c75d4ef338aa077312601c0,2024-11-21T08:10:51.190000 CVE-2023-36891,0,0,14871eb0f8562437e89c313745ba844699ec0689cc2ad29870ba39db48dc4e35,2024-11-21T08:10:51.327000 CVE-2023-36892,0,0,1d4290c3f10e03f142d63dd5b73af0df1051de1793cdf0e37c4b92cd96599ab5,2024-11-21T08:10:51.460000 CVE-2023-36893,0,0,9c1cb0c01aea1f60445b339ce6d6405ed6d329335baedab29e6dfd84356929d3,2024-11-21T08:10:51.593000 -CVE-2023-36894,0,0,084077d449eab77efac4ba3c694257b7e96bc4819f322ad27a51e25690bf0409,2024-11-21T08:10:51.730000 +CVE-2023-36894,0,1,291d1f810b80fda7df7888996d990de8642e0f6e93f21de7b9bd6904c14559a7,2025-02-28T20:15:45.453000 CVE-2023-36895,0,0,0eb63b8f7a33a5f4fed07b77d236fc1e6e4d1d33c4dfbc93e1393895463d13bc,2024-11-21T08:10:51.853000 CVE-2023-36896,0,0,465313ed68ae2809aff2a772e6b88893dc12d9e2c53827b900b1a7a4b30fb1cd,2024-11-21T08:10:51.990000 CVE-2023-36897,0,0,68ea84cad1f81d98be05c22b48cd75d3e873c5e02672dcfd8b2e7469fd7bb0d3,2024-11-21T08:10:52.130000 @@ -230383,8 +230383,8 @@ CVE-2023-38152,0,0,741bccbfa5949548b989dbf175ca6110f8b3d8918e295823f8f4790757300 CVE-2023-38154,0,0,ece04d5ea2441d4dd593b0e23f14895bf56cf9391b57bd4936cbc9fd098346de,2025-01-01T02:16:28.007000 CVE-2023-38155,0,0,aba1254b93aa060c1b002473a6a0023d7e9510d26f726d9fe0d106c385f115ce,2024-11-21T08:12:58.437000 CVE-2023-38156,0,0,51bacb16165725150d7179f1c6ba7a60857387d8947da33ad3d4fed359aae26c,2024-11-21T08:12:58.583000 -CVE-2023-38157,0,0,651c498515bcc3dff20a14eeb6b27f8ea09524bd6f55e027c5a88dd79df39fce,2024-11-21T08:12:58.713000 -CVE-2023-38158,0,0,f3f79f641b59bc303bd9d1b0715b56136cf2c3c55e2a8476221a15a2a828429b,2024-11-21T08:12:58.837000 +CVE-2023-38157,0,1,bc8479914ca44b14e0cd1ca6a8f5bb30c2b30b0a993cc89cf3a9687fa01db8ff,2025-02-28T20:15:45.603000 +CVE-2023-38158,0,1,e91fb46c72d5de618ce1bf118dd80073044f1f2511a5b3524053bb5b57bfa4d1,2025-02-28T20:15:45.757000 CVE-2023-38159,0,0,98e8cc2dacb18fb1b614f0b8b0817da70f2eb30b0c255fcc084552daa2f0110c,2024-11-21T08:12:58.960000 CVE-2023-38160,0,0,53daefc1d1f2c654c6cd7896416e88506ea59f5c237c2bb92890e2cd6e714700,2024-11-21T08:12:59.100000 CVE-2023-38161,0,0,425bbff8bdf397140af80aa5a1ca7762fa0f59e5f74436e3b4eac764ce24ca07,2024-11-21T08:12:59.270000 @@ -230398,7 +230398,7 @@ CVE-2023-3817,0,0,2def5a0837fc8052bc40dca5b0b65da4cf19d6372c881eaaacff6f92b1219b CVE-2023-38170,0,0,ab6608018c2086627caece12bb829ac29b1e72b32e899b99184f429645ef8d50,2024-11-21T08:13:00.303000 CVE-2023-38171,0,0,1d9971ce36d8e68d328048473d72c428d9ff1987304e61fc8f6bf8758182fc6e,2024-11-21T08:13:00.467000 CVE-2023-38172,0,0,c03ceeec1921317baab0f5d33ac6ffbaaf6bd77cb8ddda3fffd24fc5a1c85f29,2025-01-01T02:16:29.943000 -CVE-2023-38173,0,0,de9202d21708a6da822dd9c2f35ec72f2a34306a1185acc0f223cd3ea6239b38,2024-11-21T08:13:00.757000 +CVE-2023-38173,0,1,753768dbefa3d743a013d85b7dd4fe91a29f90baa8010ac3f900f8d13a82739e,2025-02-28T20:15:45.900000 CVE-2023-38174,0,0,58ab57eece21bd2f8f4943bc11407efa8a97b7b1460106cea2d4aaa7ceb9eafb,2025-01-01T03:15:21.763000 CVE-2023-38175,0,0,ef1c8529b3657e2f66fcf0c37f671b4b6edc91494a166816094eac680db4dee7,2024-11-21T08:13:01.010000 CVE-2023-38176,0,0,3fdc33ad178160a5c99abc1a3ac59e3e73fc42e8ab098f2163e13646e62e3b2c,2024-11-21T08:13:01.133000 @@ -230410,7 +230410,7 @@ CVE-2023-38182,0,0,4d4a59af220c252b63fea8ea60f7e53085011cf3820ea3ee0c3d6c02139ee CVE-2023-38184,0,0,8041243a4a2b4032f9464c8d84f0fc87c8a2d1f56ecf4620773160e63efc0f4a,2024-11-21T08:13:01.980000 CVE-2023-38185,0,0,a896db1f9cd601b250fb437f388d78427d68869ccd41cfed4d1746d209d422a5,2024-11-21T08:13:02.147000 CVE-2023-38186,0,0,a26d63342c786f02f0f9b245c99ef8053d9804dc14ae758f614053dde58989c1,2024-11-21T08:13:02.270000 -CVE-2023-38187,0,0,f8d470b205d24d51d2c2c0f30db7c8b1442a888ee066dc5e65df6de4d0703432,2024-11-21T08:13:02.403000 +CVE-2023-38187,0,1,b54a5c0726de3a61cc0199512aefdbfde84455b495ef6a4a7f7796335cd9ac6d,2025-02-28T20:15:46.043000 CVE-2023-38188,0,0,26b96d88b207aabfec3486123dd721973347f93e7ecfc580763e11f91fa6cb47,2024-11-21T08:13:02.520000 CVE-2023-3819,0,0,1feaa31076019ed4aac12d690f8a6d61ad646f9c397a46d2bc6b63c68c2782de,2024-11-21T08:18:08.360000 CVE-2023-38190,0,0,247462562dbb49a297fdc6138ad19cd54122ecffd2c68d5b802461d7aea8511a,2024-11-21T08:13:02.653000 @@ -247413,7 +247413,7 @@ CVE-2024-13483,0,0,8fcd5683bc938442ba2abb32ac7e5e9aae7129e271932e6cb40281e1f3260 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 CVE-2024-13485,0,0,13891a751ed33776eeacdce8cd7bb797159d0f76d2c0706f2beaac89a9870581,2025-02-25T20:53:34 CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000 -CVE-2024-13488,0,0,0febadc42709de4de439774caa0be39485d89fc609ff2499f7ecda57907a7fda,2025-02-15T12:15:30.457000 +CVE-2024-13488,0,1,ae2b496d032936437f009205c8871db652da3b6ca42329f11d17b63423f01755,2025-02-28T19:47:07.220000 CVE-2024-13489,0,0,839928359244aacac2e8da1253180ff76f652002d91ffe984a0cea8d486eafa2,2025-02-25T20:46:45.913000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13490,0,0,0a59573afce6f4bae50656c0bf2550906692880eb928b800a356e183f74fdb43,2025-02-25T20:53:11.877000 @@ -262071,11 +262071,11 @@ CVE-2024-37679,0,0,53f415d3ff7d91648c94d1a02a752ae8c3f351b627771ec2bbaa0843079eb CVE-2024-3768,0,0,02df67a42e96bd3a218f689c17781ff773b0e0bc1eb141664b5e72926d645c8f,2024-11-21T09:30:21.563000 CVE-2024-37680,0,0,6572489f19381c9c94b722a111d964ef75db274747b057f3ed11c65b0662a90d,2024-11-21T09:24:14.577000 CVE-2024-37681,0,0,4538c23271fd70e9a553f554f30bda76981c93c8606f42dfb4717cd2fcbf2110,2024-11-21T09:24:14.790000 -CVE-2024-3769,0,1,d4d94872430f8715184d9efabe7dea929926f75eeedc8c6d853529bb0870ff5c,2025-02-28T18:13:00.173000 +CVE-2024-3769,0,0,d4d94872430f8715184d9efabe7dea929926f75eeedc8c6d853529bb0870ff5c,2025-02-28T18:13:00.173000 CVE-2024-37694,0,0,89e02bd2a8359a540751416780ecdbd616d178c6fb0200e85f94f7a2f51e6f89,2024-06-27T20:15:21.913000 CVE-2024-37699,0,0,486db3a12759766d6df7d3f6b7ee6cdb5fff3063e111528e4d0ace14c6c14c4c,2024-11-21T09:24:15.030000 CVE-2024-3770,0,0,26b4ac86579655f003ab85865b9c9ab09a05f8fcaf3f846905f4e275a986dd2b,2024-11-21T09:30:21.857000 -CVE-2024-3771,0,1,7682a599d26357b0c60cdb44bb1819a82fc8fb90aa25016443d17d0551c035ae,2025-02-28T18:13:00.173000 +CVE-2024-3771,0,0,7682a599d26357b0c60cdb44bb1819a82fc8fb90aa25016443d17d0551c035ae,2025-02-28T18:13:00.173000 CVE-2024-3772,0,0,d7764ec2008c8c849bb15599d550308a995271f50ec13b7ce4e2de026bd6481d,2025-02-13T18:18:10.987000 CVE-2024-37726,0,0,d896df11823efbf9a4d73a2cbb465f2cdd2815bdf2c264ca9fbdce6d5c110fcd,2024-11-21T09:24:15.257000 CVE-2024-37728,0,0,641fb24219d355f90fe60a18a51d79dd7660e42ab60fba2f2dbfa7ea2d39b361,2024-09-11T15:15:12.140000 @@ -262570,9 +262570,9 @@ CVE-2024-38287,0,0,faa7c6a555d3f131f1625bbd4ec023af2f94eff9de54923e9dcb7f4d8ef77 CVE-2024-38288,0,0,c40de2274d1de507df293bbfc1d11d8c4c24869512dd87166ea06a32f4f45c2a,2024-11-21T09:25:18.197000 CVE-2024-38289,0,0,526c880e7e040ba7a8358affe699d37e3219527db8ec294d498930a9afba177e,2024-11-21T09:25:18.520000 CVE-2024-3829,0,0,01a0c111086a56df7a8152424dede2af2945ece1419808b25f3a1751a9b17512,2024-11-21T09:30:29.107000 -CVE-2024-38290,0,1,5638ded89b91dae094b897ee1207a2308293d2e58b30554fd1a0110f7f7834c4,2025-02-28T18:15:27.187000 -CVE-2024-38291,0,1,9655f0a4d1b1e2eb63562f94e75c0732a1e4536609836bd8a398950fd05a4874,2025-02-28T18:15:27.397000 -CVE-2024-38292,0,1,fb74b924098871d266173f3595ff1910e1745e2f8abf2321b9df604c97edb8c7,2025-02-28T18:15:27.607000 +CVE-2024-38290,0,0,5638ded89b91dae094b897ee1207a2308293d2e58b30554fd1a0110f7f7834c4,2025-02-28T18:15:27.187000 +CVE-2024-38291,0,0,9655f0a4d1b1e2eb63562f94e75c0732a1e4536609836bd8a398950fd05a4874,2025-02-28T18:15:27.397000 +CVE-2024-38292,0,0,fb74b924098871d266173f3595ff1910e1745e2f8abf2321b9df604c97edb8c7,2025-02-28T18:15:27.607000 CVE-2024-38293,0,0,60919199132fd520a1e4f078a9a5c31f13510df36764c4be0738cf814e061e9c,2024-11-21T09:25:18.930000 CVE-2024-38294,0,0,6f3448200c484074d0836c56f5e1c9fe346f248c9334967a8e78fc758b5adfdf,2024-11-21T09:25:19.280000 CVE-2024-38295,0,0,f358c490df2a2504a6d87be69cb330bfbc1382bb00194c4d2ceb8f036013735b,2024-11-21T09:25:19.577000 @@ -264791,7 +264791,7 @@ CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef9 CVE-2024-41333,0,0,5d0a608f5ba280f35dd905d53d7227fb5786301ea98916e97e2bbf00edad40a3,2024-08-07T20:54:44.060000 CVE-2024-41334,0,0,19fc7d796046d537baaf3e290ebf897dd5658e944e3500f513adc9003711ac13,2025-02-28T16:15:37.587000 CVE-2024-41335,0,0,d3ee5339fa03fba2a5866f9228ee1228004e295e13e06cb78bf5e379f057c8b7,2025-02-27T21:15:36.577000 -CVE-2024-41336,0,1,0289591a27083f80844303d12e6062dbeb6930b7c126a8aedcd5c4d3ca62df78,2025-02-28T17:15:15.283000 +CVE-2024-41336,0,0,0289591a27083f80844303d12e6062dbeb6930b7c126a8aedcd5c4d3ca62df78,2025-02-28T17:15:15.283000 CVE-2024-41338,0,0,e56ba6eccb1f913832538e27e67769c5e8bccd2807f995ee0dbd29477021d2da,2025-02-28T15:15:11.727000 CVE-2024-41339,0,0,95fa126ce7ca6eb431bde7c3eaf6536eeaddf344a24f0d3796abf61ab7720cf0,2025-02-28T16:15:37.737000 CVE-2024-41340,0,0,5fb432a505b386cc70f2c3d152557019cc679584cc3504caf8f640cd7a854646,2025-02-27T21:15:36.923000 @@ -266153,7 +266153,7 @@ CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d CVE-2024-43196,0,0,3e055b34f6ea24cdde997324ee0d5c195aa0a244a6cb6a6610c853468f12cd05,2025-02-20T04:15:09.630000 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 -CVE-2024-43201,0,1,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 +CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 CVE-2024-43202,0,0,ff09430528735443017e172da47152249178ba96acf44e33aa7fba1b3f412af9,2024-11-21T09:35:07.797000 CVE-2024-43207,0,0,99a8fcaea9f2d7bca6bcde4834954a187c4e78154a0eef48c8515243d2e23912,2024-08-19T12:59:59.177000 CVE-2024-43208,0,0,6ef73e79f1a23655911b75f5e499093305eae324ee0b651606b8f67181713805,2024-11-01T20:24:53.730000 @@ -271974,7 +271974,7 @@ CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7 CVE-2024-51135,0,0,fa01774bb08aee4b59b435101290c14a61aa2f8f92024c4c2f5242ac306ee6d1,2024-11-12T17:35:13.127000 CVE-2024-51136,0,0,ff2010b659e2be86e13e5cd548b885bcf03f33f7fea87be000ead8442d377536,2024-11-06T19:31:15.230000 CVE-2024-51138,0,0,5f9d113bd7c2e0ce06a3f84f8637ed907bc9ccdedf4b83e80dcd830146bcbd9d,2025-02-27T21:15:37.023000 -CVE-2024-51139,0,1,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c3865554b,2025-02-28T18:15:28.047000 +CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c3865554b,2025-02-28T18:15:28.047000 CVE-2024-5114,0,0,8d70532b2173abd74054ce81747b30f4dfdaa7ef38c5698f82026e8563201f2e,2025-02-21T21:10:08.983000 CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000 CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000 @@ -274075,7 +274075,7 @@ CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc255 CVE-2024-54170,0,0,115fcfa389ae6bda1f9341d4e101093ad6d8b81f4dcb7bc6cae920d01c10de34,2025-02-27T15:15:39.240000 CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000 CVE-2024-54173,0,0,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000 -CVE-2024-54175,1,1,c1e7728d62bcc6a90f42056250e43b1315e91328a6c3f1d3dfd9c3fe31c3d839,2025-02-28T17:15:15.487000 +CVE-2024-54175,0,0,c1e7728d62bcc6a90f42056250e43b1315e91328a6c3f1d3dfd9c3fe31c3d839,2025-02-28T17:15:15.487000 CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 @@ -275621,7 +275621,7 @@ CVE-2024-56969,0,0,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f04 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 -CVE-2024-56973,0,1,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a4718db,2025-02-28T17:15:15.730000 +CVE-2024-56973,0,0,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a4718db,2025-02-28T17:15:15.730000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6f0c,2025-02-04T16:15:39.010000 @@ -275653,8 +275653,8 @@ CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082 CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000 CVE-2024-57032,0,0,40f1e208a6ee564c186e8abecf3f90ae9a0f263654b51174c7594b0f164692ea,2025-02-18T21:15:23.160000 CVE-2024-57033,0,0,b213e3eee22d5746b72c15bc18b2e100f2a7f8ef13f3a1ff51e93f85d64bfa75,2025-01-23T17:15:16.950000 -CVE-2024-57034,0,0,7f67d52907eec30143de4750245484d51c9b7d7e3dab06e4e81e0ad52d7222ae,2025-02-18T21:15:23.313000 -CVE-2024-57035,0,0,805b080b0ce95518facb0b27dbb27140164cbeaab705edc82dca68be5d4b3651,2025-02-18T21:15:23.477000 +CVE-2024-57034,0,1,e52a39ecd5c7a609e90fa7ae9c35e819ec30d141102d18c5cb8dc9ebebfd4c98,2025-02-28T19:16:13.133000 +CVE-2024-57035,0,1,8f647174886ad5489698835d701ee28c5ff6c813395545be8ae09bfd3cde425f,2025-02-28T19:16:13.133000 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57040,0,0,c40998c8b5156b9d58775f938e41c3284064f71ba1fefadf9f14b4afb347d380,2025-02-26T22:15:14.240000 @@ -276109,10 +276109,10 @@ CVE-2024-57939,0,0,2dd8365da5bb6d220c6025667c097348d597cd5bbfa62726de356f53457c1 CVE-2024-57940,0,0,4347ecfcdbbcbfcdebf2261360777fcd6563cc5454a9bfae845b31eec45db101,2025-02-02T11:15:14.547000 CVE-2024-57941,0,0,190517d4aefb28eedc9bf0b3a946b8bab0775c3c00af67d3032e3eb13313e131,2025-01-21T13:15:08.640000 CVE-2024-57942,0,0,674dcdb666d8ffd6793b2df8b7ea512b83519af3dc884bfce784c82a02be56e2,2025-01-21T13:15:08.743000 -CVE-2024-57943,0,0,1e87abea139119874ac26247a034b80161926fef227cee294343cc884636c87f,2025-01-21T13:15:08.837000 +CVE-2024-57943,0,1,d2f4424effb29fbf5cb1cf370d5b837d65f31dc8814f998d6028ae8f7f02de93,2025-02-28T18:59:45.207000 CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000 CVE-2024-57945,0,0,ba7b321eb8cd0d1e792a1582e6a8309da43ab8d76c6981c78527fc0b4c2a565b,2025-01-21T13:15:09.033000 -CVE-2024-57946,0,0,7694bfd6f4bfcb27622fd33f724eed0c14a58bd72141bedb13eda08e23a02026,2025-01-21T13:15:09.137000 +CVE-2024-57946,0,1,54405dc82967741950b6607e1e7f737e9f21545ba505a42f09e2c57478ad2f47,2025-02-28T18:59:45.207000 CVE-2024-57947,0,0,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc2fc,2025-01-23T14:15:25.293000 CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be331,2025-02-02T11:15:14.713000 CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000 @@ -279908,6 +279908,8 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 CVE-2025-0158,0,0,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc256,2025-02-06T21:15:21.923000 +CVE-2025-0159,1,1,da072f8e2bfae3faad56b7993bdef58007c1768b134558714a537dfc9135c68d,2025-02-28T19:15:36.243000 +CVE-2025-0160,1,1,56a2c0b88768866a06a1cafe52553211de3c4fe7f1bdd2a1b69e2c78efb329c1,2025-02-28T19:15:36.393000 CVE-2025-0161,0,0,a15f4af26b467f3befeb42d7d89cb5b102ea3450856fc5b0055870671062ecf8,2025-02-20T16:15:36.333000 CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000 CVE-2025-0168,0,0,6bd10a82ba25896f6c61642a758df4c096492b329af5b5deaebee76822e51ebf,2025-02-25T21:26:07.113000 @@ -280023,7 +280025,7 @@ CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49 CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 -CVE-2025-0364,0,0,2423f698b570bf74da97e05ed992c1dc720ce0cd77b54afdd0e3b50ba4f8a276,2025-02-04T18:15:35.067000 +CVE-2025-0364,0,1,d86e1de6aeb2da3860f3a6864380bb4611cec9a62b9db022fce493a15089702c,2025-02-28T20:15:46.323000 CVE-2025-0365,0,0,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000 CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000 CVE-2025-0367,0,0,ab3acf71ca0537fe4a7d80088a2aafb5561d6238415269bf152b7ed9b1300383,2025-01-30T17:15:18.097000 @@ -280281,6 +280283,7 @@ CVE-2025-0760,0,0,41c51c3186d7c1d82dcf6c1e725fcfd59fdc585d73de4a715eb553b80d5dac CVE-2025-0762,0,0,e4f54e0a8112ca4bbd93833150136d658b70b741ccb351b92cec93e89ce75210,2025-01-29T15:15:17.687000 CVE-2025-0764,0,0,c361408dc8341f519ad818deefae08734344056ea08640e21b6d8307fed6f9af,2025-02-28T07:15:33.863000 CVE-2025-0767,0,0,18b19f88a460710b0a272571f92b11e64f98033d887b75623068759f9e10d0cf,2025-02-27T19:15:49.350000 +CVE-2025-0769,1,1,b581b08d9ccf53eafac9a57a886485fd542a058d854e1408644a5ca22deab911,2025-02-28T20:15:46.440000 CVE-2025-0781,0,0,b187217e5320659130c2f954520571f906b51edbf3680129182cf06170507db1,2025-01-29T22:15:30.187000 CVE-2025-0783,0,0,8924456cd6700604f4e019fec6c3db3aae4fc1d29681bfa897a8d15c04913bcb,2025-01-28T19:15:14.410000 CVE-2025-0784,0,0,7bf35a66d1e5bba1c28f1ce408a8faeeb60c83b8f697f3920a03b5139a10a1a9,2025-01-28T20:15:56.230000 @@ -280376,7 +280379,7 @@ CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590f CVE-2025-0934,0,0,d8e0246ff2efc1b37a4d2ecfb87caa8fb3d271a34e502eac17b8e8e5be8b0f3e,2025-02-18T18:49:12.210000 CVE-2025-0935,0,0,33f67133e31f18fd4a46b7018ca75f17bd9c12cd022eca372c7880cd3fb2892f,2025-02-24T12:23:14.103000 CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000 -CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000 +CVE-2025-0938,0,1,b2ac2dfef9d7a89f3be36441f4d9584f63acc9fee67471220c7b44c56f6a2315,2025-02-28T20:15:46.580000 CVE-2025-0939,0,0,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000 CVE-2025-0941,0,0,2be4361c17cbe56867bcf1e1bb734b71aeded02e91d0ce7adfef4edb0de9117c,2025-02-26T17:15:21.910000 CVE-2025-0943,0,0,812d30b4c0a4e8e8699f3b3fb871a6a6493f30967e63a2f74a7571847c91c34d,2025-02-07T14:03:39.237000 @@ -280401,7 +280404,7 @@ CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e CVE-2025-0975,0,0,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000 CVE-2025-0981,0,0,77670fbd06993c72f858090d230bbbd76961e50ba2a7e6b7437ae6f3246e33de,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000 -CVE-2025-0985,1,1,b26b31af0c06da0ecdbbec5923f39fbb50dadbe219faf9bd5908c2a08e5b3d3e,2025-02-28T17:15:15.937000 +CVE-2025-0985,0,0,b26b31af0c06da0ecdbbec5923f39fbb50dadbe219faf9bd5908c2a08e5b3d3e,2025-02-28T17:15:15.937000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000 @@ -280593,8 +280596,8 @@ CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7b CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000 -CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000 -CVE-2025-1336,0,0,52b671ad306b4ecb46d70d614db810e12817bed0fe7bd8f45f84b0afe49f7a9a,2025-02-16T09:15:09.347000 +CVE-2025-1335,0,1,bb409ff99c8e3378896a9535373b62c93c367d19339145f6746127b81b9cf3e2,2025-02-28T19:47:07.220000 +CVE-2025-1336,0,1,94c18a1aa58d3c2ef1027a8ec07c915190dc07d2ac6d7f527e5afadf3dc48ea8,2025-02-28T19:47:07.220000 CVE-2025-1337,0,0,c4c492d772586fa1c48efe595d648980d569f69f4fd95dc2e4940745b9e69a01,2025-02-16T11:15:08.203000 CVE-2025-1338,0,0,c975d3da6628e3378fc507e6a4d32fbce12edc6163c403068da9f6fd48db4a16,2025-02-16T11:15:09.530000 CVE-2025-1339,0,0,8f1957eed8ce41b8e7470cc3d0baacfd9956a9ddc7b746b6c49360dfcc427cc3,2025-02-16T12:15:08.173000 @@ -280643,7 +280646,7 @@ CVE-2025-1412,0,0,af6752d241a9229d1b7ffcf487afc415a29cfa03072b0a3797beadd6e57308 CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 CVE-2025-1426,0,0,4a8cd471295100a135e3f1ec50bc3f2c2b0c11be304dbe11e606b36ac015f623,2025-02-19T20:15:36.467000 -CVE-2025-1441,0,0,1a8d7925760ab15d6de1f722cbb1abd9befdb71560d55b0f11dd7282b2ec419a,2025-02-19T05:15:12.050000 +CVE-2025-1441,0,1,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000 CVE-2025-1447,0,0,94d813a2a765cca7833281fda7977d5974397f1e3ddfd630be22d2387da03e88,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,c01bebc87ceda949e53960d4081cc94f0b041bbdc7b484616330316226fc1342,2025-02-19T02:15:08.833000 CVE-2025-1450,0,0,903629f63a504c19a744bda8de7fd9bf34de0122b04cc78ce2730c0f8d0b7bac,2025-02-27T10:15:10.677000 @@ -280684,38 +280687,38 @@ CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e211 CVE-2025-1575,0,0,4f36554ed6482f45b74d35521d78ee1f8257f79829174fda75a5bd3bf6296f94,2025-02-23T04:15:24.980000 CVE-2025-1576,0,0,1f104649f17b82a7de320595b093dfc1101ef45ab193119cf4c9a764ae0261d6,2025-02-23T05:15:11.853000 CVE-2025-1577,0,0,511daa570f9ea062413f2bed6b33eae352829c776630ae7166a5c1ba24874bf7,2025-02-23T07:15:08.970000 -CVE-2025-1578,0,0,9663cb9a61689a740797a4de202f81544c2c3f2bf9e4fb29d5fb5a51628924ab,2025-02-23T08:15:08.187000 +CVE-2025-1578,0,1,0d9ecf545c28371e3a17142eb6623e9049c12d991fcbf8ec598bccc17e9c793c,2025-02-28T19:36:29.477000 CVE-2025-1579,0,0,47f84216a9e36312caff9085c25b1754bae23eca9fa0ebf71bb86844e73f7fc4,2025-02-23T09:15:09.393000 CVE-2025-1580,0,0,6f6f51b8629fb2b91628569d15501b66d6e9cad6c386219f7f6f91a4bc91b70f,2025-02-23T10:15:09.623000 -CVE-2025-1581,0,0,a59b3f347128e6a660cebf7b38465027133f66623ab546c7611881afce6667c7,2025-02-23T11:15:09.247000 +CVE-2025-1581,0,1,57ad20b66c5edb4e9e2c84f0761dd94c02cc070a82d9a015202bb8b0a6e6bb0d,2025-02-28T19:36:29.477000 CVE-2025-1582,0,0,eccc3f96b055af4e00c42f9af627cf47b694897b13522be44dbdeded6bc83e19,2025-02-23T12:15:08.470000 -CVE-2025-1583,0,0,e334029a00ce9698f70adf6d79ebbc5aa7ca8d5e8f2c14e2cccc3372b741a131,2025-02-23T12:15:09.550000 +CVE-2025-1583,0,1,ae0b86cd3f4e18c51ebc2e528edf89ba2b9c081ca496f16d16722bf8a9bfaa27,2025-02-28T19:36:29.477000 CVE-2025-1584,0,0,37fcd8b8518ac69af859e6aafbe4aed7ba4463b3713232299f7e413d63714d3e,2025-02-23T13:15:09.253000 CVE-2025-1585,0,0,07b81c4e240b6600cc73e2859ab1ee15472f06c39704fce5e3aa1ba0724b1eba,2025-02-23T14:15:09.110000 -CVE-2025-1586,0,0,2e1988f52d595a1d9d9f6b46c7e86dfce63fd00ec8e302d63927e1f91f2ed471,2025-02-23T15:15:09.407000 +CVE-2025-1586,0,1,3f22503c29347c9467d54b890787c5910a71eed4dbc81bfbc1e3598e4706fac3,2025-02-28T19:36:29.477000 CVE-2025-1587,0,0,549a7c2656a2ae2fbc91f2512a9c195c906f315a63875bedbfb98906fe2b2d89,2025-02-23T15:15:10.107000 -CVE-2025-1588,0,0,276dd8268245c9486b93f77f6f34e5eeb8a013f4706e2808775c4a29407629d1,2025-02-23T16:15:08.637000 -CVE-2025-1589,0,0,d59fc53f1317cf37da767c9f2425cbb5d54c2378befb855f03beb5810fb4efb2,2025-02-23T18:15:08.427000 -CVE-2025-1590,0,0,1ad11388bda41ec07012eaa5c62864adb695bbc852c9bed8b8d1be07e6420b3b,2025-02-23T19:15:08.780000 -CVE-2025-1591,0,0,91c7d35b1ff2c9c2952c39df19b5abd917f99e119dd68d46b75056f9e01502d1,2025-02-23T19:15:09.407000 -CVE-2025-1592,0,0,177cec6067e9eb1dfc0a71399c1200f508d2234a34e7b7bd8fcd77ea2d8364e0,2025-02-23T20:15:08.243000 -CVE-2025-1593,0,0,11816f1e28eb1338430f195be710ad934058ffe6425c7c51bd54af6ada593384,2025-02-23T20:15:09.210000 +CVE-2025-1588,0,1,161a3531141701000d04f28c8d47ee3903f716c7e0de426c45d7ebe3de3c4444,2025-02-28T19:18:04.507000 +CVE-2025-1589,0,1,0858e9992ce30389e47eac2c67746ca438c08ce1ba88e164622ed2217c98baec,2025-02-28T19:18:04.507000 +CVE-2025-1590,0,1,59375a51d1dca8b4f081b526fb54cb885dbe5725449a89687160c4d910640450,2025-02-28T19:18:04.507000 +CVE-2025-1591,0,1,74de2d44495bd431a07d4ab60894cb445ed82222288421e2e6c35f44ec53cd4e,2025-02-28T19:18:04.507000 +CVE-2025-1592,0,1,4f8852a61b207df9d6edf25e4a21e2228438f82741c124c1da1ce11c98394243,2025-02-28T18:33:35.540000 +CVE-2025-1593,0,1,59e27833853ae5ccfee65f1c81547d298ff85293b11156e167837673952886e1,2025-02-28T18:33:35.540000 CVE-2025-1594,0,0,82c79599ad23aee2986f472f3c7284952e11d3aa1cfc1fb2cbaff9ee1e59a908,2025-02-23T21:15:09.130000 CVE-2025-1595,0,0,2ebe71182f4cc97d68ea9808877b92817e3a7b934ff3df86e77453509bcc9f2d,2025-02-23T22:15:08.190000 -CVE-2025-1596,0,0,ba1e2935556e41a0f0629e84b0b44b41458717fa96963283279f57d03bb711db,2025-02-23T23:15:09.070000 -CVE-2025-1597,0,0,de2f67475704bfb23d8387ac37c353579f24c06f88cacb5ce167d27c3dc65e50,2025-02-23T23:15:10.120000 -CVE-2025-1598,0,0,fb5b94c93dc9dd85c2e1f8ac931ad89150aec108bb13dd2f509625e136571e5e,2025-02-24T00:15:09.220000 +CVE-2025-1596,0,1,c5a6ef6ff14996a4302d92cb957f93e5cd5ae425c9cfdced362b6793f1afdcdd,2025-02-28T18:33:35.540000 +CVE-2025-1597,0,1,3c0030e150cd76838eba98a7b6d5cf1327f4ca2c86609e77208f23c7981043cf,2025-02-28T18:33:35.540000 +CVE-2025-1598,0,1,d471983e31136e083d728509bb5e280fef1e96d4745e882b56968e8ac2305c88,2025-02-28T19:18:04.507000 CVE-2025-1599,0,0,295e02ecf420c6f4cf06716dbc840146b3f2cc70e77a3a301dea4803d46cbc8d,2025-02-24T00:15:09.393000 -CVE-2025-1606,0,1,cda9b0d19715f40c1ef1366ad90bc4fb92bb981b32de6d3cb8af3f5634f2fd38,2025-02-28T18:33:35.540000 +CVE-2025-1606,0,0,cda9b0d19715f40c1ef1366ad90bc4fb92bb981b32de6d3cb8af3f5634f2fd38,2025-02-28T18:33:35.540000 CVE-2025-1607,0,0,52d13cde0431fe9378fb33c9397b2f1fc1d98a4b2e5459d641f82df8ddf2de34,2025-02-24T01:15:09.803000 CVE-2025-1608,0,0,c7048097c271daf917a682c2f3bf26c62acd0325f69d7bfdabc7286f0cd14691,2025-02-24T01:15:10.420000 CVE-2025-1609,0,0,6dd7f465938a36a97449ad0e198e16909efe95f65c7d5bd50aa4721c09fca0a0,2025-02-24T02:15:32.097000 CVE-2025-1610,0,0,39c57ca3655782f8cf09edf27e962f9432c4474f69cfeb88aae48ab15ed503a6,2025-02-24T02:15:32.263000 CVE-2025-1611,0,0,6d2b415ef74bea62084d2549a0ea9c5619ec2e52bb7fc8ac8e9083a769f99983,2025-02-24T02:15:32.437000 CVE-2025-1612,0,0,de19c63d3a2fa81dacfe6ddd5178e9d262ee2f7be0f4e35c276ca292a0ee9b6a,2025-02-24T03:15:09.913000 -CVE-2025-1613,0,1,ba1d013f56e0e7e90ce82820a2374c3264517278cdb885f670cdc1c315963d73,2025-02-28T18:33:35.540000 -CVE-2025-1614,0,1,7d6a9d5dca1d2dee06439db5fa1b87d1c8819ad5479aa7c9bf2b4e7d88bc5c7c,2025-02-28T18:33:35.540000 -CVE-2025-1615,0,1,6a395c4b348e38e53409f949776359dae903a343a3adc0dd732cc46cc3b0709e,2025-02-28T18:33:35.540000 +CVE-2025-1613,0,0,ba1d013f56e0e7e90ce82820a2374c3264517278cdb885f670cdc1c315963d73,2025-02-28T18:33:35.540000 +CVE-2025-1614,0,0,7d6a9d5dca1d2dee06439db5fa1b87d1c8819ad5479aa7c9bf2b4e7d88bc5c7c,2025-02-28T18:33:35.540000 +CVE-2025-1615,0,0,6a395c4b348e38e53409f949776359dae903a343a3adc0dd732cc46cc3b0709e,2025-02-28T18:33:35.540000 CVE-2025-1616,0,0,a672a15b9b40669806189d018535f8df7c6825128b1537d1516dac47f1781a3e,2025-02-24T04:15:09.110000 CVE-2025-1617,0,0,f8b5d497942700d9485e4f9475a52f7ce71fe3f54483032059a95f27d690d0e0,2025-02-24T04:15:09.277000 CVE-2025-1618,0,0,5653f37c834d7e927ebdf4835f8b4b2db1c30742d0495922546989d808169e24,2025-02-24T05:15:10.980000 @@ -280764,18 +280767,19 @@ CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763f CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000 CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000 CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000 +CVE-2025-1795,1,1,f2b6d5f331b6703ba5cea43cb50ee6f7fa3aa91fab1c7730080b7e41fbcabafe,2025-02-28T20:15:46.710000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000 -CVE-2025-20049,1,1,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000 +CVE-2025-20049,0,0,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000 CVE-2025-20051,0,0,e6b7645e93a43d3f98be16495acf3dd6524ccdb76b5deacdb9350be87ea59d78,2025-02-24T08:15:10.087000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000 CVE-2025-20059,0,0,0304aa8cefbc3b7773b05fc1982abd8d4aad2f54dbf23c30fea8d478e79caf85,2025-02-20T15:15:13.957000 -CVE-2025-20060,1,1,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5bbf,2025-02-28T17:15:16.440000 +CVE-2025-20060,0,0,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5bbf,2025-02-28T17:15:16.440000 CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20075,0,0,865d0029597f4a22c4fcd4b586cb53f270de05228e3eb9e2dbd853b62417cb6b,2025-02-18T00:15:21.107000 @@ -281272,7 +281276,7 @@ CVE-2025-21657,0,0,1965d9c3d1118ed3d2f0e817295e796ed532b053adb84b7658e4c043ba09b CVE-2025-21658,0,0,49f4fb1da0e36dec3735688e008c1d1b6e11cd524605dedd795d9dba62770702,2025-01-22T23:02:59.383000 CVE-2025-21659,0,0,c34fae85ac5791c6acdfb8c055236ca0db3c10e1f998433ca0b29112c1552ff1,2025-01-21T13:15:09.540000 CVE-2025-21660,0,0,62f40623237245457c3e1282812660b56ee49a4868b504432c0ca95a3b8af3bc,2025-01-21T13:15:09.643000 -CVE-2025-21661,0,0,0fa8c68f8e644a9e2944a5faceaf5fb67752dd573becbebbb71e40324bd4cdb4,2025-01-21T13:15:09.747000 +CVE-2025-21661,0,1,35570a826135021930919d68ecfb81fa996d5609fcae3470eeb02a50f2465a44,2025-02-28T18:59:45.207000 CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000 CVE-2025-21663,0,0,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000 CVE-2025-21664,0,0,87fd856e07f552629b0a9eaa9bb54dc5da1a52702744fda35e3dcc449f63ce6a,2025-02-02T11:15:15.697000 @@ -282005,9 +282009,9 @@ CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50 CVE-2025-23215,0,0,a5897cf119c937b7794d23dda77d817ac625eaf2083863a584978702663a3b0d,2025-01-31T17:15:16.957000 CVE-2025-23216,0,0,59f4f775f33e0ca9bd5247a87df3d43f61057b75f0cde53093fcb610ce66cc2a,2025-01-30T16:15:31.473000 CVE-2025-23217,0,0,8ad80aabb137afd5cbf04933a9b557f141436094decd8f90b5ff624bdff63b50,2025-02-06T18:15:32.667000 -CVE-2025-23218,0,0,72138514b4f0198bb761b4b4504d85f4f2dd402400b3e7282a68a58a09b04d1c,2025-02-18T20:15:27.813000 -CVE-2025-23219,0,0,ff8351d887bc29166dab82a4b68af000abcef0e83b233919e05ba508d1ac37c0,2025-02-18T21:15:28.200000 -CVE-2025-23220,0,0,5b564633412cece7af52329de23c0e8a76b7a6808360135afd457619c6bf08e8,2025-02-18T21:15:28.320000 +CVE-2025-23218,0,1,81b1550af38d29272033c07c57df0c25a7b15eea48bdb2075a8a6dcd1c2b61d1,2025-02-28T19:18:34.167000 +CVE-2025-23219,0,1,3f14cf0c503ac3e85dd03ec372abe9f306eb735a2b09170206a08c523c95256a,2025-02-28T19:18:34.167000 +CVE-2025-23220,0,1,f2a5803bc6ad9096282895d3b0200952d53255eccbb857151afcd4187a638ed3,2025-02-28T19:18:34.167000 CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000 CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000 @@ -282024,7 +282028,7 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23403,0,0,82b06e110d3ccd8c4d0bfc3742d0bc8ea53cc32814babb7763c06a537adabd76,2025-02-11T11:15:16.420000 -CVE-2025-23405,1,1,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000 +CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,702066a3a1f62106503d1ca03a4fdc1dc65eca10b986d5bd982d332e1bb0e8c6,2025-02-14T05:15:12.567000 CVE-2025-23411,0,0,d5f7bb7224f39d14b2dbf54b46dff651a924fc4bc3c91dc75a0e3dbbbbf2e5db,2025-02-13T22:15:11.913000 CVE-2025-23412,0,0,3faa269bcd3c90e82676b0efb29c0ad0e841370c3bd284f2de04616b2954d5d8,2025-02-05T18:15:31.580000 @@ -282548,8 +282552,8 @@ CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24200,0,0,f2c577050ea44e8f6c33596bdc7fd9ff3774f8bd3d2a6ec2a68471debb209273,2025-02-18T18:15:33.667000 CVE-2025-24312,0,0,035e309179990714bfc5a224383cb635d168f3d299c79f966057bc59a555a04b,2025-02-05T18:15:34.060000 -CVE-2025-24316,1,1,770bef4f97559304e30386e8115bd7582afb0c9db56f36e83bccb579d61f5751,2025-02-28T17:15:16.790000 -CVE-2025-24318,1,1,141558a454419e2326c0c64b4fbc3e837b318d293574156c8e8685ddefe4e612,2025-02-28T17:15:16.937000 +CVE-2025-24316,0,0,770bef4f97559304e30386e8115bd7582afb0c9db56f36e83bccb579d61f5751,2025-02-28T17:15:16.790000 +CVE-2025-24318,0,0,141558a454419e2326c0c64b4fbc3e837b318d293574156c8e8685ddefe4e612,2025-02-28T17:15:16.937000 CVE-2025-24319,0,0,adedd82905f17d94cd1618fe5c2333851373ebf3ef16127d104e641044be5e8f,2025-02-05T18:15:34.557000 CVE-2025-24320,0,0,2bad44d619fa596716ab7f544e528f9635ccdb2ac03fd982c2e4cc08e1be7d7e,2025-02-05T18:15:34.960000 CVE-2025-24326,0,0,e51dca79648e490d9fe8d840236f57a0bccda997f460d4addfb7847c850101d8,2025-02-05T18:15:35.420000 @@ -282880,9 +282884,9 @@ CVE-2025-24831,0,0,c92da556f0147b9019570da06039147ae8945532d2deb083de9ea344daaf5 CVE-2025-24832,0,0,870efa650445686b890ba6334f2e31e850b3cfdd76d306091357cb8327506c6a,2025-02-27T23:15:37.310000 CVE-2025-24836,0,0,da95ab8528e6c549bba778d1d67c04ab75f1d50ed423e85181f04464f9165463,2025-02-13T22:15:12.270000 CVE-2025-24841,0,0,1d3240b2c4701421f4a9b034e24dc1dfef619d09cb05043621b6f1df073122ab,2025-02-19T06:15:21.853000 -CVE-2025-24843,1,1,f7bbc384e2d75fb580e77146ec89d10eee9143db66ff21944216da0081af9b82,2025-02-28T17:15:17.103000 +CVE-2025-24843,0,0,f7bbc384e2d75fb580e77146ec89d10eee9143db66ff21944216da0081af9b82,2025-02-28T17:15:17.103000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 -CVE-2025-24849,1,1,0ee9898c778a9b7afdcc6b402323e98a9996b5fba0ecbd5a154a7193bceeb36e,2025-02-28T17:15:17.253000 +CVE-2025-24849,0,0,0ee9898c778a9b7afdcc6b402323e98a9996b5fba0ecbd5a154a7193bceeb36e,2025-02-28T17:15:17.253000 CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 CVE-2025-24861,0,0,113c002b02cdb53ae24f8b567132904b940b96dc6020c422cd77e3b2b0aa61d4,2025-02-13T22:15:12.457000 @@ -283082,8 +283086,10 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3 CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 -CVE-2025-25430,1,1,94a67adc555362067a515c38cf02aeb84a8bd7c8fa8c3cd90b22df5262795fa8,2025-02-28T18:15:28.263000 -CVE-2025-25431,1,1,226362430653b83ef54d39ec1534ee38f2c2c9ca36c02c59252ca3699e225ad2,2025-02-28T18:15:28.407000 +CVE-2025-25428,1,1,7c9e8b5adbcec4172a435bc0445a832224ef2aaebd6fa92be1fbe29fc2ee9ecb,2025-02-28T19:15:36.773000 +CVE-2025-25429,1,1,a61fb7d43c72ba797499b86c41300674b814c35aeb157c96b9f4ecd889f30718,2025-02-28T19:15:36.883000 +CVE-2025-25430,0,0,94a67adc555362067a515c38cf02aeb84a8bd7c8fa8c3cd90b22df5262795fa8,2025-02-28T18:15:28.263000 +CVE-2025-25431,0,0,226362430653b83ef54d39ec1534ee38f2c2c9ca36c02c59252ca3699e225ad2,2025-02-28T18:15:28.407000 CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,dbc3563b50545898d3f8b4c30a8e42190486beb767837401e5dfa97eecd0595d,2025-02-26T16:15:16.933000 @@ -283116,9 +283122,12 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 -CVE-2025-25570,0,1,32e808525bdc9ccfb33f1a48982d7482e28c3facacaecf7cc3a271998ba6398e,2025-02-28T18:15:28.550000 +CVE-2025-25570,0,0,32e808525bdc9ccfb33f1a48982d7482e28c3facacaecf7cc3a271998ba6398e,2025-02-28T18:15:28.550000 CVE-2025-25604,0,0,457f35c6359ddd5eef24e51dd4963a752d73ae97c52127dbf106b4eff7322652,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,34748c2d49452e82342e321bdee705f0c67db0d067f30724685df8b9c733840d,2025-02-21T21:15:24.317000 +CVE-2025-25609,1,1,7bf84b1e07826ca6db3fb598111557fee1cb62f682fbabe7e789b24e0c36948b,2025-02-28T19:15:36.993000 +CVE-2025-25610,1,1,ef390e1ef1ec1a7911bf3f4e4e276c7f840ff67beafba71f3ff1c0f017c97cd8,2025-02-28T19:15:37.107000 +CVE-2025-25635,1,1,ac55b0c97dd1dcb3ee34b4e93c1dc33a05def2222873f1109828fd7c9ad4701d,2025-02-28T19:15:37.223000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 CVE-2025-25663,0,0,2c66463e17f0da9d9b59da03f32234807a5e0504a922f80726e5f203d3e2d884,2025-02-21T18:15:41.693000 CVE-2025-25664,0,0,a850b1756187529b43d44abf29c2e6255214e11c23d9ad57a237c7a415fbb154,2025-02-21T18:15:45.417000 @@ -283132,7 +283141,7 @@ CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49 CVE-2025-25727,0,0,eed5aa4e92d3da35936b8898a3baaeb8486976d6506a3be4f81c3be66ac7acb1,2025-02-28T00:15:36.530000 CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314bf22,2025-02-28T00:15:36.680000 CVE-2025-25729,0,0,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000 -CVE-2025-25730,0,1,df869fdb6f75de4014fc9d3e6984f3d4256d5dd0ce1ddca08c3ef7bcd819b196,2025-02-28T17:15:17.420000 +CVE-2025-25730,0,1,5698d9d4b3d086c1c265c033d8b8d6ebf52c1e553b08fab79bfe6eec41adf00a,2025-02-28T20:15:46.803000 CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000 @@ -283213,7 +283222,7 @@ CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407 CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000 CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000 CVE-2025-26263,0,0,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000 -CVE-2025-26264,0,1,3b9969594edc53eb331a3ad5ba8cef0edc2b1f076c8c1ba8e7608adf9345d2b2,2025-02-28T18:15:28.773000 +CVE-2025-26264,0,0,3b9969594edc53eb331a3ad5ba8cef0edc2b1f076c8c1ba8e7608adf9345d2b2,2025-02-28T18:15:28.773000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 @@ -283222,7 +283231,7 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000 -CVE-2025-26325,0,1,768db356ae5a28d257787d374290d4da2450fd80af70d3435575d32d4a804c6b,2025-02-28T17:15:17.553000 +CVE-2025-26325,0,0,768db356ae5a28d257787d374290d4da2450fd80af70d3435575d32d4a804c6b,2025-02-28T17:15:17.553000 CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 @@ -283328,18 +283337,18 @@ CVE-2025-26601,0,0,c47459d49a54c86b2087b01903b49c6ce8dfa2dc807e4061c0627b72dfeb7 CVE-2025-26603,0,0,98d3250593609f9c86edf4134058a63ec04230372680cf78b7b24b6820ee8eb9,2025-02-18T19:15:29.387000 CVE-2025-26604,0,0,21ae053a765aca2e97aa573ccbf14889cfc80448b77b1b7bb3257d333e4e5218,2025-02-18T20:15:33.003000 CVE-2025-26605,0,0,887f32f157eeac58ad8bafc72dfb207493771e8001fa3b09a3fdc5d7653d8731,2025-02-18T22:15:19.387000 -CVE-2025-26606,0,0,1beb31e76f9ef91af61f07ff961c805e75651e3521636e839c4c0a8f9d57871b,2025-02-18T21:15:28.583000 -CVE-2025-26607,0,0,b7bf87a46897798810e930f82470e97f4540202536ae5ae8e03214db2db02b22,2025-02-18T21:15:28.730000 -CVE-2025-26608,0,0,b65d0316c1038b0b9dc2c541d00763ac5ab6aac097946d37c3ba0f7c8bf16133,2025-02-18T21:15:28.893000 -CVE-2025-26609,0,0,3cfec7549c0456a3fe77ece5481ce4166351a6c4219d81b84e85bf989a84f032,2025-02-18T21:15:29.110000 -CVE-2025-26610,0,0,f37fd9a2b20cbcf9d5b3b8c8a580b669633c2bf2558febd50ffd8a211d23a8fa,2025-02-18T21:15:29.233000 -CVE-2025-26611,0,0,550359247d9edf0faf24c1f36432364e58973fcf3c6f3338398af4d83934ba45,2025-02-18T21:15:29.357000 -CVE-2025-26612,0,0,a1063dcf2012a3376d4898fed93ddfb70c1ed870abbe62612c202d9c7608056f,2025-02-18T21:15:29.480000 -CVE-2025-26613,0,0,a60cba238d8944b8779c4334a08f946ff526fbd7716000fb3ed099764eff3e42,2025-02-18T21:15:29.607000 -CVE-2025-26614,0,0,72a676f13b470667e311410ca4ebb1d908fee0668f3b49b13d645a19634cce26,2025-02-18T21:15:29.737000 -CVE-2025-26615,0,0,68dca938d00fdc92ef07a92a37656bc393484edf353d03099851ad67e97120ce,2025-02-18T21:15:29.867000 -CVE-2025-26616,0,0,e5a350639160b89d34b1e9e562527fa0ba9e8f5594aa938c9953fb4b6b617b10,2025-02-18T21:15:30.010000 -CVE-2025-26617,0,0,22833ae02b8dcf9a8e3b638c8b55f1487d87755d4be6d978fbd331a727aaa3b3,2025-02-18T21:15:30.137000 +CVE-2025-26606,0,1,5c44607897c3e61e997b3c5b5d9c2e736f9d1b7a46f06b2ac80bb9f055b5bc6b,2025-02-28T19:18:34.167000 +CVE-2025-26607,0,1,750b38b782d11faf16462c8297c192108fda4214b5b7c2a4fbd261ccd65c2fec,2025-02-28T19:18:34.167000 +CVE-2025-26608,0,1,c3afe6836f08d337b5a62633208b93dc3d97979b5bc6530f71e7facd706d706f,2025-02-28T19:18:34.167000 +CVE-2025-26609,0,1,18060a703409b03922a4fe87a8db8ba3176637947e5a457bcaccaf1521ac11e4,2025-02-28T19:18:34.167000 +CVE-2025-26610,0,1,44b9a05fbc662253f672f914846340e9e9db10cfb1cbdbf2e2e3da284a9ec77c,2025-02-28T19:18:34.167000 +CVE-2025-26611,0,1,213ea119b16a0c36ac133c4dd2ab64c217b508c98f44fd50a1f62f0a29a4180a,2025-02-28T19:18:34.167000 +CVE-2025-26612,0,1,07b57927172cacbf7888f44ac309c85b72dd9e00a355b4a65642108c39350f5a,2025-02-28T19:18:34.167000 +CVE-2025-26613,0,1,e673ed2c00b05f6f776ac513768f321c65f7f1ac17e8960ea901d19da63431b8,2025-02-28T19:18:34.167000 +CVE-2025-26614,0,1,bc688f2fcb85f8e861c6e99cca2e7d2f0f90614fe8161ba8baa4493d5cd80cdf,2025-02-28T19:18:34.167000 +CVE-2025-26615,0,1,7ddf1fb24857766e0556cfdb393bd60668bd253b23a9c7df35950bb17e75a47c,2025-02-28T19:18:34.167000 +CVE-2025-26616,0,1,97f2997f53eac1d240ae492deda1569977ea8c4f081ebb278bc92521bef4cc19,2025-02-28T19:18:34.167000 +CVE-2025-26617,0,1,0cce4760a0a685e56f3959cbbda3409f2d84ddb79778cff333c96540255516cf,2025-02-28T19:18:34.167000 CVE-2025-26618,0,0,912be9a737ce18c8819afdc4d4dc2a65710aa63fac9be4a9ee672614754ab81e,2025-02-20T21:15:26.073000 CVE-2025-26620,0,0,26dae4102337906865f6523c0883aa7076c40f6f93fb48449695827abf3ae983,2025-02-18T18:15:36.767000 CVE-2025-26622,0,0,0bafa51d37f905d32266f99250febec707833a89fe716aea0a37fd117490a259,2025-02-22T16:15:31.033000 @@ -283451,7 +283460,7 @@ CVE-2025-27089,0,0,a454d43bdd21fb972482a0ce87896ca310da5d909b4331caf97bfdced4edb CVE-2025-27090,0,0,0a4ccf92007267c16eee4b4b222c0a1bb704a8cf350c4393244356bc535834a9,2025-02-27T20:18:12.583000 CVE-2025-27091,0,0,b859d3590fe981ab912d6921b74efbe324bec6c5ee689190e2cf257247d50a52,2025-02-27T20:18:12.583000 CVE-2025-27092,0,0,7104bc7ae5ee9a84de752291fd5401045f96963015db3ee80e61b32134a06641,2025-02-27T20:18:12.583000 -CVE-2025-27096,0,0,8031126df0bc9bd3535aad716c9693bd2a080d56a9e9b993fd3a05d39ceae52c,2025-02-20T19:15:12.157000 +CVE-2025-27096,0,1,713806d5fcce08ce5e5f69a4288233d3ecee84861b6679ecda83068a27e46fd0,2025-02-28T19:18:34.167000 CVE-2025-27097,0,0,2589fa071c1a9a9a5c73ad315b8e6452ddbba374e2341b11c614c9f7d8047e61,2025-02-27T20:18:12.583000 CVE-2025-27098,0,0,492c80cbc63ad6506b976d2c569a0f82a671edac45cb267f8bf0fb56623897bc,2025-02-27T20:18:12.583000 CVE-2025-27100,0,0,152b527bb539a37ffbb5e9412203b3d57121014fdbae99a77c0074299a956949,2025-02-21T00:15:09.250000 @@ -283531,4 +283540,4 @@ CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000 CVE-2025-27399,0,0,047834ae4cb02eb8c620e48e474a23f71c1292e787766a014db687c899a834cc,2025-02-27T18:15:30.380000 CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000 -CVE-2025-27408,1,1,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000 +CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000