From 808aa8c1f519a35ff4a3adc24ac3397ea5ba773f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 19 Feb 2025 17:04:22 +0000 Subject: [PATCH] Auto-Update: 2025-02-19T17:00:54.292989+00:00 --- CVE-2020/CVE-2020-159xx/CVE-2020-15945.json | 8 +- CVE-2020/CVE-2020-88xx/CVE-2020-8889.json | 22 +- CVE-2022/CVE-2022-415xx/CVE-2022-41545.json | 45 ++- CVE-2022/CVE-2022-424xx/CVE-2022-42447.json | 12 +- CVE-2022/CVE-2022-462xx/CVE-2022-46283.json | 16 ++ CVE-2023/CVE-2023-02xx/CVE-2023-0272.json | 22 +- CVE-2023/CVE-2023-03xx/CVE-2023-0395.json | 22 +- CVE-2023/CVE-2023-10xx/CVE-2023-1087.json | 22 +- CVE-2023/CVE-2023-243xx/CVE-2023-24308.json | 32 ++- CVE-2023/CVE-2023-252xx/CVE-2023-25261.json | 12 +- CVE-2023/CVE-2023-260xx/CVE-2023-26071.json | 32 ++- CVE-2023/CVE-2023-265xx/CVE-2023-26549.json | 12 +- CVE-2023/CVE-2023-285xx/CVE-2023-28597.json | 12 +- CVE-2023/CVE-2023-379xx/CVE-2023-37977.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12547.json | 49 +++- CVE-2024/CVE-2024-125xx/CVE-2024-12548.json | 49 +++- CVE-2024/CVE-2024-125xx/CVE-2024-12549.json | 49 +++- CVE-2024/CVE-2024-216xx/CVE-2024-21685.json | 107 ++++++- CVE-2024/CVE-2024-287xx/CVE-2024-28776.json | 56 ++++ CVE-2024/CVE-2024-287xx/CVE-2024-28777.json | 56 ++++ CVE-2024/CVE-2024-287xx/CVE-2024-28780.json | 56 ++++ CVE-2024/CVE-2024-35xx/CVE-2024-3564.json | 54 +++- CVE-2024/CVE-2024-35xx/CVE-2024-3565.json | 84 +++++- CVE-2024/CVE-2024-431xx/CVE-2024-43128.json | 47 ++- CVE-2024/CVE-2024-450xx/CVE-2024-45081.json | 56 ++++ CVE-2024/CVE-2024-450xx/CVE-2024-45084.json | 56 ++++ CVE-2024/CVE-2024-506xx/CVE-2024-50608.json | 45 ++- CVE-2024/CVE-2024-506xx/CVE-2024-50609.json | 45 ++- CVE-2024/CVE-2024-529xx/CVE-2024-52902.json | 56 ++++ CVE-2024/CVE-2024-537xx/CVE-2024-53704.json | 197 ++++++++++++- CVE-2024/CVE-2024-554xx/CVE-2024-55460.json | 45 ++- CVE-2024/CVE-2024-568xx/CVE-2024-56882.json | 45 ++- CVE-2024/CVE-2024-568xx/CVE-2024-56883.json | 45 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57045.json | 45 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57049.json | 45 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57050.json | 45 ++- CVE-2024/CVE-2024-64xx/CVE-2024-6458.json | 62 +++- CVE-2025/CVE-2025-01xx/CVE-2025-0108.json | 303 +++++++++++++++++++- CVE-2025/CVE-2025-09xx/CVE-2025-0995.json | 24 +- CVE-2025/CVE-2025-09xx/CVE-2025-0996.json | 28 +- CVE-2025/CVE-2025-09xx/CVE-2025-0997.json | 24 +- CVE-2025/CVE-2025-09xx/CVE-2025-0998.json | 26 +- CVE-2025/CVE-2025-14xx/CVE-2025-1465.json | 141 +++++++++ CVE-2025/CVE-2025-201xx/CVE-2025-20153.json | 56 ++++ CVE-2025/CVE-2025-201xx/CVE-2025-20158.json | 56 ++++ CVE-2025/CVE-2025-202xx/CVE-2025-20211.json | 56 ++++ CVE-2025/CVE-2025-213xx/CVE-2025-21387.json | 100 ++++++- CVE-2025/CVE-2025-229xx/CVE-2025-22921.json | 43 ++- CVE-2025/CVE-2025-243xx/CVE-2025-24373.json | 66 ++++- CVE-2025/CVE-2025-253xx/CVE-2025-25343.json | 76 ++++- CVE-2025/CVE-2025-254xx/CVE-2025-25467.json | 43 ++- CVE-2025/CVE-2025-254xx/CVE-2025-25468.json | 43 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25891.json | 47 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25892.json | 47 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25893.json | 47 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25894.json | 47 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25895.json | 47 ++- CVE-2025/CVE-2025-258xx/CVE-2025-25896.json | 47 ++- CVE-2025/CVE-2025-264xx/CVE-2025-26465.json | 10 +- README.md | 48 +++- _state.csv | 111 +++---- 61 files changed, 2972 insertions(+), 233 deletions(-) create mode 100644 CVE-2022/CVE-2022-462xx/CVE-2022-46283.json create mode 100644 CVE-2024/CVE-2024-287xx/CVE-2024-28776.json create mode 100644 CVE-2024/CVE-2024-287xx/CVE-2024-28777.json create mode 100644 CVE-2024/CVE-2024-287xx/CVE-2024-28780.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45081.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45084.json create mode 100644 CVE-2024/CVE-2024-529xx/CVE-2024-52902.json create mode 100644 CVE-2025/CVE-2025-14xx/CVE-2025-1465.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20153.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20158.json create mode 100644 CVE-2025/CVE-2025-202xx/CVE-2025-20211.json diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15945.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15945.json index fed19335308..21d83eb4202 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15945.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15945.json @@ -2,13 +2,13 @@ "id": "CVE-2020-15945", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-24T21:15:34.553", - "lastModified": "2024-11-21T05:06:30.630", + "lastModified": "2025-02-19T15:15:10.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function." + "value": "Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function." }, { "lang": "es", @@ -113,6 +113,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.lua.org/bugs.html#5.4.0-8", + "source": "cve@mitre.org" + }, { "url": "http://lua-users.org/lists/lua-l/2020-07/msg00123.html", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2020/CVE-2020-88xx/CVE-2020-8889.json b/CVE-2020/CVE-2020-88xx/CVE-2020-8889.json index 9e3e62cea57..0b76cd406fd 100644 --- a/CVE-2020/CVE-2020-88xx/CVE-2020-8889.json +++ b/CVE-2020/CVE-2020-88xx/CVE-2020-8889.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8889", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-28T21:15:10.070", - "lastModified": "2024-11-21T05:39:38.247", + "lastModified": "2025-02-19T16:15:34.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json b/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json index ad58159ed1b..82dda977294 100644 --- a/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json +++ b/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json @@ -2,16 +2,55 @@ "id": "CVE-2022-41545", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:13.450", - "lastModified": "2025-02-18T18:15:13.450", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:11.890", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack." + }, + { + "lang": "es", + "value": "La interfaz web administrativa de NetGear C7800 router con la versi\u00f3n de firmware 6.01.07 (y posiblemente otras) autentica a los usuarios mediante autenticaci\u00f3n b\u00e1sica, con un encabezado HTTP que contiene un valor base64 del nombre de usuario y la contrase\u00f1a en texto plano. Debido a que el servidor web tampoco utiliza seguridad de transporte de manera predeterminada, esto hace que las credenciales administrativas sean vulnerables a escuchas clandestinas por parte de un adversario durante cada solicitud autenticada que realiza un cliente al router a trav\u00e9s de una red inal\u00e1mbrica (WLAN) o una red local (LAN), en caso de que el adversario pueda realizar un ataque de intermediario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://seclists.org/fulldisclosure/2025/Feb/12", diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42447.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42447.json index 611b3e9fa6e..1a3dd2f8aa1 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42447.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42447.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42447", "sourceIdentifier": "psirt@hcl.com", "published": "2023-04-02T21:15:08.120", - "lastModified": "2024-11-21T07:24:59.133", + "lastModified": "2025-02-19T16:15:35.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46283.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46283.json new file mode 100644 index 00000000000..03cdf778b7e --- /dev/null +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46283.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2022-46283", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-19T15:15:12.163", + "lastModified": "2025-02-19T15:15:12.163", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0272.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0272.json index 2ec2e9bd689..c0408a4a476 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0272.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0272.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0272", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-27T16:15:07.937", - "lastModified": "2024-11-21T07:36:52.310", + "lastModified": "2025-02-19T16:15:35.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0395.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0395.json index a340c0e2a04..9d2d672550d 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0395.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0395.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0395", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-27T16:15:08.133", - "lastModified": "2024-11-21T07:37:06.467", + "lastModified": "2025-02-19T15:15:12.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1087.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1087.json index 1b20e072320..98c7e85fa91 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1087.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1087.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1087", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-27T16:15:09.610", - "lastModified": "2024-11-21T07:38:26.007", + "lastModified": "2025-02-19T16:15:35.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24308.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24308.json index 5f8b328c341..be6a7d314b5 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24308.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24308.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24308", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-28T21:15:10.710", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-19T16:15:36.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25261.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25261.json index b8b9c52d65e..ff784d7db6b 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25261.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25261", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-27T21:15:11.053", - "lastModified": "2024-11-21T07:49:21.750", + "lastModified": "2025-02-19T16:15:36.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26071.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26071.json index ef6a3383a48..c142c0efe8d 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26071.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26071.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26071", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-28T20:15:13.343", - "lastModified": "2024-11-21T07:50:43.147", + "lastModified": "2025-02-19T16:15:37.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26549.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26549.json index 71dc8b87708..9ccf9def88a 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26549.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26549.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26549", "sourceIdentifier": "psirt@huawei.com", "published": "2023-03-27T22:15:21.910", - "lastModified": "2024-11-21T07:51:43.687", + "lastModified": "2025-02-19T16:15:37.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-233" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28597.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28597.json index d1721d12a20..ad1fc57f4b1 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28597.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28597.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28597", "sourceIdentifier": "security@zoom.us", "published": "2023-03-27T21:15:12.260", - "lastModified": "2024-11-21T07:55:38.240", + "lastModified": "2025-02-19T16:15:37.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -75,6 +75,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-501" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37977.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37977.json index 9f3ed595cd2..8a13b525f74 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37977.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37977.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37977", "sourceIdentifier": "audit@patchstack.com", "published": "2023-07-27T15:15:11.207", - "lastModified": "2024-11-21T08:12:37.607", + "lastModified": "2025-02-19T16:29:43.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:coderex:wpfunnels:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:getwpfunnels:wpfunnels:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.17", - "matchCriteriaId": "E568BF8E-23ED-4DDF-98C2-A57775D37F6F" + "matchCriteriaId": "A9735C08-825F-4268-BE7B-33410F454A2C" } ] } diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json index 604c63da1de..0f6598bc904 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12547", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.400", - "lastModified": "2025-02-11T20:15:33.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T15:24:27.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.1.2", + "matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1681/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json index 0ab2a510f5b..91e1757d795 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12548.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12548", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.537", - "lastModified": "2025-02-11T20:15:33.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T15:24:20.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.1.2", + "matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1680/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json index be9e2f139c7..a55c7f25d62 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12549", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.673", - "lastModified": "2025-02-11T20:15:33.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T15:24:10.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.1.2", + "matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1679/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json index 0569b31ddcb..270b3e5d80a 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21685", "sourceIdentifier": "security@atlassian.com", "published": "2024-06-18T17:15:51.243", - "lastModified": "2024-11-21T08:54:51.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T16:00:53.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,22 +61,95 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.21", + "matchCriteriaId": "56BDAD3F-90AB-4008-A532-279EEA57B973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.12.0", + "versionEndExcluding": "9.12.8", + "matchCriteriaId": "CFE49300-FB5D-4861-B287-D5656E3883DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.15.0", + "versionEndExcluding": "9.16.0", + "matchCriteriaId": "012C2A6D-F82F-4089-AC47-5D8E65BC6CCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.21", + "matchCriteriaId": "8D642873-2293-434C-94E2-488A95AB2770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.12.0", + "versionEndExcluding": "9.12.8", + "matchCriteriaId": "DBC7CD6E-6B35-4DFB-B55A-69761C38C369" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/JRASERVER-77713", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/JRASERVER-77713", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json new file mode 100644 index 00000000000..553cce6047b --- /dev/null +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-28776", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T16:15:38.870", + "lastModified": "2025-02-19T16:15:38.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json new file mode 100644 index 00000000000..19107dfb7b6 --- /dev/null +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-28777", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T16:15:39.363", + "lastModified": "2025-02-19T16:15:39.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\nis vulnerable to unrestricted deserialization. This vulnerability allows users to execute arbitrary code, escalate privileges, or cause denial of service attacks by exploiting the unrestricted deserialization of types in the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json new file mode 100644 index 00000000000..4fb90839b5a --- /dev/null +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-28780", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T16:15:39.510", + "lastModified": "2025-02-19T16:15:39.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 Rich Client\u00a0\n\n\n\n\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json index c8397ead264..79fd2f87965 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3564", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:08.743", - "lastModified": "2024-11-21T09:29:53.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T16:09:31.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.1", + "matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a0b8fe-d284-4780-84b5-2e97fa96c99a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a0b8fe-d284-4780-84b5-2e97fa96c99a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json index 41b6d63e05e..68a9e381173 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3565", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:09.000", - "lastModified": "2024-11-21T09:29:53.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T16:08:35.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.1", + "matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/custom-post-widget/trunk/shortcode.php#L62", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16d8eab2-953a-46bf-a0f6-296bcea86305?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/custom-post-widget/trunk/shortcode.php#L62", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=#file6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16d8eab2-953a-46bf-a0f6-296bcea86305?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json index 5b6d0cf5c00..bf6c4b44547 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43128", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-13T11:15:18.450", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T15:41:37.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wcproducttable:woocommerce_product_table:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "3.8.6", + "matchCriteriaId": "FAF71D22-830B-404E-A7BA-AD2DE98D9F13" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wc-product-table-lite/wordpress-woocommerce-product-table-lite-plugin-3-5-1-arbitrary-code-execution-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json new file mode 100644 index 00000000000..a77c4c7db0d --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45081", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T16:15:39.740", + "lastModified": "2025-02-19T16:15:39.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\ncould allow an authenticated user to modify restricted content due to incorrect authorization checks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json new file mode 100644 index 00000000000..38f4d400ea0 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45084", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T16:15:39.900", + "lastModified": "2025-02-19T16:15:39.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\ncould allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json index 5b405f5ae85..6941b075807 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50608", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:25.667", - "lastModified": "2025-02-18T18:15:25.667", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:13.970", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_metrics_ng() at prom_rw_prot.c." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Fluent Bit 3.1.9. Cuando el complemento de entrada de escritura remota de Prometheus se ejecuta y escucha en una direcci\u00f3n IP y un puerto, uno puede enviar un paquete con contenido-longitud: 0 y bloquea el servidor. La gesti\u00f3n inadecuada del caso cuando la longitud de contenido es 0 permite que un usuario (con acceso a el endpoint) realice un ataque remoto de denegaci\u00f3n de servicio. El bloqueo ocurre debido a una deserferencia de puntero nulo cuando 0 (desde la longitud del contenido) se pasa a la funci\u00f3n CFL_SDS_LEN, que a su vez intenta lanzar un puntero nulo en Struct CFL_SDS. Esto est\u00e1 relacionado con process_payload_metrics_ng () en PROM_RW_PROT.C." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://fluentbit.io/announcements/", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json index 5b5dec191d9..16bba535f45 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50609", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:25.833", - "lastModified": "2025-02-18T18:15:25.833", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:14.497", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Fluent Bit 3.1.9. Cuando el complemento de entrada OperTelemetry se ejecuta y escucha en una direcci\u00f3n IP y un puerto, uno puede enviar un paquete con contenido-longitud: 0 y bloquea el servidor. La gesti\u00f3n inadecuada del caso cuando la longitud de contenido es 0 permite que un usuario (con acceso a el endpoint) realice un ataque remoto de denegaci\u00f3n de servicio. El bloqueo ocurre debido a una deserferencia de puntero nulo cuando 0 (desde la longitud del contenido) se pasa a la funci\u00f3n CFL_SDS_LEN, que a su vez intenta lanzar un puntero nulo en Struct CFL_SDS. Esto est\u00e1 relacionado con process_payload_traces_proto_ng () en opentelemetry_prot.c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://fluentbit.io/announcements/", diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json new file mode 100644 index 00000000000..0f207b27ee1 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52902", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-19T15:15:14.660", + "lastModified": "2025-02-19T15:15:14.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183597", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json index c3edc58aba5..2bd3f07badf 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53704", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.203", - "lastModified": "2025-02-19T02:00:02.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T15:33:49.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,10 +75,181 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.1-7040", + "versionEndIncluding": "7.1.1-7058", + "matchCriteriaId": "065DD610-7821-4A0E-9CC8-1255F1729126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:7.1.2-7019:*:*:*:*:*:*:*", + "matchCriteriaId": "0131B5D1-47FF-4A35-8983-7C08E021F7A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:8.0.0-8035:*:*:*:*:*:*:*", + "matchCriteriaId": "495254B3-5733-467E-AAA0-A9D385328C8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "129CC10F-E822-4BF7-9EB5-0D702020CB0C" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json index b7505242f82..3bf4033345d 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55460", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T17:15:19.013", - "lastModified": "2025-02-18T17:15:19.013", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:14.810", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL basada en the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Ap0k4L1p5/CVE-research/tree/master/CVE-2024-55460", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json index 79261c95203..f43c4370522 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56882", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:26.830", - "lastModified": "2025-02-18T18:15:26.830", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:14.970", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements." + }, + { + "lang": "es", + "value": "Sage DPW antes de 2024_12_000 es vulnerable a Cross Site Scripting (XSS). Los usuarios de SAGE de bajo privilegio con permisos de roles de empleados pueden almacenar permanentemente el c\u00f3digo JavaScript en los campos de entrada Kurstitel y Kurzinfo. El payload inyectado se ejecuta para cada usuario autenticado que ve e interact\u00faa con los elementos de datos modificados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cves.at/posts/cve-cve-2024-56882/writeup/", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json index 94d5c784799..6849cce6480 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json @@ -2,16 +2,55 @@ "id": "CVE-2024-56883", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:27.287", - "lastModified": "2025-02-18T18:15:27.287", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:15.140", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user." + }, + { + "lang": "es", + "value": "SAGE DPW antes de 2024_12_001 es vulnerable al control de acceso incorrecto. Los controles de acceso basados ??en roles implementados no siempre se aplican en el lado del servidor. Los usuarios de SAGE de bajo privilegio con permisos de roles de empleados pueden crear cursos externos para otros empleados, a pesar de que no tienen la opci\u00f3n de hacerlo en la interfaz de usuario. Para hacer esto, una solicitud v\u00e1lida para crear un curso simplemente debe modificarse, de modo que la ID de usuario actual en el par\u00e1metro \"ID\" se reemplace con la ID de otro usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cves.at/posts/cve-cve-2024-56883/writeup/", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json index ee87703bae9..4167c2864e3 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57045", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T15:15:16.677", - "lastModified": "2025-02-18T15:15:16.677", - "vulnStatus": "Received", + "lastModified": "2025-02-19T16:15:40.317", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el D-Link DIR-859 router con la versi\u00f3n de firmware A3 1.05 y antes permite a las personas no autorizadas evitar la autenticaci\u00f3n. Un atacante puede obtener un nombre de usuario y contrase\u00f1a forjando una solicitud de publicaci\u00f3n a la p\u00e1gina / getcfg.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/D-Link/DIR-859/ACL%20bypass%20Vulnerability%20in%20D-Link%20DIR-859.md", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json index 5622792777c..7a5bc34fd21 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57049", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T15:15:16.890", - "lastModified": "2025-02-18T15:15:16.890", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:15.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el TP-Link Archer C20 router con la versi\u00f3n de firmware V6.6_230412 y antes permite a las personas no autorizadas evitar la autenticaci\u00f3n de algunas interfaces bajo el directorio /CGI. Al agregar referente: http://tplinkwifi.net a la solicitud, se reconocer\u00e1 que pasa la autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json index 5456df7fa22..325c04fc2e9 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57050", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T15:15:16.977", - "lastModified": "2025-02-18T15:15:16.977", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:15.460", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el TP-Link WR840N V6 router con el firmware Versi\u00f3n 0.9.1 4.16 y antes permite a las personas no autorizadas omitir la autenticaci\u00f3n de algunas interfaces en el directorio/CGI. Cuando agregue el referente: http://tplinkwifi.netnet. a la solicitud, se reconocer\u00e1 como aprobar la autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json index 1ea04a24c07..bc85ea517f0 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6458.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6458", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-27T09:15:02.123", - "lastModified": "2024-11-21T09:49:41.607", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T15:38:25.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,78 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wcproducttable:woocommerce_product_table:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "3.8.6", + "matchCriteriaId": "FAF71D22-830B-404E-A7BA-AD2DE98D9F13" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/presets/presets.php#L120", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3125858%40wc-product-table-lite&new=3125858%40wc-product-table-lite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e06fb465-4c72-49a8-af35-ff6d629ff9a0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/presets/presets.php#L120", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3125858%40wc-product-table-lite&new=3125858%40wc-product-table-lite&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e06fb465-4c72-49a8-af35-ff6d629ff9a0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json index b1911ae7c0b..06a6478dcb9 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0108", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-02-12T21:15:16.290", - "lastModified": "2025-02-19T02:00:02.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T15:33:43.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } ] }, "cisaExploitAdd": "2025-02-18", @@ -75,12 +97,287 @@ "value": "CWE-306" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.14", + "matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.7", + "matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.10", + "versionEndExcluding": "10.2.12", + "matchCriteriaId": "F9BD5E2D-61D2-4872-ACD1-D5B442CC809D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.1.6", + "matchCriteriaId": "855047CA-ABFA-4F3D-AF98-245D14B75798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2.0", + "versionEndExcluding": "11.2.4", + "matchCriteriaId": "7E4D3A51-0A40-4B19-AAFC-A2484B1CF5D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*", + "matchCriteriaId": "B41A7115-A370-49E1-B162-24803E6DD2CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*", + "matchCriteriaId": "65949A49-03A7-491C-B327-127F050AC4F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*", + "matchCriteriaId": "E8ACB147-B4C1-4964-B538-EAA117CC6DC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*", + "matchCriteriaId": "6643574D-C024-440C-9392-004B7FA4498F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*", + "matchCriteriaId": "7422F37D-7ABA-4BEC-8448-45A8F585D6F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*", + "matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*", + "matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*", + "matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*", + "matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*", + "matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*", + "matchCriteriaId": "FA91A4E9-CE1E-4CB8-B717-4B0E314C0171" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*", + "matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*", + "matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*", + "matchCriteriaId": "1311961A-0EF6-488E-B0C2-EDBD508587C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*", + "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*", + "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*", + "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*", + "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*", + "matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*", + "matchCriteriaId": "C889402F-138A-45B9-BBCF-91FD18A0B810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*", + "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*", + "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*", + "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*", + "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*", + "matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*", + "matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*", + "matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*", + "matchCriteriaId": "CCC2A6DA-EB48-42CD-9234-A80C3F6AEFAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*", + "matchCriteriaId": "046874F8-7DA7-4E2A-99BF-509424E6CCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*", + "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*", + "matchCriteriaId": "3D33A0FB-7538-42BF-84E8-7CCD7EEF9355" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*", + "matchCriteriaId": "FB95D77F-1263-4D47-A0BB-94A6DA937115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*", + "matchCriteriaId": "8EA4C2A7-18CD-4232-B08C-99BEFE497A57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*", + "matchCriteriaId": "357B747E-F960-4AA9-8696-B3BD89933630" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*", + "matchCriteriaId": "1FDB3D90-6656-49C5-9852-1F987BAEF0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*", + "matchCriteriaId": "C2B871A6-0636-42A0-9573-6F693D7753AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*", + "matchCriteriaId": "F1FC63B8-B8D9-4EC1-85CA-2E12B38ACD3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*", + "matchCriteriaId": "60CE628F-C4CB-4342-8D71-DE61A089B612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*", + "matchCriteriaId": "52C50A07-F4D8-4F1F-BA61-3429BB1721BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*", + "matchCriteriaId": "C01AD190-F3C2-4349-A063-8C5C78B725B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*", + "matchCriteriaId": "30F4CD1C-6862-4279-8D2D-40B4D164222F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*", + "matchCriteriaId": "A52B7A7A-483A-4075-B1E9-5C14B66F7FC3" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2025-0108", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json index 3bf88244eba..a3851a4123e 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0995", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.127", - "lastModified": "2025-02-18T17:15:19.383", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:16.073", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 2.5, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json index c1d11a2fdef..7121e15e29b 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0996", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.260", - "lastModified": "2025-02-18T18:15:29.130", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:16.243", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 5.9, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.5, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,16 +49,6 @@ "value": "CWE-1007" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-1007" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json index 73231635b96..415c99a8962 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0997", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.377", - "lastModified": "2025-02-18T18:15:29.347", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:16.407", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.5, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json index 63c2e4eba8c..becbccaa7ef 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0998", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.483", - "lastModified": "2025-02-18T18:15:29.550", - "vulnStatus": "Received", + "lastModified": "2025-02-19T15:15:16.563", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 2.5, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json new file mode 100644 index 00000000000..96a901df519 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1465", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-19T16:15:40.667", + "lastModified": "2025-02-19T16:15:40.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.2, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NeoVuln/CVE/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.296238", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.296238", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.496877", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json new file mode 100644 index 00000000000..b95f2c0f306 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20153", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-19T16:15:40.860", + "lastModified": "2025-02-19T16:15:40.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device.  \r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-mailpol-bypass-5nVcJZMw", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json new file mode 100644 index 00000000000..0a47d1c4804 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20158", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-19T16:15:41.017", + "lastModified": "2025-02-19T16:15:41.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-info-disc-YyxsWStK", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json new file mode 100644 index 00000000000..71c790a7b9c --- /dev/null +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20211", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-19T16:15:41.163", + "lastModified": "2025-02-19T16:15:41.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-GDPgJ58P", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json index dde92c4811a..778515a8982 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21387.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21387", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.337", - "lastModified": "2025-02-11T18:15:37.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T16:55:39.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,111 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", + "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", + "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*", + "matchCriteriaId": "CD88F667-6773-4DB7-B6C3-9C7B769C0808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", + "matchCriteriaId": "B342EF98-B414-44D0-BAFB-FCA24294EECE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*", + "matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*", + "matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*", + "matchCriteriaId": "1AC0C23F-FC55-4DA1-8527-EB4432038FB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*", + "matchCriteriaId": "A719B461-7869-46D0-9300-D0A348DC26A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*", + "matchCriteriaId": "0DF36AFA-B48C-4423-AD1C-78EEFF85EF2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:*", + "matchCriteriaId": "19F65776-446D-404C-A830-990D4232791A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:*", + "matchCriteriaId": "017875F7-5396-4069-9F9F-0BDA05143A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:macos:*:*", + "matchCriteriaId": "873BD998-9D5A-4C09-A3B3-4DB12ABB6F72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.10416.20058", + "matchCriteriaId": "47336A7E-B09A-4CEA-B327-504598D63AD1" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21387", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22921.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22921.json index 9e6b4366f00..9975e1e583f 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22921.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22921.json @@ -2,16 +2,55 @@ "id": "CVE-2025-22921", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.040", - "lastModified": "2025-02-18T22:15:18.040", + "lastModified": "2025-02-19T15:15:17.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FFmpeg git-master,N-113007-g8d24a28d06 was discovered to contain a segmentation violation via the component /libavcodec/jpeg2000dec.c." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que FFMPEG GIT-Master, N-113007-G8D24A28D06 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente /LibavCodec/JPEG2000DEC.C." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://trac.ffmpeg.org/ticket/11393", diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json index dd021bd95de..e8b5827130d 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24373.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24373", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-04T19:15:33.680", - "lastModified": "2025-02-04T19:15:33.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-19T15:45:13.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,28 +59,84 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpovernight:woocommerce_pdf_invoices\\&_packing_slips:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.0", + "matchCriteriaId": "27C9E483-44CC-4B60-BF9F-E36BC382AD4B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wpovernight/woocommerce-pdf-invoices-packing-slips/commit/6daeff87f8a7f941f0f7cf4637f41d22c4428c30", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/wpovernight/woocommerce-pdf-invoices-packing-slips/security/advisories/GHSA-3j9m-cp35-94fr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json index 05913db545d..10145d08ecf 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25343.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25343", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T19:15:22.003", - "lastModified": "2025-02-12T19:15:22.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-19T16:41:43.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,79 @@ "value": "El firmware Tenda AC6 V15.03.05.16 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n formexeCommand." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wy876/cve/issues/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25467.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25467.json index 43f88c1288e..495fd011d8a 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25467.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25467.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25467", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.373", - "lastModified": "2025-02-18T22:15:18.373", + "lastModified": "2025-02-19T15:15:17.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient tracking and releasing of allocated used memory in libx264 git master allows attackers to execute arbitrary code via creating a crafted AAC file." + }, + { + "lang": "es", + "value": "El seguimiento y la liberaci\u00f3n insuficientes de la memoria utilizada asignada en Libx264 Git Master permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la creaci\u00f3n de un archivo manipulado AAC." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://code.videolan.org/videolan/x264/-/issues/75", diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25468.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25468.json index 30a856346b0..ddde1333dd2 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25468.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25468.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25468", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.477", - "lastModified": "2025-02-18T22:15:18.477", + "lastModified": "2025-02-19T15:15:17.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FFmpeg git-master before commit d5873b was discovered to contain a memory leak in the component libavutil/mem.c." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que FFMPEG Git-Master antes de commit D5873B conten\u00eda una fuga de memoria en el componente Libavutil/Mem.c." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/d5873be583ada9e1fb887e2fe8dcfd4b12e0efcd", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25891.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25891.json index 5f29b25c5bd..517c6353b2c 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25891.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25891.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25891", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.693", - "lastModified": "2025-02-18T22:15:18.693", + "lastModified": "2025-02-19T16:15:41.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01, activado por los par\u00e1metros de destino, m\u00e1scara de red y puerta de enlace. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25892.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25892.json index 909d2b429dc..10e37d0f6cf 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25892.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25892.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25892", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.803", - "lastModified": "2025-02-18T22:15:18.803", + "lastModified": "2025-02-19T16:15:41.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros SSTARTIP, SendIP, DSTARTIP y DENDIP. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25893.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25893.json index a84d62e2072..930183f5036 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25893.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25893.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25893", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:18.920", - "lastModified": "2025-02-18T22:15:18.920", + "lastModified": "2025-02-19T16:15:41.763", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros INIP, INSPORT, Informe, Export, Exeport y Protocol. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25894.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25894.json index 20b479191c3..0726d6920f7 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25894.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25894.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25894", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:19.040", - "lastModified": "2025-02-18T22:15:19.040", + "lastModified": "2025-02-19T16:15:41.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros Samba_WG y Samba_NBN. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25895.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25895.json index 0eaee10d6d6..690c8484cad 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25895.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25895.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25895", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:19.163", - "lastModified": "2025-02-18T22:15:19.163", + "lastModified": "2025-02-19T16:15:42.087", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s del par\u00e1metro public_type. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25896.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25896.json index 1103966a913..5fd6b276e1d 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25896.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25896.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25896", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:19.277", - "lastModified": "2025-02-18T22:15:19.277", + "lastModified": "2025-02-19T16:15:42.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros de destino, m\u00e1scara de red y puerta de enlace. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json index 309b6d59e27..675f1fa6aa7 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26465", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T19:15:29.230", - "lastModified": "2025-02-19T05:15:12.440", + "lastModified": "2025-02-19T15:15:18.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en OpenSSH cuando la opci\u00f3n VerifyHostKeyDNS est\u00e1 habilitada. Un ataque de m\u00e1quina en el medio puede ser realizado mediante una m\u00e1quina maliciosa que se hace pasar por un servidor leg\u00edtimo. Este problema ocurre debido a c\u00f3mo los c\u00f3digos de error de OpenSSH Mishandles en condiciones espec\u00edficas al verificar la clave del host. Para que un ataque se considere exitoso, el atacante debe lograr agotar el recurso de memoria del cliente primero, lo que gira la complejidad del ataque." } ], "metrics": { @@ -99,6 +103,10 @@ { "url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/oss-sec/2025/q1/144", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 088e14cb888..f4e1f579dce 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-19T15:01:15.588634+00:00 +2025-02-19T17:00:54.292989+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-19T14:15:30.337000+00:00 +2025-02-19T16:55:39.487000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281791 +281802 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `11` -- [CVE-2025-1464](CVE-2025/CVE-2025-14xx/CVE-2025-1464.json) (`2025-02-19T14:15:30.337`) +- [CVE-2022-46283](CVE-2022/CVE-2022-462xx/CVE-2022-46283.json) (`2025-02-19T15:15:12.163`) +- [CVE-2024-28776](CVE-2024/CVE-2024-287xx/CVE-2024-28776.json) (`2025-02-19T16:15:38.870`) +- [CVE-2024-28777](CVE-2024/CVE-2024-287xx/CVE-2024-28777.json) (`2025-02-19T16:15:39.363`) +- [CVE-2024-28780](CVE-2024/CVE-2024-287xx/CVE-2024-28780.json) (`2025-02-19T16:15:39.510`) +- [CVE-2024-45081](CVE-2024/CVE-2024-450xx/CVE-2024-45081.json) (`2025-02-19T16:15:39.740`) +- [CVE-2024-45084](CVE-2024/CVE-2024-450xx/CVE-2024-45084.json) (`2025-02-19T16:15:39.900`) +- [CVE-2024-52902](CVE-2024/CVE-2024-529xx/CVE-2024-52902.json) (`2025-02-19T15:15:14.660`) +- [CVE-2025-1465](CVE-2025/CVE-2025-14xx/CVE-2025-1465.json) (`2025-02-19T16:15:40.667`) +- [CVE-2025-20153](CVE-2025/CVE-2025-201xx/CVE-2025-20153.json) (`2025-02-19T16:15:40.860`) +- [CVE-2025-20158](CVE-2025/CVE-2025-201xx/CVE-2025-20158.json) (`2025-02-19T16:15:41.017`) +- [CVE-2025-20211](CVE-2025/CVE-2025-202xx/CVE-2025-20211.json) (`2025-02-19T16:15:41.163`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `48` -- [CVE-2024-13603](CVE-2024/CVE-2024-136xx/CVE-2024-13603.json) (`2025-02-19T14:15:29.070`) +- [CVE-2024-55460](CVE-2024/CVE-2024-554xx/CVE-2024-55460.json) (`2025-02-19T15:15:14.810`) +- [CVE-2024-56882](CVE-2024/CVE-2024-568xx/CVE-2024-56882.json) (`2025-02-19T15:15:14.970`) +- [CVE-2024-56883](CVE-2024/CVE-2024-568xx/CVE-2024-56883.json) (`2025-02-19T15:15:15.140`) +- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-19T16:15:40.317`) +- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-19T15:15:15.297`) +- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-19T15:15:15.460`) +- [CVE-2024-6458](CVE-2024/CVE-2024-64xx/CVE-2024-6458.json) (`2025-02-19T15:38:25.183`) +- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-19T15:33:43.727`) +- [CVE-2025-0995](CVE-2025/CVE-2025-09xx/CVE-2025-0995.json) (`2025-02-19T15:15:16.073`) +- [CVE-2025-0996](CVE-2025/CVE-2025-09xx/CVE-2025-0996.json) (`2025-02-19T15:15:16.243`) +- [CVE-2025-0997](CVE-2025/CVE-2025-09xx/CVE-2025-0997.json) (`2025-02-19T15:15:16.407`) +- [CVE-2025-0998](CVE-2025/CVE-2025-09xx/CVE-2025-0998.json) (`2025-02-19T15:15:16.563`) +- [CVE-2025-21387](CVE-2025/CVE-2025-213xx/CVE-2025-21387.json) (`2025-02-19T16:55:39.487`) +- [CVE-2025-22921](CVE-2025/CVE-2025-229xx/CVE-2025-22921.json) (`2025-02-19T15:15:17.497`) +- [CVE-2025-24373](CVE-2025/CVE-2025-243xx/CVE-2025-24373.json) (`2025-02-19T15:45:13.197`) +- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-02-19T16:41:43.887`) +- [CVE-2025-25467](CVE-2025/CVE-2025-254xx/CVE-2025-25467.json) (`2025-02-19T15:15:17.760`) +- [CVE-2025-25468](CVE-2025/CVE-2025-254xx/CVE-2025-25468.json) (`2025-02-19T15:15:17.930`) +- [CVE-2025-25891](CVE-2025/CVE-2025-258xx/CVE-2025-25891.json) (`2025-02-19T16:15:41.447`) +- [CVE-2025-25892](CVE-2025/CVE-2025-258xx/CVE-2025-25892.json) (`2025-02-19T16:15:41.600`) +- [CVE-2025-25893](CVE-2025/CVE-2025-258xx/CVE-2025-25893.json) (`2025-02-19T16:15:41.763`) +- [CVE-2025-25894](CVE-2025/CVE-2025-258xx/CVE-2025-25894.json) (`2025-02-19T16:15:41.930`) +- [CVE-2025-25895](CVE-2025/CVE-2025-258xx/CVE-2025-25895.json) (`2025-02-19T16:15:42.087`) +- [CVE-2025-25896](CVE-2025/CVE-2025-258xx/CVE-2025-25896.json) (`2025-02-19T16:15:42.240`) +- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-19T15:15:18.090`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bae039864bb..055a5ea48b3 100644 --- a/_state.csv +++ b/_state.csv @@ -150864,7 +150864,7 @@ CVE-2020-15941,0,0,316133f07e747270dbe1bcf74640bb1e4539ff86ac91d78b40140d27c7b88 CVE-2020-15942,0,0,fd765f4f6fdee3e38c767d5360336c56de7456500d385eae2ccd3c1f13ae94c3,2024-11-21T05:06:30.160000 CVE-2020-15943,0,0,1077569aef5b422e28951f70ce74868b45a9b7f0ea189b085043157664a0fb46,2024-11-21T05:06:30.297000 CVE-2020-15944,0,0,2647fc36902ab1d128b50a1a03b7d60db7477215b94312f662ff09c97b5258f9,2024-11-21T05:06:30.453000 -CVE-2020-15945,0,0,d7e915d51c60a38bf74b932b9403e757ab75d685f1e708be3fe6551d2279dd0d,2024-11-21T05:06:30.630000 +CVE-2020-15945,0,1,9d1c09ec914509fd135b69851ee64d76449773a5eb30f5d04818ec78edab02c6,2025-02-19T15:15:10.830000 CVE-2020-15947,0,0,667bfce3a94767a1f1c5f2893b06292fd6889aa7598b29c44f9b9dd44d585646,2024-11-21T05:06:30.793000 CVE-2020-15948,0,0,088cf0a2a1c253d994d11a8870cfe02bf02a87f7657536530c5f1507fe162862,2024-11-21T05:06:30.940000 CVE-2020-15949,0,0,6cc978f2b3a136a9065ff44d0c6a13de25c4322e7f0330b746dfc9083f7afdf1,2024-11-21T05:06:31.090000 @@ -163932,7 +163932,7 @@ CVE-2020-8882,0,0,760301fbf1983b445a350f2ee2de69c3f7f4391ec2dd2ff389c5086ed1ba4b CVE-2020-8883,0,0,140fa782b1c2263a234690cdd5e1939d58c1bd17c1d9c69127aaea545b73f3e7,2024-11-21T05:39:37.873000 CVE-2020-8884,0,0,62c3d0d5605748bf18cc10a39f4965c42d1cd3232e3e2766291378613f8bacfa,2024-11-21T05:39:37.993000 CVE-2020-8887,0,0,3f8976eaa1b0ccbadce9faa5eb643903c040ba1911bed14f12f698edfad33e15,2024-11-21T05:39:38.127000 -CVE-2020-8889,0,0,2ee94604281535263fcb1d117a9f4dc088ccc728deca4bdc3d771109d80e80c4,2024-11-21T05:39:38.247000 +CVE-2020-8889,0,1,72d0e240bbd0af9b84b64f987c3a97cbcde0ebfab791b0b1cd1eb5746a8b0b02,2025-02-19T16:15:34.377000 CVE-2020-8890,0,0,a46877426bca4d412baefde37339ae29e5fa6fa91fc5e75288d89f5da2f02f5b,2024-11-21T05:39:38.383000 CVE-2020-8891,0,0,492549d24e4839b58b1379241fb724c6b6815a7e72e8622ba9276406641efb6a,2024-11-21T05:39:38.517000 CVE-2020-8892,0,0,b8a98504cda6b21e33316183827bd43f8aca5a4d422b276a5901ee1dd547e061,2024-11-21T05:39:38.640000 @@ -207598,7 +207598,7 @@ CVE-2022-41540,0,0,0835f451e4365b2ba89b1d7b967d89d4dd5dc079f33fca09331bff3bc262e CVE-2022-41541,0,0,00e52175bebb5443f9ce3da1abf7765314cf802ecb11e4a93b1fe3d7e8087047,2024-11-21T07:23:21.950000 CVE-2022-41542,0,0,8fc7301d48c78688e1f0813f0699c56fa4214aeaacc0eee0cbdaeba78bf09c2b,2024-11-21T07:23:22.110000 CVE-2022-41544,0,0,1fe2c736ec60ca94bc01e4d892da5a8b005e452379dc8b2a17138c769a86955a,2024-11-21T07:23:22.273000 -CVE-2022-41545,0,0,13129666988195e0c1b41db8bb41b2f22e29a6a85c7df4577bb12055b07adb41,2025-02-18T18:15:13.450000 +CVE-2022-41545,0,1,8a1193452b325e538f725383b3b190b68c18fcf1d0ec9aec7dad4896946d65a1,2025-02-19T15:15:11.890000 CVE-2022-41547,0,0,1d064e47065a065d677a23b5cabaadf74eb0a67a027ac98d2d0675b1107c294f,2024-11-21T07:23:22.430000 CVE-2022-4155,0,0,2d65b604119b329133f9f2c1484c9bf55ce99c29c3775bcdd528e10d29f39beb,2024-11-21T07:34:41.050000 CVE-2022-41550,0,0,3a6240656d5395b782af363482d974d3bf61a1eb38881afd5e24851fdc41727b,2024-11-21T07:23:22.563000 @@ -208396,7 +208396,7 @@ CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1 CVE-2022-42444,0,0,b6a005bbc9248f0ccd336983da93f006a5d7ff4ae1a55f8166d0ea2956c4cdd4,2024-11-21T07:24:58.767000 CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000 CVE-2022-42446,0,0,42971664056387c462ee497f548a6df2aa4c23ac4c265a4511e389c929317b52,2024-11-21T07:24:59.017000 -CVE-2022-42447,0,0,f7ef42af5c8cacb5fc0ea44780f55cb655e5af2c0cb4eb0afa493b27973c84d4,2024-11-21T07:24:59.133000 +CVE-2022-42447,0,1,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33983,2025-02-19T16:15:35.533000 CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000 CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc438191a,2024-11-21T07:24:59.253000 CVE-2022-42452,0,0,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 @@ -211079,6 +211079,7 @@ CVE-2022-46279,0,0,c0524a481a84e69897a8224d4241ee3b2fb6035a71327b697a073dc31891e CVE-2022-4628,0,0,af23e6e9e565780759bdf59d3b766a635ad57b4fb21c2728e54741b055019c83,2024-11-21T07:35:37.590000 CVE-2022-46280,0,0,abeb67f7e3dd286f90e79c3e35df9e3bf3b9629711af7006bc94b23dc65a2e27,2024-11-21T07:30:18.347000 CVE-2022-46282,0,0,9c36d4ca9968a01130382cc6e2a7ddac6b9b823837d34fe0c53147dc3f4f259b,2024-11-21T07:30:18.477000 +CVE-2022-46283,1,1,fc9cd7fd472108d96bf30f96ddc0a3f6a1df6cbb0d2ebd6ce0baef4506134ca2,2025-02-19T15:15:12.163000 CVE-2022-46285,0,0,aa9498ffc3f606f2ebf9c85686190d94cc96fd79334ec854f8b7fb58c6f566c8,2024-11-21T07:30:18.587000 CVE-2022-46286,0,0,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000 CVE-2022-46287,0,0,797a4cd550a55f760e45973c53ef155fb1f9ed748b322d3cdec94808ffcf1039,2024-11-21T07:30:18.830000 @@ -213450,7 +213451,7 @@ CVE-2023-0268,0,0,f64be44cc2f1cc4aab5e750e0089c06b552b7b898fea44c492c7e2224b1d92 CVE-2023-0269,0,0,a1444d79e87c3f19fbb848742fc9b600d4a4d1c593b1876129c5e0fadfa12980,2023-11-07T04:00:01.967000 CVE-2023-0270,0,0,44aab63ef7829127e706952e5b29c0e3a500353ef14558bd4aed6ac87298a3df,2024-11-21T07:36:52.103000 CVE-2023-0271,0,0,280857f7e76f082e2308a9504393a6f865c612ddaf8e3f42d53348f7b2e17b48,2024-11-21T07:36:52.207000 -CVE-2023-0272,0,0,c3fed8d82e83da48a3e216f3b32134e1e4bb1d193d67e653dab8cef4627b3048,2024-11-21T07:36:52.310000 +CVE-2023-0272,0,1,8cd4e52f99cf8a13645e6c557ee4ad623eb5eb6ffc07148d46993dcb8c7e4d8e,2025-02-19T16:15:35.833000 CVE-2023-0273,0,0,553ef5fecb4d12fa8908e7c59734b6003c708dafeededc42fea002576f9be692,2024-11-21T07:36:52.420000 CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923b1,2024-11-21T07:36:52.540000 CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000 @@ -213570,7 +213571,7 @@ CVE-2023-0389,0,0,d3a6859917d00580d863b1cc40656754ef4aae3a0ed0d7ace8ca00904f8449 CVE-2023-0391,0,0,1501c977f283445a69e6f9019d5860be42bcb8f727bac9d69151b20436d7b38a,2024-11-21T07:37:06.020000 CVE-2023-0392,0,0,8a7a998dac312487f8c5dc9b83d0872c5c624db0d1b91b751bbaa7822fdc6d5c,2024-11-21T07:37:06.157000 CVE-2023-0394,0,0,8e170d43769bdc6718a413799d76d2e93b3416a224594f7b7909d6519f5a0fd9,2024-11-21T07:37:06.357000 -CVE-2023-0395,0,0,f125c9f31604af451f899bd7193354b52939b6afd7fc3ace2403e10701ae3aac,2024-11-21T07:37:06.467000 +CVE-2023-0395,0,1,e433e7fd12f29bb1b0de0990175e4e13bce1ca11a518d400756db9b100437213,2025-02-19T15:15:12.247000 CVE-2023-0396,0,0,1be377631e714aa8ef92ed0548b0b781bbd48621034c742f01ad91bc2f7fcec5,2024-11-21T07:37:06.553000 CVE-2023-0397,0,0,197e26da31aa22aa78ea48679e09ec7e4621676cd3604c156afc4fc6e8a9016b,2024-11-21T07:37:06.663000 CVE-2023-0398,0,0,1bdb79d7f8a1c75d76e45aa839cc0b3441f9c1e80e145655a7239327b2d21196,2024-11-21T07:37:06.783000 @@ -214230,7 +214231,7 @@ CVE-2023-1082,0,0,8a2e328849f17fd1cbd56866852cd4f83b58a7e1ff9cccc709c4c01e721a13 CVE-2023-1083,0,0,6cdb352010bf358cca6b6fd80a82d46cce6e7e3b2e6e7ffbbcb5ff7d5d576245,2024-11-21T07:38:25.657000 CVE-2023-1084,0,0,48b58b60e206fa97248d6540f42cceb638a3e9e11db42dcef4234c21004718fa,2024-11-21T07:38:25.783000 CVE-2023-1086,0,0,88f958cd195c9bf703efdb1102b9fdb3d47333293a12d131cae45eb1e45d8b66,2024-11-21T07:38:25.900000 -CVE-2023-1087,0,0,1bf076f603a138cbaeddd3d92ecaafe8fa8f46aed4a304e459e14ba09447cb5d,2024-11-21T07:38:26.007000 +CVE-2023-1087,0,1,17b8809374a7f3a30453e807acad3567e7cce9051b365c7114024afd5cfd7719,2025-02-19T16:15:35.997000 CVE-2023-1088,0,0,5b368a55ce07ac1d06b780775d8740c95a03e48b4833c0cf4d35c043789a6b25,2024-11-21T07:38:26.110000 CVE-2023-1089,0,0,aece4f9db6b729d86971ca0a83e6e576e4e8b8198bf1a236076f4e122b97db91,2024-11-21T07:38:26.220000 CVE-2023-1090,0,0,25ccd715dcee0b5e820863482b71b2db6e4170920235173f327ff4b5f16e78ed,2025-01-30T15:15:12.147000 @@ -218747,7 +218748,7 @@ CVE-2023-24294,0,0,3e42f9b86751e812a6b22510e56d8d1be93e046cdaadd881a9a597ba3368c CVE-2023-24295,0,0,ef678c92680f783e4697256b62662f890905cb8a683c3e297ed97c828d80ca05,2024-11-21T07:47:39.600000 CVE-2023-2430,0,0,d2de35d69d271af428fae047914fe84dc583fa132e638105a42bb1fe4a236b56,2024-11-21T07:58:36.330000 CVE-2023-24304,0,0,cb73a3f62e0e814b15ae752098a3c12af36abb8672c526acd7ddd13d1756a276,2025-02-18T21:15:14.497000 -CVE-2023-24308,0,0,132607664ad1d23be8c98374207e3ef0b59fdbe4f8068ceedbf32fa29d0e1e8c,2024-11-27T20:11:45.410000 +CVE-2023-24308,0,1,261a6fc910071de82649c37f9ea8f42bc494f40254f4dd6b2a8f2efe7e72897e,2025-02-19T16:15:36.167000 CVE-2023-2431,0,0,939019fa791b41f7ce813012de1be4013166d78534d82797ca097ddd1a2cf895,2024-12-12T16:15:07.937000 CVE-2023-24317,0,0,e29969d3a23798cc443209fa7bb8c1eb64c8e7198066188a12f9c9059c1580ca,2024-11-21T07:47:40.047000 CVE-2023-24320,0,0,88d18ffd50e18e72b2968c835f76418a06ef2d31bebcf67d9fd951974ecca640,2024-11-21T07:47:40.207000 @@ -219562,7 +219563,7 @@ CVE-2023-25240,0,0,8f54673119014de0cf874ed053cc6287359d4b3be00312c798c43582a5652 CVE-2023-25241,0,0,67b4d369c111bf4f1d66e72210ff14d8c3ad87005bca819dcaa6cf536b263cec,2024-11-21T07:49:21.470000 CVE-2023-2526,0,0,83a6e1bd2b311cdea94a91c8eb16d11460c455967c5836d864793aaa675bd321,2024-11-21T07:58:46.693000 CVE-2023-25260,0,0,4a614a2e591eec4584ea26d7cd95b48750f2c422b719c4697d00c026f2dd3aa3,2024-11-21T07:49:21.600000 -CVE-2023-25261,0,0,954be861272aab0103f5b783d5c8ebc888a0ae4de8806b95a78165f75e74581b,2024-11-21T07:49:21.750000 +CVE-2023-25261,0,1,d0c01fdead219b1a29a1bb92f7c51c59d5ddf06755d9d3a4ec4d5696dc672c95,2025-02-19T16:15:36.610000 CVE-2023-25262,0,0,e01c46f1dfe46c641eb2792f44c94a854ea88a5edad1adfdb91ee0f8a079b78a,2024-11-21T07:49:21.887000 CVE-2023-25263,0,0,4aad64f11ab2e0d4864dacc1cf8195140394e8e4cde0cfdba908ca1250f80377,2024-11-21T07:49:22.017000 CVE-2023-25264,0,0,2610d9b0200f89f1533e61a73d97d3ca4968e7fb5865b80d7dc66d773cd6e133,2024-11-21T07:49:22.163000 @@ -220245,7 +220246,7 @@ CVE-2023-26068,0,0,96b0474e6b0530af2a94f966df9aa91c8175a9c796b94a701b1ff11ca4de4 CVE-2023-26069,0,0,631c8f88f1a4dd1fd2f501bf884ec606e9d6258b115a0f0eb7ca849e33f9224f,2025-02-11T17:15:18.767000 CVE-2023-2607,0,0,8a51963de6118faad9fde06680ce4f3059019d6fa4eea1a90d537fe832bc1689,2024-11-21T07:58:55.320000 CVE-2023-26070,0,0,c6d3e24b76db782ea5dfbf14a6fa5b089603bcdb26537770fcc7280455853434,2025-02-11T17:15:18.973000 -CVE-2023-26071,0,0,5154a987dd0852eb70cf9493d6fab4e7e866585d7703915d8a3a71c7ed4dba9c,2024-11-21T07:50:43.147000 +CVE-2023-26071,0,1,493e7f7c88ca2c6b9a22a9c6fc7a7b93caf675e845d4a80066f817e0fd795ba1,2025-02-19T16:15:37.047000 CVE-2023-26072,0,0,9d71983155b48b93297e485003e5f4e2c8c9af23e3b1c25eaac392689190da58,2024-11-21T07:50:43.300000 CVE-2023-26073,0,0,09741fb39b8701f0e3ef5d6844c8639a00c99dafca00486c4a66b5d1ea134140,2024-11-21T07:50:43.503000 CVE-2023-26074,0,0,092c9a1c1dbd0756517e1ac3fb0f8ee7d519a46f4fb62e08023ac22b64cc30d2,2024-11-21T07:50:43.673000 @@ -220671,7 +220672,7 @@ CVE-2023-26545,0,0,1d9c5b408545561ebf2e57b9522fb341349c8f213c493e1f45b0d2bef5a27 CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000 CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000 CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000 -CVE-2023-26549,0,0,5fb573b8f7d9c3c2254d4f606c48e3d110e862f458319abda4e4af6f4fe35c19,2024-11-21T07:51:43.687000 +CVE-2023-26549,0,1,44aa03ba6acd1f861df698ee700bcec65c6a7d8a8c2873b9daabadf39c03e646,2025-02-19T16:15:37.410000 CVE-2023-2655,0,0,cce4b162ab8d62fcc91a619d3bce954e1e0e2f88f574cdb225963bbbae6a32d5,2024-11-21T07:59:00.920000 CVE-2023-26550,0,0,eac8becbb971c7f2b1dba085f0bda79896b409e69e5ebb04c35f29e9667e385e,2024-11-21T07:51:43.797000 CVE-2023-26551,0,0,19285d4c365de723708be6cbc1e7f79d2014f0d371b05a3a995b101fcc929401,2025-02-11T16:15:35.570000 @@ -222312,7 +222313,7 @@ CVE-2023-28587,0,0,e5b6282e738e5d19ccb5f55a598e3c32e8faa54e21b42e464fc376fb81298 CVE-2023-28588,0,0,5805be962185e961ac970f064c2c708f7d361e7cfde8aa227b01b86afed3718e,2024-11-21T07:55:37.720000 CVE-2023-2859,0,0,00dcfdda188e2fef6d8273102c208354e6b1df95224d2a8e536f36196496917d,2024-11-21T07:59:26.250000 CVE-2023-28596,0,0,1466d5430089bee402d6ce0293208bfefeacc0572580c63c6c7da590d42ce100,2024-11-21T07:55:38.100000 -CVE-2023-28597,0,0,069fb17c752de126d5768052f77efb83cccba636aba8c2f9e0a6fd383e4bb4b7,2024-11-21T07:55:38.240000 +CVE-2023-28597,0,1,de40c72959168abf1573f66d2dc803c0618bea2a43e062bae8b40b669eb60cbc,2025-02-19T16:15:37.990000 CVE-2023-28598,0,0,8e5dd64cfbb10f7411c3be92c9a671dc5bbc40963b8b2d07a11e581d7a0644d2,2024-11-21T07:55:38.410000 CVE-2023-28599,0,0,93e0bf9600a6811f98f3ebf7b273e893a2192fcf1fd74e06248ea26acc55169d,2024-11-21T07:55:38.560000 CVE-2023-2860,0,0,047b636c3b3088a6bdd08b049a712e9bb76b6fb5df3afc13e3562bc4dcd64879,2024-11-21T07:59:26.373000 @@ -229472,7 +229473,7 @@ CVE-2023-37973,0,0,dc912eda2fa7366e03657492689f686d9ca429a02a5b7f1f6e6619e67122d CVE-2023-37974,0,0,57e7a11b20852d70f01b3808c014a4129b8d969b91a3875101eda4edf725fdaf,2024-11-21T08:12:37.133000 CVE-2023-37975,0,0,efd6428ef764b3d9bb132f1da01a46a007f74c2f4b4e76cc10dedab0b070391e,2024-11-21T08:12:37.327000 CVE-2023-37976,0,0,d0a8577596e3c197e9d3e33d56f0bd0742c143079455bbc5745cd04e9379dd58,2024-11-21T08:12:37.477000 -CVE-2023-37977,0,0,5f52abff1f91d70966162dcf1d6293dcc281da286b0d3f1ca075e673cafd95e9,2024-11-21T08:12:37.607000 +CVE-2023-37977,0,1,1b22373b9b5ab39cda2837a46fe2b6bea1938ef5401fc036c31913cadfd700f9,2025-02-19T16:29:43 CVE-2023-37978,0,0,9187ef1b3258b9566cf79d9ce7c6f04078b525976a8ed576b2de707a459eec32,2024-11-21T08:12:37.740000 CVE-2023-37979,0,0,de013a5f5d073320981103c8fa4c0b06b202e07c91d1b9fe6c8bd4051b3cb709,2024-11-21T08:12:37.883000 CVE-2023-3798,0,0,2ec794b46ed714799295f8657ac09b24fedc9bdfaada4e9d8f049b295b5ec076,2024-11-21T08:18:05.390000 @@ -245792,9 +245793,9 @@ CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b889004 CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000 CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000 CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000 -CVE-2024-12547,0,0,bb88e9f94d0a82c6a85ab1a16cc6952eeb8cadefdd4485f7d7f5bf85a0f87674,2025-02-11T20:15:33.400000 -CVE-2024-12548,0,0,c2001cbc00a18ab0dc77e964badae1d5fbc504ebecede575ea63805378d9f617,2025-02-11T20:15:33.537000 -CVE-2024-12549,0,0,518df6e3601180c8cb0b3321203c67319e3bc7226b68f1b485d53fa155fb8d5e,2025-02-11T20:15:33.673000 +CVE-2024-12547,0,1,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000 +CVE-2024-12548,0,1,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 +CVE-2024-12549,0,1,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000 CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000 CVE-2024-12550,0,0,ce35987631aeae68370296bb98f0ac6cdc9ccf871b6be5fcf0b50bad33472e95,2025-02-11T20:15:33.800000 CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000 @@ -246694,7 +246695,7 @@ CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf0 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 CVE-2024-13600,0,0,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000 CVE-2024-13601,0,0,ce9d6d51221b1f7bfe13b94be0c882b344de68bb5f35f70de286ecadc3834f44,2025-02-18T21:31:43.250000 -CVE-2024-13603,0,1,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000 +CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000 CVE-2024-13606,0,0,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000 CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000 CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000 @@ -248933,7 +248934,7 @@ CVE-2024-2168,0,0,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000 CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 -CVE-2024-21685,0,0,50571aa3bb92a821e1540150182cfb9d537ce1d1406edcf43f003cba0675c54b,2024-11-21T08:54:51.630000 +CVE-2024-21685,0,1,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000 CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000 CVE-2024-21687,0,0,61dd115c9b058b7191477ed6f478ab4abf9d9c1c2c09f46ba6956bd27091cc8b,2024-11-21T08:54:51.880000 CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000 @@ -254254,8 +254255,11 @@ CVE-2024-28770,0,0,b8811b7fb98e7ac5379aa26a96e0b35f3c550f414784b5c1af5c44bab09d5 CVE-2024-28771,0,0,a0137eeff8a509a8fdb4e37fb64616fdf842469ff599fe3f95344835ee73fac4,2025-01-27T02:15:28.553000 CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 +CVE-2024-28776,1,1,7813f4a598d53c815744e34437e69fa74a5b5070a8a0d6503e4999a527293265,2025-02-19T16:15:38.870000 +CVE-2024-28777,1,1,df83cef3ed556e980229e04768c97cf95b872a367d90979f3c72eb9990d2d4aa,2025-02-19T16:15:39.363000 CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000 +CVE-2024-28780,1,1,97203d55831f98cb3a22a29777c0bdd757fc3fa17fd1841066cf1cd06b59cd90,2025-02-19T16:15:39.510000 CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -259401,7 +259405,7 @@ CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615 CVE-2024-35637,0,0,9cb867c19f8006ef50e305ac0fcabaed89e8159eb2e4ffdf558c884c5c38b50c,2024-11-21T09:20:33.200000 CVE-2024-35638,0,0,e61de469a2786f9aa846ec4370d46e98924aa27b0a12eb528a1d8281826602ca,2024-11-21T09:20:33.323000 CVE-2024-35639,0,0,c1c3140f21137b15d0050023371e3efdce6f35ca6c3876825bc93d445a0b36fc,2024-11-21T09:20:33.450000 -CVE-2024-3564,0,0,c1eb6cee1e1c5ce656c0dbcf14b712479f3168dd2bf2e48c97d19a902204585f,2024-11-21T09:29:53.153000 +CVE-2024-3564,0,1,fd59b89021e15ee9414091cc8b4de96e2264c0a1353eefbaaee97f0b2388d683,2025-02-19T16:09:31.300000 CVE-2024-35640,0,0,0c90864f477ffe1ba66b00c51a04a27e372eff6a6b02cf6a105a750de1d0b8c1,2024-11-21T09:20:33.573000 CVE-2024-35641,0,0,3457fedc6b80777ce0968e010e69f9bd148c14d13719b302b790f3f8bd620832,2024-11-21T09:20:33.703000 CVE-2024-35642,0,0,c576a129dcdb2fd620b58c13cdcd6fc75c73e48dbf4cf648db0b11b0174d6781,2024-11-21T09:20:33.840000 @@ -259410,7 +259414,7 @@ CVE-2024-35645,0,0,1a4fe6dbf283588f6424cc1c82260317da6dd7827170952c599b4f175218c CVE-2024-35646,0,0,5fba6f679908112bc9c3dc4b4d2cca1d68ee5565f7f8be9760b539a5159b4326,2024-11-21T09:20:34.230000 CVE-2024-35647,0,0,dfee17ffd98a0207bb2d9e8bf833b18d652d24f34d008cff892fca06d0528e83,2024-11-21T09:20:34.360000 CVE-2024-35649,0,0,ea73fb4586c69ffec476186be8f6bf4c9bb27270430f8692b34ada168db146c4,2024-11-21T09:20:34.480000 -CVE-2024-3565,0,0,b05e02047eb718b5a5d80706cdab856c3be9f4a043ad8365a16a1f8d2be13c6b,2024-11-21T09:29:53.280000 +CVE-2024-3565,0,1,a5bb7f365858265f7b780928a6fa3986acc757a0256206ef75488604da581c31,2025-02-19T16:08:35.123000 CVE-2024-35650,0,0,e15230b78c33719d35f0fd447377d3fb3a48989ab6f1b6ef89a7a5d21df7b997,2024-11-21T09:20:34.633000 CVE-2024-35651,0,0,e5d05d661fab16634d324d95db351ad4ae02a3dab9c9c81b3f826ef45321c0ab,2024-11-21T09:20:34.773000 CVE-2024-35652,0,0,550577498d4aa6c6e98718bd96d79908cfced34af736df304ac4ede4b362d65e,2024-11-21T09:20:34.910000 @@ -265188,7 +265192,7 @@ CVE-2024-43124,0,0,87e691970b8bcbfe678960a0eae9c1aa60d7340308bd42dce1d4b95039d0d CVE-2024-43125,0,0,3750a57950db46b41ee59afff69bcf68dd54b677c9e77994379d5ba1ca050de1,2024-08-13T12:58:25.437000 CVE-2024-43126,0,0,ecee5d13e2dbf283e94aa3f331dfd8b8853b2c925b8433ca5b13f875405cd45e,2024-08-13T12:58:25.437000 CVE-2024-43127,0,0,2ff32e86cfecbe19f35654c7b2c64ac55864d7c6b6bdbe90d8995363ccef2996,2024-08-13T12:58:25.437000 -CVE-2024-43128,0,0,d1f1998378bddc897801375f3fbc9a08480ff31cee50926fa9471bc2721c6b06,2024-08-13T12:58:25.437000 +CVE-2024-43128,0,1,98689769475f7148e6c6b0612632400335248ecaacd3d1c96f958425450b60f5,2025-02-19T15:41:37.420000 CVE-2024-43129,0,0,eccfd1f47a2b86bde49817b8084396180f74acd6b6a15987af2613212feff4a2,2024-09-12T21:21:39.970000 CVE-2024-4313,0,0,7d942770a1a4dc49c5d51e9696d69566959c4a585714bdbe873813ae04ebf906,2024-11-21T09:42:36.327000 CVE-2024-43130,0,0,1e591c9775a6b821f95179556691b7dbf7fca248e7b7a0986bc948da7925664a,2024-08-13T12:58:25.437000 @@ -266699,7 +266703,9 @@ CVE-2024-45075,0,0,03a325d99e9aaae9ce6cdcda7dc19958a7d4699a1b3c50bb69b2322eb1c7e CVE-2024-45076,0,0,eb3cee64fe130784cdfbc414736fb4f58d6d633f4eb84170ae099934a833c82b,2024-09-06T16:44:52.310000 CVE-2024-45077,0,0,488142147518607f635ce7d743802f40a784f5d21ed9a2383706160f63df7b4d,2025-01-24T16:15:36.903000 CVE-2024-4508,0,0,7ab716d1977417cf41aa4b0c86b8c6174f947212dc2b37b9a7b838a9393e9bd5,2024-11-21T09:42:58.970000 +CVE-2024-45081,1,1,a682d09a464b709ca80fea95802ccf1ab8cffd7dbc54f5d00704f2cf0eca378b,2025-02-19T16:15:39.740000 CVE-2024-45082,0,0,654e2014bb8a40c3daa06199b4082ee25f295dbbc2190046fcaf39d42d46c651,2025-01-10T19:34:56.253000 +CVE-2024-45084,1,1,eb48a47e0c0239a27338c18ec617446dd1a07443bd9c24a70d72cb5d92602873,2025-02-19T16:15:39.900000 CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16d2d,2024-11-08T15:13:11.307000 CVE-2024-45086,0,0,2d2c1612ef6e5a8ce239cd3dcdf490449d1514d9bada7d0d52c5fd5141b8d1fa,2024-11-06T23:04:04.673000 CVE-2024-45087,0,0,5a1fbae564cbb4ee2c9e115b9e60e394ba12f02ef5cac53d3fcf17b309556986,2024-11-18T16:34:23.010000 @@ -270788,8 +270794,8 @@ CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e6 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000 -CVE-2024-50608,0,0,98f50059369502f936fb7c7405f168ceb50ca6968ac413ec2036a6665071c8d4,2025-02-18T18:15:25.667000 -CVE-2024-50609,0,0,312ba9272595c84a72c08ed42ec395b0fe46a5a2bc6d217390327c85aeac2b5c,2025-02-18T18:15:25.833000 +CVE-2024-50608,0,1,51ecf10e9baf01633bbb5e85c324d80569aba0c84ef45dfc95415a77cf18f169,2025-02-19T15:15:13.970000 +CVE-2024-50609,0,1,13a80120c263e02c26f34abc2d26a7abd63cd9ad83e4a9b5fc5a520f4fc3fb3a,2025-02-19T15:15:14.497000 CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000 CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000 @@ -272235,6 +272241,7 @@ CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 +CVE-2024-52902,1,1,cf8f9dd5f5314aabb5776e487e7a04f7f09b37e927323e64ba1b1424836da94f,2025-02-19T15:15:14.660000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 @@ -272718,7 +272725,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,0,5a29d0026803cfefd80daeb2effed8634f8ef892ba81f5bbfbab498237e4d8ea,2025-02-19T02:00:02 +CVE-2024-53704,0,1,36f7356085f3715ddf1df7f0755c3af21319314d2832bee939a15da113208ade,2025-02-19T15:33:49.643000 CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000 CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 @@ -273686,7 +273693,7 @@ CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec168230 CVE-2024-55456,0,0,a3d3f2052af70dd917d8e618e90f97fc45b823a73793a50cabf867252a0b02ec,2025-02-18T19:15:19.267000 CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 -CVE-2024-55460,0,0,3746f2ebcf75c943bb5054e01471ae06a04a5c0757081cbc5b73400e7adfa093,2025-02-18T17:15:19.013000 +CVE-2024-55460,0,1,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000 CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000 @@ -274572,8 +274579,8 @@ CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 -CVE-2024-56882,0,0,d1019706010c2eaf23762843389a39ba14ab42ed70f2288822a5ad2aab8f9553,2025-02-18T18:15:26.830000 -CVE-2024-56883,0,0,6c8a2859c5b5b91112d27f5549314ca9f9fe53d9a52ad7bb051cf3ac9629815e,2025-02-18T18:15:27.287000 +CVE-2024-56882,0,1,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000 +CVE-2024-56883,0,1,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000 CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56898,0,0,707f540df9bad40fd6a0dffff09717bab11cd135fff5e7588c850ba08978f0f0,2025-02-04T16:15:38.523000 @@ -274655,10 +274662,10 @@ CVE-2024-57035,0,0,805b080b0ce95518facb0b27dbb27140164cbeaab705edc82dca68be5d4b3 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 -CVE-2024-57045,0,0,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000 +CVE-2024-57045,0,1,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000 CVE-2024-57046,0,0,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000 -CVE-2024-57049,0,0,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000 -CVE-2024-57050,0,0,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000 +CVE-2024-57049,0,1,72e4153e948b22daf264938fc035d68c4ce564ff6470b7a7d4ef6548a1ce31ea,2025-02-19T15:15:15.297000 +CVE-2024-57050,0,1,bb074b123a74639ce311d395794df55bade21f4ee761fe5d114f6a275d0722e9,2025-02-19T15:15:15.460000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-57055,0,0,19bf70129aa27609c2df10d064bac442213368db8650043292a5cf46558c35e0,2025-02-18T19:15:20.343000 CVE-2024-57056,0,0,b9603890c7ff3b1788bfd8d3a7f0aae9ef3f814f4773a55453d5c35b67b57623,2025-02-18T22:15:14.653000 @@ -275746,7 +275753,7 @@ CVE-2024-6453,0,0,57a9df5f41ae7388668d8ec6040750362fe611e9b50665bc5d80f3861222e5 CVE-2024-6455,0,0,ee8244df84a11847eb1bf1028e566aa28523bbaf30c0278a51b37678378b4bf9,2025-01-16T15:06:56.973000 CVE-2024-6456,0,0,b01715bddc5940978540d9848d20c3e52a2d359587b604967ff013be610ed6e1,2024-08-19T13:00:23.117000 CVE-2024-6457,0,0,9fd7207180c09f39d2da8b48b95fa822cfa4ef21e4a0f2e04ef9fa9c667cf66b,2024-11-21T09:49:41.470000 -CVE-2024-6458,0,0,f80166fb500b5c662512a813b28a88f7629f6910f20d85606ff8fc4f9f842d22,2024-11-21T09:49:41.607000 +CVE-2024-6458,0,1,8a3ebaefc03a7a26d636a3edb16257b0785e2c2c28887ce21cc208c5bdae5646,2025-02-19T15:38:25.183000 CVE-2024-6459,0,0,cb27c4eea4018b8b04b2fde4bc91aba6c1054949f5b07e05557b1533c2ff9cd3,2024-09-06T17:35:18.880000 CVE-2024-6460,0,0,63861aecadef5cdffd3766d8f1f2c1741328b3e12a69d4364f017e469adf9a4c,2024-08-29T21:35:12.753000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 @@ -278811,7 +278818,7 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 -CVE-2025-0108,0,0,9984445b2ca5afb1526508f1260cfbe552aa27c58dc311866cf73b702ffbbe92,2025-02-19T02:00:02 +CVE-2025-0108,0,1,cc96661b8cf1892f00b78cd73695bbf610ab2e0698a13c4342c37b7095c43b6a,2025-02-19T15:33:43.727000 CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000 CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000 CVE-2025-0111,0,0,aa2258940e699552d6ad0522d6bc535ee5e05cc6ed6d0935f57d5a6bf309cd74,2025-02-12T21:15:16.793000 @@ -279285,10 +279292,10 @@ CVE-2025-0981,0,0,c309731b7ff9893538036e27f735501df9811f94653975fc38c99f19642038 CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 -CVE-2025-0995,0,0,cdfc421290eb9c0aaf2d86d330d7548de811167731e07835b47729c6edcf7253,2025-02-18T17:15:19.383000 -CVE-2025-0996,0,0,96e6c91bf4ad6f13de2d7e7d33ae6669310fa693571332f25d6d49457d8ebc3a,2025-02-18T18:15:29.130000 -CVE-2025-0997,0,0,9a6c4b35ba1bd9bfdebd68ad687359b2a111440316e9e605ae9be400472a1e40,2025-02-18T18:15:29.347000 -CVE-2025-0998,0,0,260aa2ee4883a3fee476ba7c1a4fd8609a0274d690b6f034f84af7eb5edade81,2025-02-18T18:15:29.550000 +CVE-2025-0995,0,1,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000 +CVE-2025-0996,0,1,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000 +CVE-2025-0997,0,1,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fee0,2025-02-19T15:15:16.407000 +CVE-2025-0998,0,1,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000 CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f595,2025-02-10T21:15:21.830000 CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000 CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000 @@ -279492,7 +279499,8 @@ CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bb CVE-2025-1441,0,0,dea0748ac4805add0b5a620a8c550d3c2cb9f813ccabe70b3df2355bbf5d5eab,2025-02-19T05:15:12.050000 CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000 -CVE-2025-1464,1,1,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000 +CVE-2025-1464,0,0,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000 +CVE-2025-1465,1,1,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3ee,2025-02-19T16:15:40.667000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -279513,7 +279521,9 @@ CVE-2025-20124,0,0,3b222e4debebf19647313be14570cd157d1c9b474f2f1fb6db3f2d02720f9 CVE-2025-20125,0,0,4c965c93b17f55e1ee6990c432e90b6f767d7217d5ca1f99810949fadd043cf7,2025-02-05T17:15:22.610000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000 +CVE-2025-20153,1,1,8a0c118fecfde278e395d37650e56a488c35c552b597d26c46f7395365ab23a1,2025-02-19T16:15:40.860000 CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 +CVE-2025-20158,1,1,5a0703ebcc6e8c9261c7522dfd1e4f046c7f1bc67251a75a9860d63c2aa09237,2025-02-19T16:15:41.017000 CVE-2025-20165,0,0,9f7b026247b5eae4a58783714ebe8eb2d48f865473657f5e720d75dccad8e306,2025-02-18T20:15:25.050000 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 @@ -279534,6 +279544,7 @@ CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3 CVE-2025-20204,0,0,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000 CVE-2025-20205,0,0,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 +CVE-2025-20211,1,1,ab1049982f8a4ac46b9f050aa2c9e173ce4badc4048d39ecbd7e35ed3dbb8983,2025-02-19T16:15:41.163000 CVE-2025-20615,0,0,7bf2f14d71ca066d1f71371dd6af37fe50ec1afd8739580fa516ac8ff703a51f,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 @@ -279812,7 +279823,7 @@ CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224 CVE-2025-21383,0,0,cef86fb722a492bba5999008e077ba4e0bcdfdca7e1c12402fd24cbb02258e01,2025-02-11T18:15:36.963000 CVE-2025-21385,0,0,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000 CVE-2025-21386,0,0,17d9bcb239f3cd33e8926d95f51da996d32a15ff3f987258e6a581e2809828dd,2025-02-11T18:15:37.157000 -CVE-2025-21387,0,0,e0c0537c2c15c9eeb7f31b7c7db3b844be344ae09d1dd05923da281b0dee4a82,2025-02-11T18:15:37.337000 +CVE-2025-21387,0,1,e4ebea81a4d9f55910301b145e28f9ebdee34c280220b7e180e97f999591acd4,2025-02-19T16:55:39.487000 CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 CVE-2025-21390,0,0,14783ca48d3efbfc9fb20859f570ff47925c810fcc0ff83e83d54b15c4d81bf4,2025-02-11T18:15:37.523000 CVE-2025-21391,0,0,83d419fda69ced06d53cbd61e13158fe3e31c56b8681059f3bb731201858f5f1,2025-02-12T18:14:53.363000 @@ -280448,7 +280459,7 @@ CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84b CVE-2025-22918,0,0,2fd7b69a5783a0816fd30844977f8382a02d00bf28fb9a113c66c1ed7d87d02d,2025-02-18T19:15:26.700000 CVE-2025-22919,0,0,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000 CVE-2025-22920,0,0,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000 -CVE-2025-22921,0,0,debc99abe53255cfa5a22b0ec7ab8f1dfb477f7032a6902bbdfd515f66bcedf6,2025-02-18T22:15:18.040000 +CVE-2025-22921,0,1,8e982b362e449850e2ea02538af900c3ab253faa0ab7197d6c0c9fbcb9c9326b,2025-02-19T15:15:17.497000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 @@ -281133,7 +281144,7 @@ CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b6 CVE-2025-24370,0,0,bfc70a6cc31e8bb3d1e99a32a23a1f93aacee805ef386dd0b2c9d04752b7618b,2025-02-03T21:15:15.547000 CVE-2025-24371,0,0,27fe2f9aa1259e46cd957d482d07885017354097cad992d94597eb6d6d5d9942,2025-02-03T22:15:28.460000 CVE-2025-24372,0,0,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc94e0,2025-02-05T19:15:46.010000 -CVE-2025-24373,0,0,9ac2e97f9f1868bee0945286027bcfea993d6a9d78eb61c55b164577479bbb11,2025-02-04T19:15:33.680000 +CVE-2025-24373,0,1,193fa5b284462d86a15715b065fb2e2fbf0806d4d05b7ae3485d9d3a3bbcad28,2025-02-19T15:45:13.197000 CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000 CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000 CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000 @@ -281605,7 +281616,7 @@ CVE-2025-25297,0,0,0d275b3712a3a3d33cc2cdc3c558a7d071e515bf3e49f1dc29a4a93b576fa CVE-2025-25300,0,0,980ff15b3946d415393db142f5a2944ec9527bc437d9d2bff6f0e4d78a53fe4b,2025-02-18T19:15:28.957000 CVE-2025-25304,0,0,faa0dc15a1534f91421e09ef7387795b56219ff6441c76442b60578f585efb63,2025-02-14T20:15:36.903000 CVE-2025-25305,0,0,fdfd83296c931cee6549a4da42d4223cb7e0f0ca44ee3ebfa8abe753635cd695,2025-02-18T19:15:29.083000 -CVE-2025-25343,0,0,209700127e109f6eaf7535ced2a5a67f22d1ec3dd91c12407f85d8d5702206ac,2025-02-12T19:15:22.003000 +CVE-2025-25343,0,1,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000 CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000 @@ -281616,8 +281627,8 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3 CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,5876192d19265a89356e9ca3f40fe8fc17b662577ecd7d99d37f22efaaf88049,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 -CVE-2025-25467,0,0,61ffc7e889c5c4d70b42d956678cc9ed638e9d5b8d680d26869fea336cad8905,2025-02-18T22:15:18.373000 -CVE-2025-25468,0,0,85057d249a185badd8089bc6bcbf97fd2a496ee7b42fd2afcf4045da21103a1d,2025-02-18T22:15:18.477000 +CVE-2025-25467,0,1,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000 +CVE-2025-25468,0,1,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000 CVE-2025-25469,0,0,e9ca9bae21c00b3260ea3e00b66e7b1daf3a8f35534912c9c9e5bdd584776714,2025-02-18T22:15:18.587000 CVE-2025-25471,0,0,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000 CVE-2025-25472,0,0,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000 @@ -281640,12 +281651,12 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000 CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 -CVE-2025-25891,0,0,277e3b409b3b8988e5337c4bd767ac8e74ecfd90b769b4b9550ef2350267b9cd,2025-02-18T22:15:18.693000 -CVE-2025-25892,0,0,088117497904dbecdd0391c4388abac5d7c20ded456b021384635ad5dba303c1,2025-02-18T22:15:18.803000 -CVE-2025-25893,0,0,7efa21650fabd3fa6503510b20918331b167b4a26657feba8fa6b321eb47dd02,2025-02-18T22:15:18.920000 -CVE-2025-25894,0,0,3b9c376409610de120767f36e10d1919302234cdbfaf8ebc37dc8446994a4894,2025-02-18T22:15:19.040000 -CVE-2025-25895,0,0,623d56181753b7d6f5c525ed10655d0bf99493b283302c21873ffb6f82154fd2,2025-02-18T22:15:19.163000 -CVE-2025-25896,0,0,8685ba7afe952db781a9d0698a05f9a24ee65854afe5c70440ec7738caa3da46,2025-02-18T22:15:19.277000 +CVE-2025-25891,0,1,9ffea80911f1e47c70786967af69881dfb74e93322751a9813ef61512aae0c90,2025-02-19T16:15:41.447000 +CVE-2025-25892,0,1,5da0a3f25cf580ce2a0d5ec98e1c2a6fcbac4e2bca4f1888dc83cf1e3c60adc9,2025-02-19T16:15:41.600000 +CVE-2025-25893,0,1,3668fbd05f91f142c0368e72bcb53f03aa560730fd7cf7b399c07758d1bacf87,2025-02-19T16:15:41.763000 +CVE-2025-25894,0,1,5c2f11c1677c7adef0d47925f7169ad00211ba8749791d98cbfc944a8ea860f6,2025-02-19T16:15:41.930000 +CVE-2025-25895,0,1,dbb2dc7aefefdf851dd6cea1f5518bb8d41557a984af858095e8699201b2832d,2025-02-19T16:15:42.087000 +CVE-2025-25896,0,1,12bed3554490f6b211acee114f0848fe8685a24d4df00f8c39fe3eaa23a2bc50,2025-02-19T16:15:42.240000 CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 @@ -281706,7 +281717,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 -CVE-2025-26465,0,0,3c472d5b9fa5deafc6b883ebf568235c3cb637f5368b3f619a33dbc4e629f1f6,2025-02-19T05:15:12.440000 +CVE-2025-26465,0,1,90ca92ee391124597eed5a54a98891d38a806dd2b4300c52197477b3ccb16272,2025-02-19T15:15:18.090000 CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000