From 8bedbb0982262ba4253585dc17f4803f724a4806 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 7 Mar 2025 19:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-03-07T19:00:20.325723+00:00 --- CVE-2021/CVE-2021-270xx/CVE-2021-27059.json | 4 +- CVE-2021/CVE-2021-364xx/CVE-2021-36400.json | 22 +- CVE-2021/CVE-2021-364xx/CVE-2021-36401.json | 22 +- CVE-2021/CVE-2021-364xx/CVE-2021-36402.json | 22 +- CVE-2021/CVE-2021-364xx/CVE-2021-36403.json | 22 +- CVE-2022/CVE-2022-387xx/CVE-2022-38734.json | 12 +- CVE-2022/CVE-2022-455xx/CVE-2022-45552.json | 12 +- CVE-2022/CVE-2022-455xx/CVE-2022-45553.json | 12 +- CVE-2022/CVE-2022-456xx/CVE-2022-45608.json | 12 +- CVE-2022/CVE-2022-459xx/CVE-2022-45988.json | 32 ++- CVE-2022/CVE-2022-469xx/CVE-2022-46973.json | 32 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47664.json | 32 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47665.json | 32 ++- CVE-2023/CVE-2023-233xx/CVE-2023-23313.json | 32 ++- CVE-2023/CVE-2023-241xx/CVE-2023-24117.json | 32 ++- CVE-2023/CVE-2023-246xx/CVE-2023-24641.json | 32 ++- CVE-2023/CVE-2023-246xx/CVE-2023-24642.json | 32 ++- CVE-2023/CVE-2023-247xx/CVE-2023-24763.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25360.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25361.json | 32 ++- CVE-2023/CVE-2023-254xx/CVE-2023-25403.json | 32 ++- CVE-2023/CVE-2023-358xx/CVE-2023-35894.json | 56 +++++ CVE-2023/CVE-2023-430xx/CVE-2023-43052.json | 86 +++++++ CVE-2024/CVE-2024-129xx/CVE-2024-12975.json | 86 +++++++ CVE-2024/CVE-2024-130xx/CVE-2024-13086.json | 56 +++++ CVE-2024/CVE-2024-257xx/CVE-2024-25739.json | 6 +- CVE-2024/CVE-2024-267xx/CVE-2024-26767.json | 8 +- CVE-2024/CVE-2024-269xx/CVE-2024-26982.json | 138 ++++++++-- CVE-2024/CVE-2024-290xx/CVE-2024-29079.json | 57 ++++- CVE-2024/CVE-2024-324xx/CVE-2024-32485.json | 57 ++++- CVE-2024/CVE-2024-369xx/CVE-2024-36983.json | 101 +++++++- CVE-2024/CVE-2024-369xx/CVE-2024-36984.json | 87 ++++++- CVE-2024/CVE-2024-369xx/CVE-2024-36985.json | 87 ++++++- CVE-2024/CVE-2024-369xx/CVE-2024-36997.json | 94 ++++++- CVE-2024/CVE-2024-386xx/CVE-2024-38638.json | 78 ++++++ CVE-2024/CVE-2024-387xx/CVE-2024-38705.json | 52 +++- CVE-2024/CVE-2024-409xx/CVE-2024-40973.json | 6 +- CVE-2024/CVE-2024-431xx/CVE-2024-43133.json | 47 +++- CVE-2024/CVE-2024-449xx/CVE-2024-44953.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45292.json | 62 ++++- CVE-2024/CVE-2024-452xx/CVE-2024-45293.json | 72 +++++- CVE-2024/CVE-2024-476xx/CVE-2024-47630.json | 47 +++- CVE-2024/CVE-2024-477xx/CVE-2024-47754.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47873.json | 84 ++++++- CVE-2024/CVE-2024-488xx/CVE-2024-48864.json | 78 ++++++ CVE-2024/CVE-2024-489xx/CVE-2024-48917.json | 79 +++++- CVE-2024/CVE-2024-500xx/CVE-2024-50066.json | 10 +- CVE-2024/CVE-2024-503xx/CVE-2024-50390.json | 82 ++++++ CVE-2024/CVE-2024-503xx/CVE-2024-50394.json | 78 ++++++ CVE-2024/CVE-2024-504xx/CVE-2024-50405.json | 114 +++++++++ CVE-2024/CVE-2024-530xx/CVE-2024-53053.json | 8 +- CVE-2024/CVE-2024-530xx/CVE-2024-53067.json | 8 +- CVE-2024/CVE-2024-531xx/CVE-2024-53166.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53692.json | 114 +++++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53693.json | 118 +++++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53694.json | 78 ++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53695.json | 82 ++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53696.json | 78 ++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53697.json | 78 ++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53698.json | 78 ++++++ CVE-2024/CVE-2024-536xx/CVE-2024-53699.json | 78 ++++++ CVE-2024/CVE-2024-537xx/CVE-2024-53700.json | 82 ++++++ CVE-2024/CVE-2024-566xx/CVE-2024-56621.json | 8 +- CVE-2024/CVE-2024-579xx/CVE-2024-57972.json | 10 +- CVE-2024/CVE-2024-579xx/CVE-2024-57977.json | 8 +- CVE-2024/CVE-2024-580xx/CVE-2024-58002.json | 8 +- CVE-2024/CVE-2024-580xx/CVE-2024-58005.json | 8 +- CVE-2024/CVE-2024-580xx/CVE-2024-58079.json | 10 +- CVE-2024/CVE-2024-63xx/CVE-2024-6316.json | 54 +++- CVE-2024/CVE-2024-63xx/CVE-2024-6317.json | 54 +++- CVE-2025/CVE-2025-01xx/CVE-2025-0162.json | 56 +++++ CVE-2025/CVE-2025-11xx/CVE-2025-1121.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21333.json | 14 +- CVE-2025/CVE-2025-217xx/CVE-2025-21702.json | 6 +- CVE-2025/CVE-2025-217xx/CVE-2025-21712.json | 8 +- CVE-2025/CVE-2025-218xx/CVE-2025-21838.json | 10 +- CVE-2025/CVE-2025-254xx/CVE-2025-25450.json | 43 +++- CVE-2025/CVE-2025-254xx/CVE-2025-25451.json | 43 +++- CVE-2025/CVE-2025-254xx/CVE-2025-25452.json | 43 +++- CVE-2025/CVE-2025-256xx/CVE-2025-25617.json | 43 +++- CVE-2025/CVE-2025-273xx/CVE-2025-27370.json | 12 +- CVE-2025/CVE-2025-273xx/CVE-2025-27371.json | 12 +- CVE-2025/CVE-2025-275xx/CVE-2025-27508.json | 12 +- CVE-2025/CVE-2025-275xx/CVE-2025-27597.json | 8 +- CVE-2025/CVE-2025-276xx/CVE-2025-27603.json | 8 +- CVE-2025/CVE-2025-276xx/CVE-2025-27604.json | 60 +++++ CVE-2025/CVE-2025-276xx/CVE-2025-27607.json | 68 +++++ README.md | 90 ++++--- _state.csv | 263 +++++++++++--------- 89 files changed, 3802 insertions(+), 317 deletions(-) create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35894.json create mode 100644 CVE-2023/CVE-2023-430xx/CVE-2023-43052.json create mode 100644 CVE-2024/CVE-2024-129xx/CVE-2024-12975.json create mode 100644 CVE-2024/CVE-2024-130xx/CVE-2024-13086.json create mode 100644 CVE-2024/CVE-2024-386xx/CVE-2024-38638.json create mode 100644 CVE-2024/CVE-2024-488xx/CVE-2024-48864.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50390.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50394.json create mode 100644 CVE-2024/CVE-2024-504xx/CVE-2024-50405.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53692.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53693.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53694.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53695.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53696.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53697.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53698.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53699.json create mode 100644 CVE-2024/CVE-2024-537xx/CVE-2024-53700.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0162.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27604.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27607.json diff --git a/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json b/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json index 159f9e532cf..098bf824b9f 100644 --- a/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json +++ b/CVE-2021/CVE-2021-270xx/CVE-2021-27059.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27059", "sourceIdentifier": "secure@microsoft.com", "published": "2021-03-11T16:15:17.583", - "lastModified": "2024-11-21T05:57:16.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T17:12:53.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36400.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36400.json index fb9aae3275c..bca36f18b34 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36400.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36400.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36400", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T22:15:09.547", - "lastModified": "2024-11-21T06:13:41.120", + "lastModified": "2025-03-07T18:15:34.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36401.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36401.json index c928d1e34b7..828c16df54c 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36401.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36401.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36401", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T22:15:09.620", - "lastModified": "2024-11-21T06:13:41.230", + "lastModified": "2025-03-07T18:15:35.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36402.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36402.json index 22358aa35ee..2b2b016655c 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36402.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36402.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36402", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T23:15:10.473", - "lastModified": "2024-11-21T06:13:41.343", + "lastModified": "2025-03-07T18:15:35.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36403.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36403.json index 30782b9b2ba..82ff327afc8 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36403.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36403.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36403", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T23:15:10.540", - "lastModified": "2024-11-21T06:13:41.453", + "lastModified": "2025-03-07T18:15:35.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38734.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38734.json index 8b525d40977..060380fdf05 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38734.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38734.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38734", "sourceIdentifier": "security-alert@netapp.com", "published": "2023-03-02T18:15:09.477", - "lastModified": "2024-11-21T07:17:00.363", + "lastModified": "2025-03-07T18:15:35.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-455xx/CVE-2022-45552.json b/CVE-2022/CVE-2022-455xx/CVE-2022-45552.json index c1760c4e778..92fdc42ae82 100644 --- a/CVE-2022/CVE-2022-455xx/CVE-2022-45552.json +++ b/CVE-2022/CVE-2022-455xx/CVE-2022-45552.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45552", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T13:15:10.803", - "lastModified": "2024-11-21T07:29:26.583", + "lastModified": "2025-03-07T18:15:36.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-455xx/CVE-2022-45553.json b/CVE-2022/CVE-2022-455xx/CVE-2022-45553.json index 7a0fadac63c..008a08c2e3e 100644 --- a/CVE-2022/CVE-2022-455xx/CVE-2022-45553.json +++ b/CVE-2022/CVE-2022-455xx/CVE-2022-45553.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45553", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T13:15:10.867", - "lastModified": "2024-11-21T07:29:26.757", + "lastModified": "2025-03-07T18:15:36.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45608.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45608.json index a2d0bcfe07a..7e15efdbecb 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45608.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45608.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45608", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T16:15:09.580", - "lastModified": "2024-11-21T07:29:28.860", + "lastModified": "2025-03-07T18:15:36.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45988.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45988.json index aa48ae32264..1c8a145698a 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45988.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45988.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45988", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T15:15:10.737", - "lastModified": "2024-11-21T07:30:02.777", + "lastModified": "2025-03-07T17:15:14.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46973.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46973.json index 604eba07195..2258be53ac4 100644 --- a/CVE-2022/CVE-2022-469xx/CVE-2022-46973.json +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46973.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46973", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:09.427", - "lastModified": "2024-11-21T07:31:21.717", + "lastModified": "2025-03-07T17:15:15.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47664.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47664.json index b71b89f194f..ec4e2cdc4d7 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47664.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47664.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47664", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T15:15:10.887", - "lastModified": "2024-11-21T07:32:20.380", + "lastModified": "2025-03-07T17:15:16.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47665.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47665.json index 3fdd752decb..50fd140a5a4 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47665.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47665.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47665", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T15:15:10.960", - "lastModified": "2024-11-21T07:32:20.507", + "lastModified": "2025-03-07T17:15:16.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23313.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23313.json index b57e2c5b8a4..61b87431449 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23313.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23313.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23313", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:09.690", - "lastModified": "2024-11-21T07:45:58.963", + "lastModified": "2025-03-07T17:15:16.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24117.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24117.json index 9b9d3605495..4fa1352d308 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24117.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24117.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24117", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T21:15:10.723", - "lastModified": "2024-11-21T07:47:24.847", + "lastModified": "2025-03-07T17:15:16.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24641.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24641.json index 4a59cdbeab4..b8959751f43 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24641.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24641.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24641", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T19:15:11.117", - "lastModified": "2024-11-21T07:48:15.673", + "lastModified": "2025-03-07T17:15:16.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24642.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24642.json index 5bc20b9eb2b..8227f6ca0af 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24642.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24642.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24642", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T19:15:11.197", - "lastModified": "2024-11-21T07:48:15.823", + "lastModified": "2025-03-07T17:15:17.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24763.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24763.json index e3a5c09e6ee..292baa89735 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24763.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24763.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24763", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T20:15:09.797", - "lastModified": "2024-11-21T07:48:23.160", + "lastModified": "2025-03-07T17:15:17.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25360.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25360.json index ebe285457a1..bbca18542c0 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25360.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25360.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25360", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-02T15:15:10.530", - "lastModified": "2024-11-21T07:49:26.480", + "lastModified": "2025-03-07T17:15:17.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25361.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25361.json index 0ca4ef548b6..a29d7cc0825 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25361.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25361.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25361", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-02T16:15:14.480", - "lastModified": "2024-11-21T07:49:26.613", + "lastModified": "2025-03-07T17:15:17.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25403.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25403.json index 0046d9c1674..21292a0dd77 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25403.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25403.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25403", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T23:15:12.140", - "lastModified": "2024-11-21T07:49:28.890", + "lastModified": "2025-03-07T17:15:17.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json new file mode 100644 index 00000000000..e9451391560 --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35894.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-35894", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-07T17:15:17.897", + "lastModified": "2025-03-07T17:15:17.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Control Center 6.2.1 through 6.3.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-644" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185101", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json new file mode 100644 index 00000000000..85ceb03c659 --- /dev/null +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2023-43052", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-07T17:15:18.060", + "lastModified": "2025-03-07T17:15:18.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Control Center 6.2.1 through 6.3.1 is vulnerable to an external service interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-435" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-435" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185102", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12975.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12975.json new file mode 100644 index 00000000000..b34a2eff9a2 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12975.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-12975", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-03-07T17:15:18.263", + "lastModified": "2025-03-07T17:15:18.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.0, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/069Vm00000LWXMeIAP", + "source": "product-security@silabs.com" + }, + { + "url": "https://github.com/SiliconLabs/simplicity_sdk/releases", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13086.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13086.json new file mode 100644 index 00000000000..5988f5b6727 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13086.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13086", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:18.430", + "lastModified": "2025-03-07T17:15:18.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An exposure of sensitive information vulnerability has been reported to affect product. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.2.0.2851 build 20240808 and later\nQuTS hero h5.2.0.2851 build 20240808 and later" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-25-03", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json index e7215db65f3..023c1cbdd7a 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25739", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T03:15:32.770", - "lastModified": "2024-11-21T09:01:18.840", + "lastModified": "2025-03-07T18:15:39.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", "source": "cve@mitre.org" }, + { + "url": "https://web.git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/mtd/ubi/vtbl.c?h=v6.6.24&id=d1b505c988b7", + "source": "cve@mitre.org" + }, { "url": "https://www.spinics.net/lists/kernel/msg5074816.html", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26767.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26767.json index 193816ab153..eee6bbfd64b 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26767.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26767", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.747", - "lastModified": "2025-02-27T14:34:43.180", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:40.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -108,6 +108,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/070fda699dfdce560755379bc428d9edada7a54e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/71783d1ff65204d69207fd156d4b2eb1d3882375", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json index 4062af3df44..0a4ef60cf4a 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.610", - "lastModified": "2024-11-21T09:03:32.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-07T18:15:40.423", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -15,31 +15,139 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: Squashfs: comprobar que el n\u00famero de inodo no sea el valor no v\u00e1lido de cero. Syskiller ha producido un acceso fuera de los l\u00edmites en fill_meta_index(). Ese acceso fuera de los l\u00edmites se debe en \u00faltima instancia a que el inodo tiene un n\u00famero de inodo con un valor no v\u00e1lido de cero, que no se verific\u00f3. La raz\u00f3n por la que esto causa el acceso fuera de los l\u00edmites se debe a la siguiente secuencia de eventos: 1. Se llama a Fill_meta_index() para asignar (a trav\u00e9s de vac\u00edo_meta_index()) y completar un \u00edndice de metadatos. Sin embargo, sufre un error de lectura de datos y se cancela, invalidando el \u00edndice de metadatos vac\u00edo reci\u00e9n devuelto. Para ello, establece el n\u00famero de inodo del \u00edndice en cero, lo que significa que no se utiliza (cero no es un n\u00famero de inodo v\u00e1lido). 2. Cuando posteriormente se vuelve a llamar a fill_meta_index() en otra operaci\u00f3n de lectura, localizar_meta_index() devuelve el \u00edndice anterior porque coincide con el n\u00famero de inodo de 0. Debido a que este \u00edndice ha sido devuelto, se espera que se haya completado, y porque no lo ha hecho. Si no lo ha sido, se realiza un acceso fuera de los l\u00edmites. Este parche agrega una verificaci\u00f3n de cordura que verifica que el n\u00famero de inodo no sea cero cuando se crea el inodo y devuelve -EINVAL si lo es. [phillip@squashfs.org.uk: correcci\u00f3n de espacios en blanco] Enlace: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.30", + "matchCriteriaId": "196E040A-AF21-452C-8854-D6205D31F0BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + } + ], "references": [ { - "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e", + "url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json index c489dab43a3..27acae076b6 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29079", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:16.027", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -93,12 +113,43 @@ "value": "CWE-691" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.6.0.3001", + "matchCriteriaId": "26FF4705-B44E-422C-8357-D07294E6C6E7" + } + ] + } + ] } ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json index 8a8e3b35a32..fe5ca23b0a9 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32485", "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:18.520", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -93,12 +113,43 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.6.0.2003", + "matchCriteriaId": "E1BDD171-A498-4D34-B99F-4934FEA5AA97" + } + ] + } + ] } ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json index 4f5d20abbe1..59db098c24f 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36983", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.257", - "lastModified": "2024-11-21T09:22:58.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,93 @@ "value": "CWE-77" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.10", + "matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.5", + "matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.2", + "matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.2308", + "versionEndExcluding": "9.1.2308.207", + "matchCriteriaId": "D220E842-2B15-416F-960B-397166883F9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.2312", + "versionEndExcluding": "9.1.2312.109", + "matchCriteriaId": "F2E66C0D-BD3A-46CE-9578-068401F094C0" + } + ] + } + ] } ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0703", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Tool Signature" + ] }, { "url": "https://advisory.splunk.com/advisories/SVD-2024-0703", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Tool Signature" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json index acbbbbf7693..49b013db686 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36984", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.480", - "lastModified": "2024-11-21T09:22:58.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,79 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.10", + "matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.5", + "matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.2", + "matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3" + } + ] + } + ] } ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0704", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Tool Signature" + ] }, { "url": "https://advisory.splunk.com/advisories/SVD-2024-0704", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Tool Signature" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json index db443f9860e..47d2d80dca7 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36985", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.703", - "lastModified": "2024-11-21T09:22:58.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,79 @@ "value": "CWE-687" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.10", + "matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.5", + "matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.2", + "matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3" + } + ] + } + ] } ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0705", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Tool Signature" + ] }, { "url": "https://advisory.splunk.com/advisories/SVD-2024-0705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Tool Signature" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json index c65fe6cc0e0..2d74f340f03 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36997", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:09.143", - "lastModified": "2024-11-21T09:23:00.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 5.8 } ] }, @@ -49,24 +69,86 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.10", + "matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.5", + "matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.2", + "matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.2312", + "versionEndExcluding": "9.1.2312.100", + "matchCriteriaId": "6F3B2826-B4B5-4A28-9E8E-0159803CC851" + } + ] + } + ] } ], "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0717", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Tool Signature" + ] }, { "url": "https://advisory.splunk.com/advisories/SVD-2024-0717", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Tool Signature" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38638.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38638.json new file mode 100644 index 00000000000..d117abac19d --- /dev/null +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38638.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-38638", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:18.707", + "lastModified": "2025-03-07T17:15:18.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nQTS 5.2.x/QuTS hero h5.2.x are not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQuTS hero h5.1.9.2954 build 20241120 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-52", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38705.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38705.json index fa166fa8f3c..d60f5cf169d 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38705.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38705", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T08:15:11.243", - "lastModified": "2024-11-21T09:26:40.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.5", + "matchCriteriaId": "6558D0EC-322F-4AAF-9A08-53BAD1C93A91" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json index d585776d61a..3c3eaf39b2f 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.890", - "lastModified": "2024-11-21T09:31:58.917", + "lastModified": "2025-03-07T18:15:40.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,6 +91,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/eeb62bb4ca22db17f7dfe8fb8472e0442df3d92f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f066882293b5ad359e44c4ed24ab1811ffb0b354", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43133.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43133.json index 613092583f5..68ff4060789 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43133.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43133", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-12T23:15:17.560", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themify:themify_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.2", + "matchCriteriaId": "7BE7F44D-1CDD-4CFB-A6EE-E4F874AA92DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/themify-shortcodes/wordpress-themify-shortcodes-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44953.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44953.json index 1569a43698f..e152ce96419 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44953.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44953", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.297", - "lastModified": "2024-09-06T16:37:33.650", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:40.950", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -83,6 +83,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/a4921b76bc9421d3838e167f6a17ea3112d8fe62", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f13f1858a28c68b7fc0d72c2008d5c1f80d2e8d5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json index c289981500e..2cbcc43a481 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45292", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:05.857", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.2", + "matchCriteriaId": "9FB20F02-0DCA-4875-B1AF-E6969820AD9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.1", + "matchCriteriaId": "79F5B018-FDB7-40DC-9B67-7312ED70808F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "4B62CAAE-2E1E-42A2-9152-2DB7E3DA36A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-r8w8-74ww-j4wh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json index 93a0ee28fc0..1c972401eb5 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45293", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:06.100", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,58 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.1", + "matchCriteriaId": "520A70B7-2C60-4064-B452-538ED7A8D30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.1", + "matchCriteriaId": "79F5B018-FDB7-40DC-9B67-7312ED70808F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "4B62CAAE-2E1E-42A2-9152-2DB7E3DA36A8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-6hwr-6v2f-3m88", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json index c1bb97e8229..1354665d9bb 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47630", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T14:15:04.183", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.8", + "matchCriteriaId": "64E72A24-D81C-4456-8BC1-031C68B61E27" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json index 93984c5e4f1..943f49609fd 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.377", - "lastModified": "2024-10-22T16:10:21.907", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:41.160", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -112,6 +112,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/d48890ef8765001caff732ac6ec80a3b2e470215", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47873.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47873.json index 69ea6d2fe89..7b78759daf5 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47873.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47873", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-18T17:15:11.973", - "lastModified": "2024-11-19T21:57:56.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,22 +71,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.4", + "matchCriteriaId": "9D7D4C48-5455-494C-962A-B8386CA53A62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.3", + "matchCriteriaId": "18AFC177-DDB6-4C8C-96C7-F299CFA6C96D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.2", + "matchCriteriaId": "A7B91E75-3DDC-4395-B48C-A77147597F21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.4.0", + "matchCriteriaId": "14F9EC71-3B04-4765-8437-4BEFBDEA8673" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.w3.org/TR/xml/#sec-guessing-no-ext-info", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48864.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48864.json new file mode 100644 index 00000000000..0a8ef6b4eee --- /dev/null +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48864.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-48864", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:18.850", + "lastModified": "2025-03-07T17:15:18.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A files or directories accessible to external parties vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers to read/write files or directories.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4741 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-55", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48917.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48917.json index 5b268e01f59..e425b98782a 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48917.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48917", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-18T20:15:05.403", - "lastModified": "2024-11-19T21:57:56.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,18 +71,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.29.4", + "matchCriteriaId": "9D7D4C48-5455-494C-962A-B8386CA53A62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.3", + "matchCriteriaId": "18AFC177-DDB6-4C8C-96C7-F299CFA6C96D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.3.2", + "matchCriteriaId": "A7B91E75-3DDC-4395-B48C-A77147597F21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.4.0", + "matchCriteriaId": "14F9EC71-3B04-4765-8437-4BEFBDEA8673" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-7cc9-j4mv-vcjp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50066.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50066.json index 92da323a70d..bcfdf9871ea 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50066.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50066.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50066", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-23T06:15:10.467", - "lastModified": "2024-11-25T15:15:07.570", + "lastModified": "2025-03-07T17:15:18.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -147,6 +147,14 @@ { "url": "https://project-zero.issues.chromium.org/issues/371047675", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2024-50066-kernel-detection-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2024-50066-kernel-mitigation-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50390.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50390.json new file mode 100644 index 00000000000..302d617bc2d --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50390.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-50390", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:19.180", + "lastModified": "2025-03-07T17:15:19.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + }, + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-25-01", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50394.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50394.json new file mode 100644 index 00000000000..97ab30d8bc2 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50394.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-50394", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:19.327", + "lastModified": "2025-03-07T17:15:19.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper certificate validation vulnerability has been reported to affect Helpdesk. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nHelpdesk 3.3.3 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-25-05", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50405.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50405.json new file mode 100644 index 00000000000..14c4359709b --- /dev/null +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50405.json @@ -0,0 +1,114 @@ +{ + "id": "CVE-2024-50405", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:19.470", + "lastModified": "2025-03-07T18:15:41.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53053.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53053.json index e4d2e68b63c..10584bfff4c 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53053.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53053", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:25.443", - "lastModified": "2024-11-22T17:09:28.773", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:42.883", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/9aa1f0da237d6b16e36e0a0cc9f746d1d78396ed", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/a128cfec44709ab1bd1f01d158569bcb2386f54f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53067.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53067.json index fc1dc9128b0..a3dff16821e 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53067.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53067", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:26.490", - "lastModified": "2024-11-25T21:00:06.237", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:43.577", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -114,6 +114,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/6e34b9d7caa5a4c831b74bdfed5ef86fa0c03316", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53166.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53166.json index dddad3da934..faa9d504733 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53166.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53166.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53166", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:23.703", - "lastModified": "2025-02-10T18:15:26.717", + "lastModified": "2025-03-07T18:15:43.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -129,6 +129,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/ada4ca5fd5a9d5212f28164d49a4885951c979c9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/dcaa738afde55085ac6056252e319479cf23cde2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53692.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53692.json new file mode 100644 index 00000000000..9ef6db596cc --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53692.json @@ -0,0 +1,114 @@ +{ + "id": "CVE-2024-53692", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:19.703", + "lastModified": "2025-03-07T17:15:19.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53693.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53693.json new file mode 100644 index 00000000000..bb2a3fbb2cf --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53693.json @@ -0,0 +1,118 @@ +{ + "id": "CVE-2024-53693", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:19.910", + "lastModified": "2025-03-07T17:15:19.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + }, + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-400" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53694.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53694.json new file mode 100644 index 00000000000..c65fe0294d9 --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53694.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53694", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.103", + "lastModified": "2025-03-07T17:15:20.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources.\n\nWe have already fixed the vulnerability in the following versions:\nQVPN Device Client for Mac 2.2.5 and later\nQsync for Mac 5.1.3 and later\nQfinder Pro Mac 7.11.1 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-51", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53695.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53695.json new file mode 100644 index 00000000000..b955835697d --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53695.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53695", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.250", + "lastModified": "2025-03-07T17:15:20.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nHBS 3 Hybrid Backup Sync 25.1.4.952 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-25-06", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53696.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53696.json new file mode 100644 index 00000000000..b13df42353b --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53696.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53696", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.390", + "lastModified": "2025-03-07T17:15:20.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.7.0.829 ( 2024/10/01 ) and later\nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later\nQTS 4.5.4.2957 build 20241119 and later\nQuTS hero h4.5.4.2956 build 20241119 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-53", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53697.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53697.json new file mode 100644 index 00000000000..d54160de962 --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53697.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53697", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.527", + "lastModified": "2025-03-07T17:15:20.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53698.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53698.json new file mode 100644 index 00000000000..88ef640045d --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53698.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53698", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.667", + "lastModified": "2025-03-07T17:15:20.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A double free vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53699.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53699.json new file mode 100644 index 00000000000..dfd5c218b2a --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53699.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53699", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.813", + "lastModified": "2025-03-07T17:15:20.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-54", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53700.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53700.json new file mode 100644 index 00000000000..f3612a22aea --- /dev/null +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53700.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53700", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2025-03-07T17:15:20.957", + "lastModified": "2025-03-07T17:15:20.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-25-07", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56621.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56621.json index 187ad50684a..937a2e3c336 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56621.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:21.637", - "lastModified": "2025-01-08T16:44:53.720", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:45.237", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -89,6 +89,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/57479e37d3f69efee2f0678568274db773284bc8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57972.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57972.json index 09f3978f736..a015f601db0 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57972.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57972.json @@ -2,13 +2,17 @@ "id": "CVE-2024-57972", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T21:15:14.687", - "lastModified": "2025-03-06T23:15:11.993", + "lastModified": "2025-03-07T18:15:45.673", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The pairing API request handler in Microsoft HoloLens 1 (Windows Holographic) through 10.0.17763.3046 and HoloLens 2 (Windows Holographic) through 10.0.22621.1244 allows remote attackers to cause a Denial of Service (resource consumption and device unusability) by sending many requests through the Device Portal framework." + }, + { + "lang": "es", + "value": "El controlador de solicitudes de API de emparejamiento en Microsoft HoloLens 1 (Windows Holographic) hasta 10.0.17763.3046 y HoloLens 2 (Windows Holographic) hasta 10.0.22621.1244 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos e inutilizaci\u00f3n del dispositivo) mediante el env\u00edo de muchas solicitudes a trav\u00e9s del framework del Portal del dispositivo." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://github.com/tania-silva/Hololens", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/tania-silva/Hololens", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57977.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57977.json index 9447c1cfe3e..899f8d13214 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57977.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:10.890", - "lastModified": "2025-02-27T13:15:11.053", - "vulnStatus": "Received", + "lastModified": "2025-03-07T18:15:45.997", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0a09d56e1682c951046bf15542b3e9553046c9f6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/46576834291869457d4772bb7df72d7c2bb3d57f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json index fbaf33cf087..95bf27fabf1 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58002", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.180", - "lastModified": "2025-03-06T12:42:22.567", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:46.417", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -112,6 +112,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/ac18d781466252cd35a3e311e0a4b264260fd927", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json index 6c24a6bb9c8..480f8485e29 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58005", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:11.480", - "lastModified": "2025-03-06T12:42:22.567", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T18:15:46.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -106,6 +106,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/77779d1258a287f2c5c2c6aeae203e0996209c77", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/a3a860bc0fd6c07332e4911cf9a238d20de90173", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json index 2e97efb8618..0e9bdb20224 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-58079", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T17:15:21.360", - "lastModified": "2025-03-06T17:15:21.360", + "lastModified": "2025-03-07T18:15:47.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix crash during unbind if gpio unit is in use\n\nWe used the wrong device for the device managed functions. We used the\nusb device, when we should be using the interface device.\n\nIf we unbind the driver from the usb interface, the cleanup functions\nare never called. In our case, the IRQ is never disabled.\n\nIf an IRQ is triggered, it will try to access memory sections that are\nalready free, causing an OOPS.\n\nWe cannot use the function devm_request_threaded_irq here. The devm_*\nclean functions may be called after the main structure is released by\nuvc_delete.\n\nLuckily this bug has small impact, as it is only affected by devices\nwith gpio units and the user has to unbind the device, a disconnect will\nnot trigger this error." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Se corrige el fallo durante la desvinculaci\u00f3n si la unidad gpio est\u00e1 en uso. Usamos el dispositivo incorrecto para las funciones administradas por el dispositivo. Usamos el dispositivo usb, cuando deber\u00edamos estar usando el dispositivo de interfaz. Si desvinculamos el controlador de la interfaz usb, las funciones de limpieza nunca se llaman. En nuestro caso, la IRQ nunca se deshabilita. Si se activa una IRQ, intentar\u00e1 acceder a secciones de memoria que ya est\u00e1n libres, lo que provocar\u00e1 un OOPS. No podemos usar la funci\u00f3n devm_request_threaded_irq aqu\u00ed. Las funciones de limpieza devm_* pueden llamarse despu\u00e9s de que uvc_delete libere la estructura principal. Afortunadamente, este error tiene un impacto peque\u00f1o, ya que solo se ve afectado por dispositivos con unidades gpio y el usuario tiene que desvincular el dispositivo, una desconexi\u00f3n no activar\u00e1 este error." } ], "metrics": {}, @@ -17,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/0b5e0445bc8384c18bd35cb9fe87f6258c6271d9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/3c00e94d00ca079bef7906d6f39d1091bccfedd3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/5d2e65cbe53d0141ed095cf31c2dcf3d8668c11d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json index 1848715519c..70fda7c4b2a 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6316", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.270", - "lastModified": "2024-11-21T09:49:25.057", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zealousweb:generate_pdf_using_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.3", + "matchCriteriaId": "68FAD9A6-E232-47A2-BC0E-86D76804B801" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json index b55ef03a420..b814e38426c 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6317", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T08:15:12.470", - "lastModified": "2024-11-21T09:49:25.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-07T16:48:11.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zealousweb:generate_pdf_using_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.3", + "matchCriteriaId": "68FAD9A6-E232-47A2-BC0E-86D76804B801" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0162.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0162.json new file mode 100644 index 00000000000..44b85af3c2c --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0162", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-07T17:15:21.110", + "lastModified": "2025-03-07T17:15:21.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185096", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1121.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1121.json index d3d88f72cca..28e04628faa 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1121.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1121.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1121", "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "published": "2025-03-07T00:15:34.360", - "lastModified": "2025-03-07T02:15:37.977", + "lastModified": "2025-03-07T18:15:47.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -14,7 +14,7 @@ "metrics": {}, "references": [ { - "url": "https://issues.chromium.org/issues/b/336153054", + "url": "https://issuetracker.google.com/issues/336153054", "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" } ] diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json index c2b38321f64..857cb66019b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21333", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:58.530", - "lastModified": "2025-01-15T20:57:37.467", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-07T17:15:21.473", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -133,6 +133,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-detection-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-mitigation-script", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json index e69d168f55f..aa2248271f0 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21702", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-18T15:15:18.530", - "lastModified": "2025-02-18T15:15:18.530", + "lastModified": "2025-03-07T18:15:47.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/020ecb76812a0526f4130ab5aeb6dc7c773e7ab9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/647cef20e649c576dff271e018d5d15d998b629d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21712.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21712.json index 2cacb2b12a8..453b2c2c19e 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21712.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21712.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21712", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T02:15:14.863", - "lastModified": "2025-02-27T13:15:12.043", - "vulnStatus": "Received", + "lastModified": "2025-03-07T18:15:47.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/032fa54f486eac5507976e7e31f079a767bc13a8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/237e19519c8ff6949f0ef57c4a0243f5b2b0fa18", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21838.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21838.json index ac44c42e824..88030a0f224 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21838.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21838.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21838", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-07T09:15:16.810", - "lastModified": "2025-03-07T09:15:16.810", + "lastModified": "2025-03-07T18:15:47.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: core: flush gadget workqueue after device removal\n\ndevice_del() can lead to new work being scheduled in gadget->work\nworkqueue. This is observed, for example, with the dwc3 driver with the\nfollowing call stack:\n device_del()\n gadget_unbind_driver()\n usb_gadget_disconnect_locked()\n dwc3_gadget_pullup()\n\t dwc3_gadget_soft_disconnect()\n\t usb_gadget_set_state()\n\t schedule_work(&gadget->work)\n\nMove flush_work() after device_del() to ensure the workqueue is cleaned\nup." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: core: vaciar la cola de trabajo de gadget despu\u00e9s de la eliminaci\u00f3n del dispositivo device_del() puede provocar que se programe un nuevo trabajo en la cola de trabajo gadget->work. Esto se observa, por ejemplo, con el controlador dwc3 con la siguiente pila de llamadas: device_del() gadget_unbind_driver() usb_gadget_disconnect_locked() dwc3_gadget_pullup() dwc3_gadget_soft_disconnect() usb_gadget_set_state() schedule_work(&gadget->work) Mueva flush_work() despu\u00e9s de device_del() para garantizar que se limpie la cola de trabajo." } ], "metrics": {}, @@ -25,6 +29,10 @@ "url": "https://git.kernel.org/stable/c/97695b5a1b5467a4f91194db12160f56da445dfe", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/f894448f3904d7ad66fecef8f01fe0172629e091", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json index 6a082bc8592..d0bf9f083b8 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25450", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T15:15:17.443", - "lastModified": "2025-03-06T15:15:17.443", + "lastModified": "2025-03-07T17:15:21.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the deactivation of the activated second factor to the /session endpoint" + }, + { + "lang": "es", + "value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante remoto escale privilegios a trav\u00e9s de la desactivaci\u00f3n del segundo factor activado al endpoint /session" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json index 6315517b207..1a8afd53c04 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25451", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T15:15:17.553", - "lastModified": "2025-03-06T15:15:17.553", + "lastModified": "2025-03-07T17:15:21.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a physically proximate attacker to escalate privileges via the \"2fa_authorized\" Local Storage key" + }, + { + "lang": "es", + "value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante f\u00edsicamente pr\u00f3ximo escale privilegios a trav\u00e9s de la clave de almacenamiento local \"2fa_authorized\"" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json index e30d1b07cba..0ec7f2cffb2 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25452", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T15:15:17.667", - "lastModified": "2025-03-06T15:15:17.667", + "lastModified": "2025-03-07T17:15:21.947", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the \"/user\" endpoint" + }, + { + "lang": "es", + "value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante remoto escale privilegios a trav\u00e9s del endpoint \"/user\"" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json index f0d980525a7..7782c113974 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25617.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25617", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-07T16:15:38.543", - "lastModified": "2025-03-07T16:15:38.543", + "lastModified": "2025-03-07T18:15:47.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Incorrect Access Control in Unifiedtransform 2.X leads to Privilege Escalation allowing teachers to create syllabus." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/armaansidana2003/CVE-2025-25617", @@ -20,6 +55,10 @@ { "url": "https://github.com/changeweb/Unifiedtransform", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/armaansidana2003/CVE-2025-25617", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json index 72d25c5dfb5..00c4b318777 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27370", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:40.650", - "lastModified": "2025-03-03T19:15:35.717", - "vulnStatus": "Received", + "lastModified": "2025-03-07T17:15:22.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client." + }, + { + "lang": "es", + "value": "OpenID Connect Core a trav\u00e9s del conjunto de erratas 1.0 2 permite la inyecci\u00f3n de audiencia en determinadas situaciones. Cuando se utiliza el mecanismo de autenticaci\u00f3n private_key_jwt, un servidor de autorizaci\u00f3n malintencionado podr\u00eda enga\u00f1ar a un cliente para que escriba valores controlados por el atacante en la audiencia, incluidos endpoints de token o identificadores de emisor de otros servidores de autorizaci\u00f3n. El servidor de autorizaci\u00f3n malintencionado podr\u00eda entonces utilizar estos JWT de clave privada para hacerse pasar por el cliente." } ], "metrics": { @@ -48,6 +52,10 @@ } ], "references": [ + { + "url": "https://github.com/OWASP/ASVS/issues/2678", + "source": "cve@mitre.org" + }, { "url": "https://openid.net/notice-of-a-security-vulnerability/", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json index b51ca8b13f7..8e22a0002bd 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27371", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:40.850", - "lastModified": "2025-03-03T19:15:35.843", - "vulnStatus": "Received", + "lastModified": "2025-03-07T17:15:22.190", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR)." + }, + { + "lang": "es", + "value": "En ciertas especificaciones relacionadas con OAuth 2.0 de IETF, cuando se utiliza el mecanismo de autenticaci\u00f3n de cliente JSON Web Token Profile for OAuth 2.0, existen ambig\u00fcedades en los valores de audiencia de los JWT enviados a los servidores de autorizaci\u00f3n. Las RFC afectadas pueden incluir RFC 7523, y tambi\u00e9n RFC 7521, RFC 7522, RFC 9101 (JAR) y RFC 9126 (PAR)." } ], "metrics": { @@ -48,6 +52,10 @@ } ], "references": [ + { + "url": "https://github.com/OWASP/ASVS/issues/2678", + "source": "cve@mitre.org" + }, { "url": "https://openid.net/notice-of-a-security-vulnerability/", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27508.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27508.json index db3058a2124..65c335277e2 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27508.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27508.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27508", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-05T22:15:35.867", - "lastModified": "2025-03-05T22:15:35.867", + "lastModified": "2025-03-07T18:15:48.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0." + }, + { + "lang": "es", + "value": "Emissary es un motor de flujo de trabajo basado en datos P2P. La clase ChecksumCalculator permite la generaci\u00f3n de sumas de comprobaci\u00f3n y hash, pero incluye o utiliza de forma predeterminada algoritmos que ya no se recomiendan para casos de uso criptogr\u00e1fico seguro (por ejemplo, SHA-1, CRC32 y SSDEEP). Estos algoritmos, si bien pueden ser v\u00e1lidos para ciertas tareas no cr\u00edticas para la seguridad, pueden exponer a los usuarios a riesgos de seguridad si se utilizan en escenarios en los que se requieren garant\u00edas criptogr\u00e1ficas s\u00f3lidas. Este problema se solucion\u00f3 en 8.24.0." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json index 346ecc3f711..f749422b24e 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27597.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27597", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-07T16:15:39.893", - "lastModified": "2025-03-07T16:15:39.893", + "lastModified": "2025-03-07T18:15:48.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json index 5313bdea9f8..c0b6d5777de 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27603.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27603", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-07T16:15:40.037", - "lastModified": "2025-03-07T16:15:40.037", + "lastModified": "2025-03-07T18:15:48.293", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27604.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27604.json new file mode 100644 index 00000000000..c761eeab10a --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27604.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27604", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T17:15:22.290", + "lastModified": "2025-03-07T17:15:22.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. The homepage of the application is public which enables a guest to download the package which might contain sensitive information. This vulnerability is fixed in 1.11.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwikisas/application-confluence-migrator-pro/commit/6ced42b1f341fd0ce6734fc58c7d694da5f365fb", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-3w9f-2pph-j5vc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27607.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27607.json new file mode 100644 index 00000000000..4c87b0be9f0 --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27607.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-27607", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-07T17:15:22.433", + "lastModified": "2025-03-07T18:15:48.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nhairs/python-json-logger/commit/2548e3a2e3cedf6bef3ee7c60c55b7c02d1af11a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhairs/python-json-logger/commit/e7761e56edb980cfab0165e32469d5fd017a5d72", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ed435d3d986..d7502c019b3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-07T17:00:20.214746+00:00 +2025-03-07T19:00:20.325723+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-07T16:15:40.287000+00:00 +2025-03-07T18:15:48.483000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284484 +284505 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `21` -- [CVE-2025-2088](CVE-2025/CVE-2025-20xx/CVE-2025-2088.json) (`2025-03-07T15:15:14.833`) -- [CVE-2025-2089](CVE-2025/CVE-2025-20xx/CVE-2025-2089.json) (`2025-03-07T15:15:15.033`) -- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-03-07T15:15:15.220`) -- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T16:15:38.543`) -- [CVE-2025-27152](CVE-2025/CVE-2025-271xx/CVE-2025-27152.json) (`2025-03-07T16:15:38.773`) -- [CVE-2025-27518](CVE-2025/CVE-2025-275xx/CVE-2025-27518.json) (`2025-03-07T16:15:39.187`) -- [CVE-2025-27519](CVE-2025/CVE-2025-275xx/CVE-2025-27519.json) (`2025-03-07T16:15:39.623`) -- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T16:15:39.893`) -- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T16:15:40.037`) +- [CVE-2023-35894](CVE-2023/CVE-2023-358xx/CVE-2023-35894.json) (`2025-03-07T17:15:17.897`) +- [CVE-2023-43052](CVE-2023/CVE-2023-430xx/CVE-2023-43052.json) (`2025-03-07T17:15:18.060`) +- [CVE-2024-12975](CVE-2024/CVE-2024-129xx/CVE-2024-12975.json) (`2025-03-07T17:15:18.263`) +- [CVE-2024-13086](CVE-2024/CVE-2024-130xx/CVE-2024-13086.json) (`2025-03-07T17:15:18.430`) +- [CVE-2024-38638](CVE-2024/CVE-2024-386xx/CVE-2024-38638.json) (`2025-03-07T17:15:18.707`) +- [CVE-2024-48864](CVE-2024/CVE-2024-488xx/CVE-2024-48864.json) (`2025-03-07T17:15:18.850`) +- [CVE-2024-50390](CVE-2024/CVE-2024-503xx/CVE-2024-50390.json) (`2025-03-07T17:15:19.180`) +- [CVE-2024-50394](CVE-2024/CVE-2024-503xx/CVE-2024-50394.json) (`2025-03-07T17:15:19.327`) +- [CVE-2024-50405](CVE-2024/CVE-2024-504xx/CVE-2024-50405.json) (`2025-03-07T17:15:19.470`) +- [CVE-2024-53692](CVE-2024/CVE-2024-536xx/CVE-2024-53692.json) (`2025-03-07T17:15:19.703`) +- [CVE-2024-53693](CVE-2024/CVE-2024-536xx/CVE-2024-53693.json) (`2025-03-07T17:15:19.910`) +- [CVE-2024-53694](CVE-2024/CVE-2024-536xx/CVE-2024-53694.json) (`2025-03-07T17:15:20.103`) +- [CVE-2024-53695](CVE-2024/CVE-2024-536xx/CVE-2024-53695.json) (`2025-03-07T17:15:20.250`) +- [CVE-2024-53696](CVE-2024/CVE-2024-536xx/CVE-2024-53696.json) (`2025-03-07T17:15:20.390`) +- [CVE-2024-53697](CVE-2024/CVE-2024-536xx/CVE-2024-53697.json) (`2025-03-07T17:15:20.527`) +- [CVE-2024-53698](CVE-2024/CVE-2024-536xx/CVE-2024-53698.json) (`2025-03-07T17:15:20.667`) +- [CVE-2024-53699](CVE-2024/CVE-2024-536xx/CVE-2024-53699.json) (`2025-03-07T17:15:20.813`) +- [CVE-2024-53700](CVE-2024/CVE-2024-537xx/CVE-2024-53700.json) (`2025-03-07T17:15:20.957`) +- [CVE-2025-0162](CVE-2025/CVE-2025-01xx/CVE-2025-0162.json) (`2025-03-07T17:15:21.110`) +- [CVE-2025-27604](CVE-2025/CVE-2025-276xx/CVE-2025-27604.json) (`2025-03-07T17:15:22.290`) +- [CVE-2025-27607](CVE-2025/CVE-2025-276xx/CVE-2025-27607.json) (`2025-03-07T17:15:22.433`) ### CVEs modified in the last Commit -Recently modified CVEs: `49` +Recently modified CVEs: `66` -- [CVE-2023-26213](CVE-2023/CVE-2023-262xx/CVE-2023-26213.json) (`2025-03-07T16:15:37.243`) -- [CVE-2023-3359](CVE-2023/CVE-2023-33xx/CVE-2023-3359.json) (`2025-03-07T16:15:37.470`) -- [CVE-2023-33979](CVE-2023/CVE-2023-339xx/CVE-2023-33979.json) (`2025-03-07T15:30:57.390`) -- [CVE-2024-10266](CVE-2024/CVE-2024-102xx/CVE-2024-10266.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-12837](CVE-2024/CVE-2024-128xx/CVE-2024-12837.json) (`2025-03-07T16:15:37.893`) -- [CVE-2024-33489](CVE-2024/CVE-2024-334xx/CVE-2024-33489.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-33490](CVE-2024/CVE-2024-334xx/CVE-2024-33490.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-33491](CVE-2024/CVE-2024-334xx/CVE-2024-33491.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-33492](CVE-2024/CVE-2024-334xx/CVE-2024-33492.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-33493](CVE-2024/CVE-2024-334xx/CVE-2024-33493.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-34771](CVE-2024/CVE-2024-347xx/CVE-2024-34771.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-34772](CVE-2024/CVE-2024-347xx/CVE-2024-34772.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-34773](CVE-2024/CVE-2024-347xx/CVE-2024-34773.json) (`2025-03-07T14:55:12.087`) -- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-39696](CVE-2024/CVE-2024-396xx/CVE-2024-39696.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-07T15:15:13.750`) -- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-57982](CVE-2024/CVE-2024-579xx/CVE-2024-57982.json) (`2025-03-07T15:07:16.373`) -- [CVE-2024-57983](CVE-2024/CVE-2024-579xx/CVE-2024-57983.json) (`2025-03-07T15:07:16.373`) -- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2025-03-07T14:55:48.130`) -- [CVE-2024-9458](CVE-2024/CVE-2024-94xx/CVE-2024-9458.json) (`2025-03-07T15:15:14.370`) -- [CVE-2025-26331](CVE-2025/CVE-2025-263xx/CVE-2025-26331.json) (`2025-03-07T16:15:38.650`) -- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T16:15:40.187`) -- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T16:15:40.287`) +- [CVE-2024-53053](CVE-2024/CVE-2024-530xx/CVE-2024-53053.json) (`2025-03-07T18:15:42.883`) +- [CVE-2024-53067](CVE-2024/CVE-2024-530xx/CVE-2024-53067.json) (`2025-03-07T18:15:43.577`) +- [CVE-2024-53166](CVE-2024/CVE-2024-531xx/CVE-2024-53166.json) (`2025-03-07T18:15:43.973`) +- [CVE-2024-56621](CVE-2024/CVE-2024-566xx/CVE-2024-56621.json) (`2025-03-07T18:15:45.237`) +- [CVE-2024-57972](CVE-2024/CVE-2024-579xx/CVE-2024-57972.json) (`2025-03-07T18:15:45.673`) +- [CVE-2024-57977](CVE-2024/CVE-2024-579xx/CVE-2024-57977.json) (`2025-03-07T18:15:45.997`) +- [CVE-2024-58002](CVE-2024/CVE-2024-580xx/CVE-2024-58002.json) (`2025-03-07T18:15:46.417`) +- [CVE-2024-58005](CVE-2024/CVE-2024-580xx/CVE-2024-58005.json) (`2025-03-07T18:15:46.880`) +- [CVE-2024-58079](CVE-2024/CVE-2024-580xx/CVE-2024-58079.json) (`2025-03-07T18:15:47.040`) +- [CVE-2024-6316](CVE-2024/CVE-2024-63xx/CVE-2024-6316.json) (`2025-03-07T16:48:11.150`) +- [CVE-2024-6317](CVE-2024/CVE-2024-63xx/CVE-2024-6317.json) (`2025-03-07T16:48:11.150`) +- [CVE-2025-1121](CVE-2025/CVE-2025-11xx/CVE-2025-1121.json) (`2025-03-07T18:15:47.253`) +- [CVE-2025-21333](CVE-2025/CVE-2025-213xx/CVE-2025-21333.json) (`2025-03-07T17:15:21.473`) +- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-03-07T18:15:47.370`) +- [CVE-2025-21712](CVE-2025/CVE-2025-217xx/CVE-2025-21712.json) (`2025-03-07T18:15:47.507`) +- [CVE-2025-21838](CVE-2025/CVE-2025-218xx/CVE-2025-21838.json) (`2025-03-07T18:15:47.713`) +- [CVE-2025-25450](CVE-2025/CVE-2025-254xx/CVE-2025-25450.json) (`2025-03-07T17:15:21.640`) +- [CVE-2025-25451](CVE-2025/CVE-2025-254xx/CVE-2025-25451.json) (`2025-03-07T17:15:21.803`) +- [CVE-2025-25452](CVE-2025/CVE-2025-254xx/CVE-2025-25452.json) (`2025-03-07T17:15:21.947`) +- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T18:15:47.840`) +- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-03-07T17:15:22.083`) +- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-03-07T17:15:22.190`) +- [CVE-2025-27508](CVE-2025/CVE-2025-275xx/CVE-2025-27508.json) (`2025-03-07T18:15:48.033`) +- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T18:15:48.163`) +- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T18:15:48.293`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 537904eabf8..40c8cfcb662 100644 --- a/_state.csv +++ b/_state.csv @@ -149687,7 +149687,7 @@ CVE-2020-14716,0,0,70d66e7d8e80fb4d43f94bf54c1dc7b730315a1924c7d9ae759bc161cfff9 CVE-2020-14717,0,0,1b1936ab258b5ca2f69f41c8a28f5de330c564737f80d45b1d2ba8c5299ad536,2024-11-21T05:03:58.007000 CVE-2020-14718,0,0,47b3847c8e0ad7e1cf65e84d8ff206d05b95ba08016fc9fc25c80fe989838ad3,2024-11-21T05:03:58.150000 CVE-2020-14719,0,0,2519153b65f7a2eaa8802944bcab1a17ff477cbea89f414b1ba913633e831e3e,2024-11-21T05:03:58.290000 -CVE-2020-1472,0,1,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000 +CVE-2020-1472,0,0,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000 CVE-2020-14720,0,0,a6a4dd928dc73ee3a2223498ff7ec3a434a9d87196fb0bba33306609b9652f67,2024-11-21T05:03:58.443000 CVE-2020-14721,0,0,677e040400c6b37d2d28fe5fe9e0570e19e78317804c8f50ac90977a0fba7930,2024-11-21T05:03:58.587000 CVE-2020-14722,0,0,bfc5f9939bc9c5fbdfa5f30f7afbd4ba716c6cfa243c24942ad536f2e510aab2,2024-11-21T05:03:58.743000 @@ -151898,7 +151898,7 @@ CVE-2020-17457,0,0,304666ebed82001d08af7fb6abc759208104ca1d7c7e0e0b188d0cfb6c453 CVE-2020-17458,0,0,25cd994ed4882520597cb423f48aadd4e5bb2fac882054daf1ab25aeb596c24b,2024-11-21T05:08:09.513000 CVE-2020-1746,0,0,5ade46611c222a1c9d0844bd94b21ff8c5e86579026017bbfd7a5cd2ec833167,2024-11-21T05:11:17.757000 CVE-2020-17462,0,0,dec14e35b954be98e4f456b3da60cf7ea2601d7108dbc0df7cf9c9630fd61564,2024-11-21T05:08:09.663000 -CVE-2020-17463,0,1,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000 +CVE-2020-17463,0,0,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000 CVE-2020-17464,0,0,e860379cc0b2b1fe9b1929183acf4fefa76c4c56161d2bb20eef1936bf91b085,2023-11-07T03:19:11.557000 CVE-2020-17465,0,0,6fa34c2a07df8f06e1ed6962dc93c0567cc563e0eaa10999b4977a3c63529215,2024-11-21T05:08:09.990000 CVE-2020-17466,0,0,d223484e1c0a2bec6302370e40313a4d5cb6ebf8c1a04b6cfa404cbad72f30df,2024-11-21T05:08:10.137000 @@ -161321,8 +161321,8 @@ CVE-2020-5842,0,0,dcb0f27f4317979c203b2c51bfab7cda27207ed5b71ee1c718a48e678a9f1e CVE-2020-5843,0,0,8378e8ca1d755c52b556a28b9a03d7cb9bb7f46e105c7df46b82ac95ec1f9c73,2024-11-21T05:34:41.133000 CVE-2020-5844,0,0,b894bec74321616318be63acacbc6a64ba72f10a231dbf6aa0116c83f7aecd7d,2024-11-21T05:34:41.263000 CVE-2020-5846,0,0,d2f3ffda68de3ecb9a5597e60cdc311709fce66834c02bfdd0ee4735d05b664e,2024-11-21T05:34:41.400000 -CVE-2020-5847,0,1,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000 -CVE-2020-5849,0,1,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000 +CVE-2020-5847,0,0,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000 +CVE-2020-5849,0,0,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000 CVE-2020-5851,0,0,0e6b8a980d42461bdeef132eb484123c19dc7a4e5f253f6abcd12b6bfeb3765c,2024-11-21T05:34:41.807000 CVE-2020-5852,0,0,a0d14d33aa5d76474940760e02808323b0255fdfa7ef7263fbf5fb39b4b3f9c4,2024-11-21T05:34:41.950000 CVE-2020-5853,0,0,ec5939c37c53e690929c801d26a949d22ea000c2d5657b7eea502e2f09c386d8,2024-11-21T05:34:42.357000 @@ -163716,15 +163716,15 @@ CVE-2020-8637,0,0,2217c7386170afe6b12de345c9c160276185b7c89e0dcda019627a55f9fb85 CVE-2020-8638,0,0,32c95e1823a3ea2f35b4d4087afa45e38f0aa3a6d2ec116bb344b25d3aabb7c5,2024-11-21T05:39:10.230000 CVE-2020-8639,0,0,8f89ab272a0ef46c31d75a3858f8022a4d9111848565bd65e9343b97ffd6fd3f,2024-11-21T05:39:10.353000 CVE-2020-8641,0,0,0d1c513fef1a173802745a61846ead8e61fdbfe5801ff740fb1aca89505c7ddb,2024-11-21T05:39:10.483000 -CVE-2020-8644,0,1,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000 +CVE-2020-8644,0,0,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000 CVE-2020-8645,0,0,2a03db6fa2b770ea0a59249c2f2585abe34df165b555d7ac782ed537d96c9f97,2024-11-21T05:39:10.747000 CVE-2020-8647,0,0,f068f0e57339478200309cb959bd7fd17a53a6b7117775a657951595e793600e,2024-11-21T05:39:10.877000 CVE-2020-8648,0,0,8fdc221d2ebb6dc8fb93bf4742dc8dfa23ef56dd805cde8998884f9ff56ef701,2024-11-21T05:39:11.030000 CVE-2020-8649,0,0,37c65f7d0c74c220929895992a0c92fb2e2d2fac5e634773795c784a74ea10b0,2024-11-21T05:39:11.190000 CVE-2020-8654,0,0,a3a76c24f693047768fb5b923623c39d10ba6a5e4698aa407fa5faf6a5f662ed,2024-11-21T05:39:11.347000 -CVE-2020-8655,0,1,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000 +CVE-2020-8655,0,0,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000 CVE-2020-8656,0,0,4786fc01a1c7dfdec763b31be079dfcb520c2439d320352e6b9d715294d319ca,2024-11-21T05:39:12.467000 -CVE-2020-8657,0,1,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000 +CVE-2020-8657,0,0,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000 CVE-2020-8658,0,0,4573f49c55d9f3879273cc4a97630ce9e9cf8aae9a1c623e533e4c3238f46259,2024-11-21T05:39:12.757000 CVE-2020-8659,0,0,0058e06c3c4af6d2c2f20fc9f830318b2a5c5c55545999cea86f50e52d91077f,2024-11-21T05:39:12.880000 CVE-2020-8660,0,0,c8eb75df1246ad70e7d88e25da868f2489d66b14a433ad144d2fcc75766974f8,2024-11-21T05:39:13.013000 @@ -166303,7 +166303,7 @@ CVE-2021-1643,0,0,4060b809fead12bb9d67f78be5df56a37d87ee4646fa6e6df86052c1df4b14 CVE-2021-1644,0,0,efef402905230983da5bdfdf12143b0e50435ebe4d4fb21c1fe5c122d402ef18,2024-11-21T05:44:47.930000 CVE-2021-1645,0,0,25258a77695180ba77c99bd2c6823d73e5a5f58b3767fb51d6c767a59a2b7412,2024-11-21T05:44:48.047000 CVE-2021-1646,0,0,dd5db096be9e6e8c998f36cbbb20089c7e8840cca55aeece215ab90e471c3d0d,2024-11-21T05:44:48.180000 -CVE-2021-1647,0,1,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000 +CVE-2021-1647,0,0,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000 CVE-2021-1648,0,0,442992d9469b43ae43cc0ca7fd4e0fc4dea65be20b3af1ea5c7d4bd9dcb9c3fd,2024-11-21T05:44:48.457000 CVE-2021-1649,0,0,b02803d777e0231640dee4f5831d7188c99fb48f5d6a9a75e7a6945731355893,2024-11-21T05:44:48.590000 CVE-2021-1650,0,0,bf70b4a3c0b73b36f07cd9c7e86a8dc7f79730c1ed3fc35784abee243ce739fe,2024-11-21T05:44:48.727000 @@ -172381,9 +172381,9 @@ CVE-2021-26843,0,0,e22c85b76cfecdfffe08cb6d2ad5cbb9f4c9a7db43ad8249c84af125becc2 CVE-2021-26844,0,0,02cc15f895219c53d39be6e1f4c6a51757746b0bf8fffc23217ee117f819801d,2024-11-21T05:56:53.557000 CVE-2021-26845,0,0,d16f5d1bf8b70b13ab07460aba2ea681026589dea89b8756fa7229f826d22ecf,2024-11-21T05:56:53.713000 CVE-2021-26854,0,0,c4bcbb9b671013b7c4c294d860d3419f36080d16f644917d5e58ee1c30b46045,2024-11-21T05:56:53.857000 -CVE-2021-26855,0,1,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000 -CVE-2021-26857,0,1,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000 -CVE-2021-26858,0,1,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000 +CVE-2021-26855,0,0,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000 +CVE-2021-26857,0,0,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000 +CVE-2021-26858,0,0,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000 CVE-2021-26859,0,0,5355f8a65fd9a2daa85a7f9efe95e508d18de450153222105a4194499f856cab,2024-11-21T05:56:54.420000 CVE-2021-26860,0,0,cb9bc2194420b618bd81851fe6d2a08a1be6a880c0edf922353c2faf291197c9,2024-11-21T05:56:54.547000 CVE-2021-26861,0,0,6f3d935057cf053b76c7041731ccc09d592a8c11b4860b84ecf1bdff18fea857,2024-11-21T05:56:54.663000 @@ -172561,7 +172561,7 @@ CVE-2021-27055,0,0,616bae98d63b41814c216210e09e8dbc281ce177c697d375df0d4e6593d89 CVE-2021-27056,0,0,1ae7cb984b6e5ffbd786f70b551ed29c115f46e7cd4faa9f6ce540825c96f616,2024-11-21T05:57:15.847000 CVE-2021-27057,0,0,8f2f3d4b30cdba051b36fab8acee9657b759db551f41d2444c75ef8c4fab0c88,2024-11-21T05:57:15.980000 CVE-2021-27058,0,0,511db4da3ab9a085092b3cee2e2af3e9fcda564a270ba6a5dbfc106fefb07f7d,2024-11-21T05:57:16.110000 -CVE-2021-27059,0,0,6d412a55534452efc390bd6857c6db28f716be93f1482cd5a25b37cdc8f3b2ea,2024-11-21T05:57:16.223000 +CVE-2021-27059,0,1,cd8ba5f6b68e01a976d3dbb06fa94f939fafb032626f7e96cc761e950c7dbb21,2025-03-07T17:12:53.023000 CVE-2021-27060,0,0,be6470ec524b2e0b81148df626176f17bffb934ccbf2a3c5e0ad5201f718a021,2024-11-21T05:57:16.370000 CVE-2021-27061,0,0,a9bdd3d791d056a27907bdad7344847b96066a4fd806441d6f5b216747a5720b,2024-11-21T05:57:16.500000 CVE-2021-27062,0,0,5b4986eb03cf9aaf2ef6354c0c80821b8b5d7fd5b9cd15eb5a5836d99382168a,2024-11-21T05:57:16.620000 @@ -173152,9 +173152,9 @@ CVE-2021-27859,0,0,993f7636ab44f63e13208197998ae7db16b9d062167251918517bbcbfe7e1 CVE-2021-27860,0,0,dfab7aeaff73bc97888f133c03739b011132bd10ea3c893619d85892c04dedfc,2025-02-04T20:15:42.070000 CVE-2021-27861,0,0,2e874793f7920b781935eba26fcbb236ca8c4ecce3e14a7ee776186e960e718b,2024-11-21T05:58:39.770000 CVE-2021-27862,0,0,fc7e14948885397a858c226d74b5728d90a6f062785c550fae571d5169db34ae,2024-11-21T05:58:39.887000 -CVE-2021-27876,0,1,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000 -CVE-2021-27877,0,1,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000 -CVE-2021-27878,0,1,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000 +CVE-2021-27876,0,0,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000 +CVE-2021-27877,0,0,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000 +CVE-2021-27878,0,0,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000 CVE-2021-27884,0,0,07ef68bb7a49a5e41de55ecdb94a5317031927a7badddc4c1dcd133b77daf30c,2024-11-21T05:58:41.470000 CVE-2021-27885,0,0,6846b02647cb7751bb45d0264c610c218765b765257a96f038efde08963f4d38,2024-11-21T05:58:41.690000 CVE-2021-27886,0,0,c596fb96a9799b2965bc5d05f26e95b1ee896238a8a7188e7a76c1cda9de11e8,2024-11-21T05:58:41.943000 @@ -175649,7 +175649,7 @@ CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000 CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000 CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000 -CVE-2021-3129,0,1,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000 +CVE-2021-3129,0,0,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000 CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000 CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000 CVE-2021-31294,0,0,d4eb37e109e629565a20435c105b1449a6efda6d20165a8248479e9ceb3a9e5b,2024-11-21T06:05:24.390000 @@ -179429,10 +179429,10 @@ CVE-2021-36397,0,0,eebf3717bb6d7a75919581e9690ded27175cc43d0e0ae84aad7e9fc635ccc CVE-2021-36398,0,0,a15925e7e8302adc45445e0e6a65d8200cc01053000945d2c340fe144e385a65,2024-11-21T06:13:40.903000 CVE-2021-36399,0,0,c1c77e13ccc41082e659facaf679a4d1b66ebebbe068780edf8992260be97673,2024-11-21T06:13:41.013000 CVE-2021-3640,0,0,3a80df1344714725e984ce863309234fe897070436443f5efb4f41085f65a0c9,2024-11-21T06:22:03.073000 -CVE-2021-36400,0,0,c368f06d082ff5a0504764ceac92042624aef4e93ef5f545066b88a7592506cf,2024-11-21T06:13:41.120000 -CVE-2021-36401,0,0,45512c8c71be4a29fc9bb288ee850fb706bcf4c084639a721339de185701c62f,2024-11-21T06:13:41.230000 -CVE-2021-36402,0,0,c3de4796ae57ff742ff715c98a8ec52227364287a170eb20fa6d5355e809a82f,2024-11-21T06:13:41.343000 -CVE-2021-36403,0,0,d1413d541c083a0a015186ac59d8be70ed7f6008778bdf077f6b026e0bebbe20,2024-11-21T06:13:41.453000 +CVE-2021-36400,0,1,d9f1a10d143ba21ec79162cc67c1b4b2251dd89f9d228e4ea5342378f97cba20,2025-03-07T18:15:34.827000 +CVE-2021-36401,0,1,34a05e6559df94d5e55f00592ecd158ff75a267c3e6d8d79e4ff2518af3cde5e,2025-03-07T18:15:35.090000 +CVE-2021-36402,0,1,956f250b96529b015507a70b0188f411c950b33c3c5aaa245cfd0050f35b9223,2025-03-07T18:15:35.320000 +CVE-2021-36403,0,1,381e5fe7222d53ff999ecd102e7c25f9589ffc2074befb284ce3fe60e3d4629b,2025-03-07T18:15:35.547000 CVE-2021-36408,0,0,3f8a9b1a87671235c6fcb130acfce43f1298c1436dedb5039d784b193a27d74b,2024-11-21T06:13:41.567000 CVE-2021-36409,0,0,4a8ed4b1f9fb08e1f7f8ec09708da4871da44ffc1dfd70a5c7eac39ad0d279dd,2024-11-21T06:13:41.720000 CVE-2021-3641,0,0,3b76f4fad6c4fccef01a7c5862d69fc2f97305c2fcd42656e424a5133f77fb4d,2024-11-21T06:22:03.300000 @@ -179564,7 +179564,7 @@ CVE-2021-3671,0,0,2e98707d05a3d5dd6bb82a24011add61bf4093e9d7d7c0ef54e15be3c44712 CVE-2021-36710,0,0,30d3f6219f02843c7db6762f93c7bb35bf6a07d0e6a066f808321a415ace3d4c,2024-11-21T06:13:57.340000 CVE-2021-36711,0,0,ff91331951413364cc0c150d1e96e169d83ffdc9156d5799838288065cb37de3,2024-11-21T06:13:57.510000 CVE-2021-36712,0,0,86f9316723405930d5e8c829281e4fa6d3291043cf5a570cded38ee796a6d85d,2024-11-21T06:13:57.670000 -CVE-2021-36713,0,1,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000 +CVE-2021-36713,0,0,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000 CVE-2021-36716,0,0,5662ce55ac5c83778feb49af51a4a7a09a851153e5c2c010efd65d93cb4fdbba,2024-11-21T06:13:57.973000 CVE-2021-36717,0,0,ec369d3ecfa389c0148878e8348c016478ec723b90d9011f790f892d64463eba,2024-11-21T06:13:58.143000 CVE-2021-36718,0,0,775941130e24c7529766d8f19f5e9007abe25d5d504a9926d5087c9e9f872619,2024-11-21T06:13:58.283000 @@ -200879,7 +200879,7 @@ CVE-2022-32765,0,0,288c46848ca90bc0970228e4c106898962265fe5ef966fdb621059ec6e48a CVE-2022-32766,0,0,f8af3e288bc19c30281a1d0ccfabd1595b6500716a3aad9106452d2f8828a86f,2024-11-21T07:06:55.190000 CVE-2022-32768,0,0,c7d4fb2b17fec1c41f721ec7f12f58d3dd128594cc56036f151ab10b94ff5402,2024-11-21T07:06:55.320000 CVE-2022-32769,0,0,2bcd9e4801c613d9c501665e694fc1ccc87f19f08f4bfd7ec0020d43aabddf84,2024-11-21T07:06:55.457000 -CVE-2022-3277,0,1,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000 +CVE-2022-3277,0,0,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000 CVE-2022-32770,0,0,2117cde9ddfe9fc4190507bbd939b0b74257bcc2e26270c25a9c72ab9762f3d1,2024-11-21T07:06:55.587000 CVE-2022-32771,0,0,71c6f498ac24328dd596adccf278375f0d0157867acd5b6c9e0a42d0130dfd43,2024-11-21T07:06:55.717000 CVE-2022-32772,0,0,e3b68231aad472dc58151c5e29625a9adae7c2eb8114c08e61c9139b03dce259,2024-11-21T07:06:55.860000 @@ -204363,7 +204363,7 @@ CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40 CVE-2022-37067,0,0,073a63c94609fb61c3c7478f5894b6cef5a4e645ffd2533f7feff90902f4bfe5,2024-11-21T07:14:23.250000 CVE-2022-37068,0,0,bfbc21ac6f627e851e0b40b7ed324b42c9a2dd81234107a167e1ea24c57dec94,2024-11-21T07:14:23.400000 CVE-2022-37069,0,0,dc864251b7b1e5b3758cf4caaf549434af36e31ac4247583a5727ca221971dd0,2024-11-21T07:14:23.567000 -CVE-2022-3707,0,1,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000 +CVE-2022-3707,0,0,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000 CVE-2022-37070,0,0,e2c0503dbb97f457cda6fc0db7f472cd6525c918effd3957023eb8ec3528183a,2024-11-21T07:14:23.730000 CVE-2022-37071,0,0,5425191f63dc698190eb62d1acf953318f967db9b131d7887dfce006cb96572c,2024-11-21T07:14:23.867000 CVE-2022-37072,0,0,246171d66413946e2e9259efcef4d1da86ac9de1e57e619f1e332302396b624c,2024-11-21T07:14:24.013000 @@ -205541,7 +205541,7 @@ CVE-2022-38730,0,0,300c336561da45308ac6ec1adeba6d7f701849eeb6e5c41e2af9a5786c375 CVE-2022-38731,0,0,e1e8c202028e7c3837e4ad31be40f813300a4270817eeee7747539807e8539e9,2024-11-21T07:16:59.993000 CVE-2022-38732,0,0,7a75851ca1470c647bbd7f34211aa0c5b615748353b50a5546371503d9daf959,2024-11-21T07:17:00.147000 CVE-2022-38733,0,0,674cc1a631b85cdd4d1cf504dcf5baa7d840252de2c63bc09ccee76a967f8f85,2024-11-21T07:17:00.260000 -CVE-2022-38734,0,0,e6aed38be0b0cb4ff9fb7505ba8132fcfcf669f8c819b18fabcea75ebff712f7,2024-11-21T07:17:00.363000 +CVE-2022-38734,0,1,f435132f751c484c01cc26dc002c3598b4c01e6ab4eab1d4fb1d044fe1784b5f,2025-03-07T18:15:35.860000 CVE-2022-38735,0,0,5f44613c824fadb1e5fa65ec5e09fcccbbf678b94c575a508ba9dd04e45021ef,2023-11-07T03:50:12.130000 CVE-2022-38736,0,0,a0674f204cbdea0303470e0055bdcfc196ea10a061afd218aa904dcd6f0e6765,2023-11-07T03:50:12.430000 CVE-2022-38737,0,0,375460f6a56948cefeac86257ff0b9e553009fc7024ed0e14414972ac7bea09f,2023-11-07T03:50:12.837000 @@ -207254,7 +207254,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 -CVE-2022-41082,0,1,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000 +CVE-2022-41082,0,0,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000 CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000 @@ -207941,7 +207941,7 @@ CVE-2022-41859,0,0,d7fddb015ce8a0ef2f9a3d1b5b02e117163f8e04fd79fce2bb8d303b5ea5f CVE-2022-4186,0,0,a065f65e44e81acbb6156b41d02f078148d8a8ce8b985b43a5a4cbc8cf2e82b3,2024-11-21T07:34:44.520000 CVE-2022-41860,0,0,3902c9c181b31779a24cf74edb67fc91cfafe626663e3b5347822186d946f0ad,2024-11-21T07:23:57.257000 CVE-2022-41861,0,0,5444bba71b3cc5fb61cb2dfa5e4122b78a7ec8e4b4721212a077748536b0c745,2024-11-21T07:23:57.380000 -CVE-2022-41862,0,1,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000 +CVE-2022-41862,0,0,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000 CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000 CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000 CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000 @@ -210552,7 +210552,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000 CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000 CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000 -CVE-2022-45449,0,1,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000 +CVE-2022-45449,0,0,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000 CVE-2022-4545,0,0,99841b6aae53e9700cdfd19011146a18beac019ddefac29bac4f0b93aa4a600f,2024-11-21T07:35:27.730000 CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000 CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000 @@ -210643,8 +210643,8 @@ CVE-2022-45548,0,0,e95a0b1f599986c19a82840fd26c1ada5e6cfb5cd55dee60741d610dc0fe0 CVE-2022-4555,0,0,ab9573e8007e94879618723fe294ad8ddef575de9e9b6c5e7923556dd3555888,2024-11-21T07:35:28.900000 CVE-2022-45550,0,0,547c8bb332eedbeb52103741d5d16740a06bf4a7179e1dfd6e4ad53c93d1f4f4,2024-11-21T07:29:26.290000 CVE-2022-45551,0,0,c3e2ff173685837cb5f02972064f49df34d340f6660f9412785ff40c333c35aa,2024-11-21T07:29:26.427000 -CVE-2022-45552,0,0,5f9db4b60942f7e138767da9b31f0635b22b3d2d5c2df124b3ca6dad31aa35e6,2024-11-21T07:29:26.583000 -CVE-2022-45553,0,0,62ca2e0cddd75af6e914501579b4d3bb43d8b610b60bff71a0ac351cddd4aa47,2024-11-21T07:29:26.757000 +CVE-2022-45552,0,1,cc0d2e0061f1a0a2ac9801b49129df629937065a2b27678cf05db36eccb47bd2,2025-03-07T18:15:36.307000 +CVE-2022-45553,0,1,a3b2c354c931598a5629ee8628449e43eb4a82c8d377e393f721e42a93c32f75,2025-03-07T18:15:36.460000 CVE-2022-45557,0,0,eb992f12bdba5a9ed395677530ec85c0d605b8f3ec4bba6943db3924eb1dd000,2024-11-21T07:29:26.930000 CVE-2022-45558,0,0,d98b93236eba488bbb2e418bc6b17c8d1bd74f35a46583bc1b4f8929e43c77ac,2024-11-21T07:29:27.073000 CVE-2022-4556,0,0,9adec6c9326c8a3f5d9680569d2e1dfac8713bbee8aaff4a3d4c1bc0302c5acc,2024-11-21T07:35:29.017000 @@ -210663,7 +210663,7 @@ CVE-2022-45598,0,0,5d92fe063374988f9bda6d36dd5b69c21957a39318293406ccba1b4baf6f2 CVE-2022-45599,0,0,547b46c2dd6086e714707d71beb4523c1585e37c63266acecd715148f33a4b4e,2024-11-21T07:29:28.553000 CVE-2022-4560,0,0,0e11ff69f9a0e32903cd534b58a4b6d5f5858d1fa11382434c1bb83d9d09ad5d,2024-11-21T07:35:29.530000 CVE-2022-45600,0,0,56553aca3adf5fe59c4a2341a05175dcd597457d7e3b42b643e8d284559f355f,2024-11-21T07:29:28.703000 -CVE-2022-45608,0,0,fa716a16ec8ba8a29f83e05cffc48c4ac894810d2e61a3ea405e39151929e9f9,2024-11-21T07:29:28.860000 +CVE-2022-45608,0,1,7166df0ab73bff25f68021172b375d2bd2b01295da078185dfd752ed4c67eda9,2025-03-07T18:15:36.600000 CVE-2022-4561,0,0,bf468782691054d6d44934e6fbf08b309101dce74edfd907332b90b8b681d475,2024-11-21T07:35:29.687000 CVE-2022-45611,0,0,443385561b6532c714a472c9950b68b27d18afa8516d9013dda794d040a5d678,2024-11-21T07:29:29.017000 CVE-2022-45613,0,0,788ed998768a6ce492ffa28a04fefa8906093e7e113f6e1463ea5c78c6884a9e,2024-11-21T07:29:29.183000 @@ -210933,7 +210933,7 @@ CVE-2022-45979,0,0,29f1a05bed527d76f6abadef19bd038baeaa5012d5be2703a612315616020 CVE-2022-4598,0,0,30d850eb20a135185c5b68aafbac5f46e3329159b950dd7a2f19dce2def78ed3,2024-11-21T07:35:34.227000 CVE-2022-45980,0,0,ec0da2daa3e3f554d7b901b4be8d96ed7dd60d46533069fd4cb58fe96e6fe17b,2024-11-21T07:30:02.440000 CVE-2022-45982,0,0,70aa481ee4b6563497da3040092518bce21db4acbf51ac40e1c83ba492acb4e1,2024-11-21T07:30:02.610000 -CVE-2022-45988,0,0,b88ccea4b1172af436306eb70dd4615d8ee95861d9fde2a8992a986902f8f661,2024-11-21T07:30:02.777000 +CVE-2022-45988,0,1,2191f8bbbf8d239ddf30397145fdd13d40e62fec70edb8e22034a0f41c071432,2025-03-07T17:15:14.773000 CVE-2022-4599,0,0,b1c692040b7873a7c4127dfde8a6f89c63a5d457054525c409da9357855b74b5,2024-11-21T07:35:34.343000 CVE-2022-45990,0,0,49f36bdcf1672f4737437f303412dd6da7b773fc548eb726d92ff24d951e8986,2024-11-21T07:30:02.960000 CVE-2022-45995,0,0,0eabc74e7031f4a56253ed61f028d22977542ef2c1ae2e8377d3caed094eb7a1,2024-11-21T07:30:03.107000 @@ -211657,7 +211657,7 @@ CVE-2022-46966,0,0,070bf64185beec1d346f1eb3fcc535a9f501d6d7759507c69e62ea1dfb763 CVE-2022-46967,0,0,7b5e0d7e72e3dba5d588a35fb64ffdf40088372a48d9222c2905273c82086be6,2024-11-21T07:31:21.360000 CVE-2022-46968,0,0,c503254a3e5c4d42a758af6f17024297295ac5fa736be3573aab667842fa96ca,2024-11-21T07:31:21.537000 CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000 -CVE-2022-46973,0,0,63a6c9cf4ba1af494250acff2cd788f73165ea19b6cb0864c29ebeb119adb2c2,2024-11-21T07:31:21.717000 +CVE-2022-46973,0,1,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000 CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000 CVE-2022-4699,0,0,348453cf60ca73dac7c7362e5688b4af38b8b30693e6d4cd3906b2f3918ebde4,2024-11-21T07:35:45.567000 CVE-2022-46996,0,0,984b54bc9341b35701fe20f31b56222296aa8090a9e5105f4e5975e85a224e16,2024-11-21T07:31:22.417000 @@ -212131,8 +212131,8 @@ CVE-2022-47660,0,0,b2a26f29f398eb0cca1c2cff097486503776c909512ef7ca9cf227f700eaa CVE-2022-47661,0,0,02ffc1e351796980778efe4ee704ca9cd42e058cf5ac3e54fb890ffa48f85085,2024-11-21T07:32:19.893000 CVE-2022-47662,0,0,b770298610741dd4f9df8051a20d93a25058a92f2614f2cbc5f3a50a18663cb7,2024-11-21T07:32:20.077000 CVE-2022-47663,0,0,2a94ebb2cbb6c5b6b670b58eb6ff8b6727f0711d086dabe3ab02d2621bc31e81,2024-11-21T07:32:20.247000 -CVE-2022-47664,0,0,47763453d161beaddf54991f097aa341c1896f419bf56ec1d8254c7936117952,2024-11-21T07:32:20.380000 -CVE-2022-47665,0,0,26da2ae8f6cbe2cc19fe097ffa7826744e2258276d6bc28dee353baf3a198d28,2024-11-21T07:32:20.507000 +CVE-2022-47664,0,1,47517e746ba03e9b1c10021eb3b69e3257e75b17e7a30f875d08d410b8db3897,2025-03-07T17:15:16.053000 +CVE-2022-47665,0,1,21cf94b97ea1f5f409a582e565160c1b87d64cb464ada14046deb282357fb61d,2025-03-07T17:15:16.230000 CVE-2022-4767,0,0,fc160306c6ef32e90c268535f0a2efd97e6f08151d7748ce2bbbdfa1010102db,2024-11-21T07:35:54.057000 CVE-2022-47673,0,0,20347fd0a92b366106f719a65b040c39066d53f4fc286abd40fbaa008b63075b,2024-11-21T07:32:20.647000 CVE-2022-4768,0,0,6957e3cdf4174c08f5a6c86aa2a134dec1508a1480840d7b83763fcbbe37d41d,2024-11-21T07:35:54.170000 @@ -218008,7 +218008,7 @@ CVE-2023-22419,0,0,c1dd2f72f61814803cdf63bcf8dca22320a762690c8cf4b60f814521f088e CVE-2023-2242,0,0,4a937452ab57b5296438a1ae14dc38bfed91efb6c5653c71648121b31c6163c1,2024-11-21T07:58:13.417000 CVE-2023-22421,0,0,c679e58c8416e77061e0c043851f1c9eb505ade7b79525a95ca89620b33fbb40,2024-11-21T07:44:47.053000 CVE-2023-22422,0,0,1b35c84e2fb89995518f67e9309c4c9dbec4b7abbbf1d9cf247ec0366eeb4240,2024-11-21T07:44:47.157000 -CVE-2023-22424,0,1,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000 +CVE-2023-22424,0,0,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000 CVE-2023-22425,0,0,2d237c6de59422283df9a7c8f88cb08b1ea8054670ffba4dcb711a39f4fb4683,2024-11-21T07:44:47.387000 CVE-2023-22427,0,0,f490e42af5d94874676af58f877fe1ac393f7611b6800a738a6ae9c18e557f30,2024-11-21T07:44:47.500000 CVE-2023-22428,0,0,b3eeca8a1daaffa1f36da6254dfad723add1cced54ccf9190fb4f8dda34204b0,2024-11-21T07:44:47.613000 @@ -218610,7 +218610,7 @@ CVE-2023-23304,0,0,a05e299daf0bc4c5856f511bb40c36b26587f6169fbb6209dae939d3d8970 CVE-2023-23305,0,0,ff17ec9af4062b97397cee611c9685514d35dba9f51128bc58a054c71e77f188,2025-01-31T14:15:28.603000 CVE-2023-23306,0,0,014d2967b491cf39d3d136cce38fda47905e7e3919118ff4237b7c6c0104db7f,2025-01-31T14:15:28.793000 CVE-2023-2331,0,0,7350bf9c3fc1604ca4a1b4da0dbc3bce3b57a1f51947ccfab63c30c1d8075b0d,2024-11-21T07:58:24.147000 -CVE-2023-23313,0,0,f8ec11bb48f2f9fb538d3943f3d45ed11223fcc4635f2314b87dd441f19816d9,2024-11-21T07:45:58.963000 +CVE-2023-23313,0,1,8690fdd8af8ba0a5642bf3ef23488081a088f7856971972de3ffae0cfe33994d,2025-03-07T17:15:16.473000 CVE-2023-23314,0,0,c2a2dfdd71bcbe7884c465cfc2e67185e3890b73a95126224cb787a55733f2fa,2024-11-21T07:45:59.203000 CVE-2023-23315,0,0,7f211b20f8879185076392acff7b806e30e631935376086702fbcab39b12a939,2024-11-21T07:45:59.340000 CVE-2023-2332,0,0,da44be4c9a914607350af7cdf1b1da16efda7b342df7dcfe63c493c785f8f06b,2024-11-19T15:55:24.137000 @@ -219362,7 +219362,7 @@ CVE-2023-24107,0,0,cfa2007347f58b9314bbc4117ca2ab04e67a97970e1eb9bc1050cd7d7908e CVE-2023-24108,0,0,aef70f73d56b6d18ff55fb4dfbd92c1419c67b181b553728caa0c072ada07315,2024-11-21T07:47:24.560000 CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000 CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000 -CVE-2023-24117,0,0,032d66a7cc5099bebe845729f389df8a7f1e892c2ac33c3eda852ab9ed2d136f,2024-11-21T07:47:24.847000 +CVE-2023-24117,0,1,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000 CVE-2023-24118,0,0,3c79b883389ae8318792486fcf8cfbd157c6b3b80e4d307cc578ded3347be31f,2024-11-21T07:47:24.993000 CVE-2023-24119,0,0,1903b9ff7063822f9f1eee7d8f6bda33bdffcec3b850172360906c6ff45cb020,2024-11-21T07:47:25.137000 CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000 @@ -219779,8 +219779,8 @@ CVE-2023-24625,0,0,031358c3cce9ece3e30c39fd1b6a6435b4b4b6ec9c94eaf2c55f80be98ffa CVE-2023-24626,0,0,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000 CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000 CVE-2023-2464,0,0,b8ae76a72e47db531a3bbe43222f04869a83359178fae5aa13a60312ce5c538a,2024-11-21T07:58:40.250000 -CVE-2023-24641,0,0,7076d9df7f61967daef18368ab239a82191782b3edcfa4f944c828be11b4f242,2024-11-21T07:48:15.673000 -CVE-2023-24642,0,0,e7646885975b6776627fb197fcee14f28b5f0be499b1cb6744dc3b4b1ef5ecd2,2024-11-21T07:48:15.823000 +CVE-2023-24641,0,1,593e0d6b0fb3847f0e2d539cf4646c1bc52db6ecf2778e086f76a1911174da8b,2025-03-07T17:15:16.910000 +CVE-2023-24642,0,1,7f4951fb2ed1b9f086299b9229af617455bfd453d0bbe59f7a808f5724059350,2025-03-07T17:15:17.070000 CVE-2023-24643,0,0,ea144aa9aa076b631d7006d077f801e06c8b084342b5db38a6fb8036447f94e3,2024-11-21T07:48:15.970000 CVE-2023-24646,0,0,d1a442ce7864479512c8fe6ab09faa0757c0ff18bf1c24a2e1724cfe374e86a3,2024-11-21T07:48:16.110000 CVE-2023-24647,0,0,97ec42b52dfa4f5d755188fee73924996a4b78591b876b6d5191063d70015aab,2024-11-21T07:48:16.253000 @@ -219837,12 +219837,12 @@ CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f010 CVE-2023-24754,0,0,42885f8db3ea1d2ab38e7fd061eee4daf1de514fe3c8843b43f6d2b02ce3d3d6,2024-11-21T07:48:22.170000 CVE-2023-24755,0,0,c88f7e592135bce8a4a5ea2bfd86138da220b85446e7ae5773d7d7fa6bfa0910,2024-11-21T07:48:22.310000 CVE-2023-24756,0,0,dc204becde6645b45c0da365ffdacca71444ef90cbef402419c82247d10a38d3,2024-11-21T07:48:22.457000 -CVE-2023-24757,0,1,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000 +CVE-2023-24757,0,0,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000 CVE-2023-24758,0,0,441e45920579ec0bfea433f0388c75e94eda4c0aa96df2e80a289332a4894341,2024-11-21T07:48:22.733000 CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a48,2024-11-21T07:58:41.490000 CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000 CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2bba,2025-03-03T20:15:38.170000 -CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4bc2,2024-11-21T07:48:23.160000 +CVE-2023-24763,0,1,2a90297b759d351a75bd275d5b38707d137212e854f8f294548b00c5f9c99d39,2025-03-07T17:15:17.230000 CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000 CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000 CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000 @@ -220337,10 +220337,10 @@ CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94 CVE-2023-25350,0,0,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000 CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000 CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000 -CVE-2023-25358,0,1,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000 +CVE-2023-25358,0,0,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000 CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000 -CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000 -CVE-2023-25361,0,0,d8143811fa2fbed2aa47a7bb1803e2898e8970fe423990f5709306cbdb47446e,2024-11-21T07:49:26.613000 +CVE-2023-25360,0,1,4d515a7c353ec1bc9fa249341372f58f8ec3f3949eed604d29fbc6748ac508db,2025-03-07T17:15:17.390000 +CVE-2023-25361,0,1,c3270213ad0f7bbc788a8c7a0c4853eae1c14f60cd4010621b5c00ec9f2507b4,2025-03-07T17:15:17.560000 CVE-2023-25362,0,0,54a7584d73fe770bb4b6a778bf39100b69fcd447dfd780e09c48eeda355d0dce,2024-11-21T07:49:26.760000 CVE-2023-25363,0,0,a13e12e2d521248bb56a1f4c931835a614aa9c58a3850209d3d076c4362a4633,2024-11-21T07:49:26.910000 CVE-2023-25364,0,0,18e074f726c1a7bbb7f4b7c4f618e112147b7df67e3764dd5918c3fb79f094a5,2024-11-21T07:49:27.050000 @@ -220359,7 +220359,7 @@ CVE-2023-25396,0,0,e475663fc0a46c87716c9e0defab7475b5b2abaf3dfd6dea25345a034a1f2 CVE-2023-25399,0,0,4f7886e32efae7286432d7e25de8fe81da245b0b7fde26600280b3335bd9f4fa,2024-11-21T07:49:28.527000 CVE-2023-2540,0,0,8e21455c2a3f0d656f8d6f76a29bf92197f7443bdfdeb3a5c1418acc0a6c6510,2023-11-07T04:12:51.453000 CVE-2023-25402,0,0,4a3622604011bd1fc4584e1bdf0495944586b74d2dac6dbcfd2edebbf48306e6,2025-03-06T21:15:13.417000 -CVE-2023-25403,0,0,12ca1f55d3be83dfe89447eeb843d9d0ebbea4a10e7ea2445c02dae22da0d50d,2024-11-21T07:49:28.890000 +CVE-2023-25403,0,1,5a388dc86f3be061dcb1dc09ef3ff8f874be816d5154a435d460bc1b20feb965,2025-03-07T17:15:17.727000 CVE-2023-25407,0,0,201c5c62d509a0d107a8478376efc425bc84a87e5e99be3c005354869311dab5,2025-02-11T17:15:17.473000 CVE-2023-25409,0,0,160062236c36118eef430dff4025d868a0e4be574d30de0b9757af7a5069e22f,2025-02-11T17:15:17.643000 CVE-2023-2541,0,0,9bb2c3027f762943e143c16e20cbc24b58cf60f2090ec0abc272f5af4f4f2851,2024-11-21T07:58:47.883000 @@ -221082,7 +221082,7 @@ CVE-2023-26209,0,0,a892a2695c5017ffca11881763f9e45ffa97f8d9fd3ef81673d2b4d81967e CVE-2023-2621,0,0,46a71fd277c5850785baccb07629db57c3e33b88c0c891670a7f4746f333c8ea,2024-11-21T07:58:56.940000 CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1002,2024-11-21T07:50:55.397000 CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000 -CVE-2023-26213,0,1,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000 +CVE-2023-26213,0,0,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000 CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000 CVE-2023-26215,0,0,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000 CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000 @@ -226961,7 +226961,7 @@ CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726 CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000 CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000 CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000 -CVE-2023-3359,0,1,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000 +CVE-2023-3359,0,0,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000 CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000 CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000 CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000 @@ -227252,7 +227252,7 @@ CVE-2023-33974,0,0,531e41d5b879646dc4c7aa0d04a15823a13b7b33472a4070b6d3df6d25837 CVE-2023-33975,0,0,2fa415f380f19ec93055bc47f99763c1a62ccb69b74cc7e124876cbb580a8af1,2024-11-21T08:06:19.843000 CVE-2023-33976,0,0,89ad541a1971f4e6c687199980a0c351ef4f09e89d264cf9da92848cc8d79bd3,2024-11-21T08:06:19.983000 CVE-2023-33977,0,0,7f9ae9cf63258eb45b3160b45e0b54f8cf115775476935085e3f3f6ae5de4077,2024-11-21T08:06:20.147000 -CVE-2023-33979,0,1,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000 +CVE-2023-33979,0,0,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000 CVE-2023-3398,0,0,ac532334ebc2ea5d377a047eed3a69a21b57b1a2389b634cb5b7a8c9c83c1db6,2024-11-21T08:17:11.240000 CVE-2023-33980,0,0,b711df1691783ee08c058e35e642804a3b9c96d290c14ba311f8a31f13881963,2025-01-16T16:15:30.280000 CVE-2023-33981,0,0,1b80f20492609165165bcb0710c37d0eb63e70c48a11fc8a6a92dff7de8524f9,2025-01-16T16:15:30.487000 @@ -228550,6 +228550,7 @@ CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3b CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000 CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000 CVE-2023-35893,0,0,3e1a9f843ae6516de41665b3a634658c0fb6fc2675d275c8b872f9f02eb5402c,2024-11-21T08:08:56.353000 +CVE-2023-35894,1,1,a0066b5bc2c9df5623b63e3528082cca1fb9bede82debca48e7b807364324a8f,2025-03-07T17:15:17.897000 CVE-2023-35895,0,0,83ce1443b6655dab60e0c4caf8c50745fccee066f0b72d30b018dbb22010bc59,2024-11-21T08:08:56.503000 CVE-2023-35896,0,0,083027e8b7b9991862f226b808efa00e9c54a1aded5738c59c832ee7a839eaa3,2024-11-21T08:08:56.640000 CVE-2023-35897,0,0,4441d4b616892b6bf61b7f55516939aaa11e282b69fa205360a8598d1c288ddf,2024-11-21T08:08:56.773000 @@ -234301,6 +234302,7 @@ CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651 CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000 CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000 CVE-2023-43051,0,0,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000 +CVE-2023-43052,1,1,a0caf5bb58a6bd916fd9e96049098647f2de2177d4d3aeca18bc0d905d802889,2025-03-07T17:15:18.060000 CVE-2023-43054,0,0,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000 CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000 CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000 @@ -244483,7 +244485,7 @@ CVE-2024-10261,0,0,6398f8d67bdd17ab366f9416d4ddf7ff0254d493e1fa2fab241a87e725ac9 CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000 CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000 CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000 -CVE-2024-10266,0,1,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000 +CVE-2024-10266,0,0,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000 CVE-2024-10268,0,0,d0402bfb3091ce685faa51f2c4c40b45ff8d34a58666307c0eb05cdde79cb95c,2025-01-17T14:57:54.120000 CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf733,2024-11-13T17:59:27.717000 CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000 @@ -246854,7 +246856,7 @@ CVE-2024-12833,0,0,677c1333060f073d8c9581aaa17178e60be70e85d81a38adf3dadf4f16429 CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000 CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08 CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000 -CVE-2024-12837,0,1,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000 +CVE-2024-12837,0,0,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000 CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585ebbdd,2024-12-31T02:15:05.877000 CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 @@ -246971,6 +246973,7 @@ CVE-2024-12968,0,0,352f3215ed40719a7a3c8fe635fe1584f3733d062304c5ff3d490633f3693 CVE-2024-12969,0,0,96938b98061df41a07f7d7458298190ea191c6a72f4ab846d1adca80ab0a48d2,2024-12-27T17:15:07.993000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 +CVE-2024-12975,1,1,c4a1b95614dddf14b5cbc9cdad494c24e3786480fbc262a6470a7a2af3e1b9db,2025-03-07T17:15:18.263000 CVE-2024-12976,0,0,a7896141b08b975c59cc02fb56de4b5b8fb1f07cc8194762ff5a1f544ab3be60,2024-12-27T19:15:08 CVE-2024-12977,0,0,a3d393b71af82518afafbd1c679660f25331ee3d2ea0704ebcda5ffbe8610a8d,2024-12-27T19:15:08.130000 CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000 @@ -247079,6 +247082,7 @@ CVE-2024-13082,0,0,dd86cc2dbd0bc89ca24f8652438ba65c25dacf6f914e34b241ffb1d5cb882 CVE-2024-13083,0,0,9baf862c4a01e16469f726f0f2436d28244783672ca85ea8f1f89819371703f3,2025-01-06T14:45:40.307000 CVE-2024-13084,0,0,f2c72f4c09d45c5cd33a8dc82e8e6f76fce41bba98f78ae1d6ecedd64730d79d,2025-01-06T14:44:57.910000 CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40fedb,2025-01-06T14:43:13.437000 +CVE-2024-13086,1,1,1efbd7c3b567f211462158c13680e0e7f13169a058f6b87b5c7b05a0756ba0cc,2025-03-07T17:15:18.430000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,a29686b1694224a9f1b539d3106df56569cbff4d775b5a640a3744ebfbd486b2,2025-01-06T21:15:14.273000 @@ -252851,7 +252855,7 @@ CVE-2024-25735,0,0,9fdea3ad6de7f4f83bd747335b88ba4bc80cbb63cb46a203f3f828d80e36a CVE-2024-25736,0,0,831650ee2b289fa09d115f05113a0521c5f85fe00e3f4a57b362a744d6e20323,2024-11-21T09:01:18.197000 CVE-2024-25737,0,0,4bf6de89cebe09aa2368df8de50a16d59403650b4e336a34b7d2536eee9a53ba,2024-11-21T09:01:18.417000 CVE-2024-25738,0,0,104f8fb5616d4b0fc4a70325425b561419d44b0dc6df45cc5ada7cb95d562c2f,2024-11-21T09:01:18.627000 -CVE-2024-25739,0,0,3c706a17add34350e9cf827e766f3bbf1b14a8aa3ef17092c57f8fb63d79383b,2024-11-21T09:01:18.840000 +CVE-2024-25739,0,1,c1fda310465c653b2915c0b7e5dfad87965080e10aad84c2518d6d00c6114175,2025-03-07T18:15:39.947000 CVE-2024-2574,0,0,42ab3d86f020fc690af2a2e85cb665f1d9747c0eafe41f89be4b8b85e352c03d,2025-02-20T18:10:50.230000 CVE-2024-25740,0,0,d6d3c8770d2c76a0fc3555da9c432136eb7575e28d8f6e4a82b40609ff87844a,2024-11-21T09:01:18.993000 CVE-2024-25741,0,0,1d23ef34ccb35d014111342476db8a5b6563966ba18b74c74ec859aa07028c90,2024-11-21T09:01:19.140000 @@ -253655,7 +253659,7 @@ CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe CVE-2024-26764,0,0,182584c1b22dec918cc3c58a7bf9ff6e42e4473d6f7b976355d13ff4ba65cc27,2024-11-21T09:03:01.100000 CVE-2024-26765,0,0,86639deee47c82199c185bbb9e529948404a232a3b8d78621e9c695bf46ea544,2024-11-21T09:03:01.213000 CVE-2024-26766,0,0,f8d8707040c45d2d4a25e3df9b45f731ca8a389770a89c102e506c6842929d2f,2025-02-27T21:59:09.400000 -CVE-2024-26767,0,0,3e5c80746b7511c9f6aeb36b1c8b59eb41a7b9be4ad7426cc19cb790b7c56f61,2025-02-27T14:34:43.180000 +CVE-2024-26767,0,1,5772b82c429246618f54341350bcba6909fc1b320104e1434b760823236efcdb,2025-03-07T18:15:40.147000 CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000 CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000 CVE-2024-2677,0,0,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095fea,2025-02-21T16:16:38.053000 @@ -253892,7 +253896,7 @@ CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709 CVE-2024-2698,0,0,92caf5de1a4db3d2766017db2b8c2c83c4ffe4ed3a628a64f14163835fb45ff5,2024-11-24T17:15:04.170000 CVE-2024-26980,0,0,c664518d666b8dc60398076a7315aa316908c8287d246e166912ba77399e9ec0,2024-11-21T09:03:32.600000 CVE-2024-26981,0,0,e3d85d4378a3dedaa0ea4ee82c134e38e306ef680bd7e72d630d02192612620c,2024-12-23T20:42:57.277000 -CVE-2024-26982,0,0,99e3484c80d4819e68a803f586d0923fc70637779d8a9d041c3ed758ec197b84,2024-11-21T09:03:32.917000 +CVE-2024-26982,0,1,d14028f4f107c9606f85706a913319b8bfeb59fe440b365c959c15681df88ff9,2025-03-07T18:15:40.423000 CVE-2024-26983,0,0,668befa1524b84eb804e032a2857d5c5316ec13983095bd9d2f5e231c1910c36,2024-12-23T14:53:02.043000 CVE-2024-26984,0,0,d5fba52a36226feb49bb95128fa870f8c609ab762c84661aa0776867387cbc6c,2024-11-21T09:03:33.177000 CVE-2024-26985,0,0,828c1d0fb4c1394a0226e133cac1cf8633b8aef9bacbe1c0d4677aeab25a0507,2024-11-21T09:03:33.427000 @@ -255510,7 +255514,7 @@ CVE-2024-29075,0,0,c54939fdf2711f44320d1fc65a243f37f96762abe83d15bb484ae46355a45 CVE-2024-29076,0,0,3322157c3e4d7c4ea336c6ec7e6b71fce636a644cfd118399c650de884afd218,2024-11-15T14:00:09.720000 CVE-2024-29077,0,0,9515ec8469d3e60fa9b1d5cb6e10f297f2055104bc59b61ad071a5618ed7c4a8,2024-11-15T14:00:09.720000 CVE-2024-29078,0,0,3768ba713f72f2f684f19527702d5f143dab089741d088ff15b26b44c84d8755,2024-11-21T09:07:30.583000 -CVE-2024-29079,0,0,482d971e19d4d4bfb6c183b3b01adbf378927853a1ec5a4c3b985f309db7612b,2024-11-15T14:00:09.720000 +CVE-2024-29079,0,1,4a9d90aa930cb8796b57db900247f0ddac7ad20fa7c538100c5ccaf7dcc7a116,2025-03-07T16:48:11.150000 CVE-2024-2908,0,0,0f897bf0ecb82f969317f5289095fed1d55005c4541e36f10c7884c67015bd9f,2024-11-21T09:10:48.650000 CVE-2024-29080,0,0,82b257cc34f2d47570a26c77d23ec313af395c66d00eb161eb280d2ae50d1a45,2024-11-21T09:07:30.820000 CVE-2024-29082,0,0,e898b9c196187a95c2e78cea8d6fd4eae6c65b2d1e98c42a8b9e23f327d118eb,2024-08-20T17:11:31.787000 @@ -257999,7 +258003,7 @@ CVE-2024-32481,0,0,04e9af9bf4e958551ff5b9ab44674cfd14049e81d175c17656409aed3c42b CVE-2024-32482,0,0,522b777247914831e62e413386cb4671fbd87cce86fa96f638265994ccb940e0,2024-11-21T09:15:00.140000 CVE-2024-32483,0,0,b30d6e0a3706a53dcfe036dfdf50108c32320dc8f8de91e271a9318984dbe9f5,2024-11-15T14:00:09.720000 CVE-2024-32484,0,0,7896b2cfd633e1dc14fe53779f321e78cba2d01b173f70e24cc07a477ecc39d0,2024-11-21T09:15:00.430000 -CVE-2024-32485,0,0,32b9e8068a8ede9bfc4e1790ee1b5b7fd39c8615e906f1b9bae4b90d4fb9fd74,2024-11-15T14:00:09.720000 +CVE-2024-32485,0,1,df9e49e166288465942b1938c6f42a6bed8cb07a5dc47a877c97a21555e19edf,2025-03-07T16:48:11.150000 CVE-2024-32487,0,0,740bfb2b93fa2adf41f7a285c565b0d800696203d50b3829c2ab3e82d867a22e,2024-11-21T09:15:00.647000 CVE-2024-32488,0,0,2f484005a13a4aed3193e91e8fdda1bd74b6aee19d2af8f4b5e430f9104402a0,2024-11-21T09:15:00.873000 CVE-2024-32489,0,0,bff0362e336c6b4218d6a194c573710c58986e44dcf72d3acc17da6dae0ef4ce,2024-11-21T09:15:01.137000 @@ -258780,12 +258784,12 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000 CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000 -CVE-2024-33489,0,1,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000 +CVE-2024-33489,0,0,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000 CVE-2024-3349,0,0,77627706952ed9b21bd8fe86802e39c3a79b47bff5aa5a4099e6b50f2da27242,2025-02-11T14:43:45.883000 -CVE-2024-33490,0,1,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000 -CVE-2024-33491,0,1,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000 -CVE-2024-33492,0,1,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000 -CVE-2024-33493,0,1,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000 +CVE-2024-33490,0,0,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000 +CVE-2024-33491,0,0,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000 +CVE-2024-33492,0,0,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000 +CVE-2024-33493,0,0,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000 CVE-2024-33494,0,0,59f5d90daeffa43cbbfaba78c93fa678a165d69a45e730b3cc8593deb34df95b,2024-11-21T09:17:01.577000 CVE-2024-33495,0,0,57b81efae96a7f5a9931902412b22bf475f5cadbad96517560fbcc807d2b75f3,2024-11-21T09:17:01.720000 CVE-2024-33496,0,0,3e0339b75603b80172a8dd08f9727b029d985209c64e779cc52c646d8e6027ce,2024-11-21T09:17:01.867000 @@ -259861,9 +259865,9 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000 CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000 CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000 -CVE-2024-34771,0,1,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000 -CVE-2024-34772,0,1,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000 -CVE-2024-34773,0,1,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000 +CVE-2024-34771,0,0,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000 +CVE-2024-34772,0,0,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000 +CVE-2024-34773,0,0,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000 CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000 CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210544,2024-11-21T09:19:22.627000 CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000 @@ -261515,9 +261519,9 @@ CVE-2024-3698,0,0,12147dc3bb2f5a1fc18fded0f33005cb94125941e45c1ded7e56b93ab8c7f4 CVE-2024-36980,0,0,089f8099ecabd03482da3a8897aab642ab783b7442198cf7a4c02463e209b50a,2024-09-26T20:53:57.597000 CVE-2024-36981,0,0,4ef7db0d01c8ae7f95bdcef9bc0bd36c40a986a629272624fe257c629fcdfd83,2024-09-26T20:55:39.783000 CVE-2024-36982,0,0,cc4a220fdd8a42e8aad7f2c8c8b02865c677b908a7047d3d5f217be9bc0ea725,2024-11-21T09:22:58.247000 -CVE-2024-36983,0,0,eb53b4f036eea81efe9607e22c368523abeefdc5c91f56072e8871da6f6ffb60,2024-11-21T09:22:58.390000 -CVE-2024-36984,0,0,ddabae24e3a6e47af4ad0814cdd5ebd069ab1f064a67b99cabd771e38f7aaa53,2024-11-21T09:22:58.517000 -CVE-2024-36985,0,0,01ed38568e0bb1c3d1a271aa1d6f71c0a86e801d836e9314e8bf15cfea88ab71,2024-11-21T09:22:58.640000 +CVE-2024-36983,0,1,7c327280de13c56faa0c86514b9c86ea1b680859b5d05011bb5a5bdb5f850428,2025-03-07T16:48:11.150000 +CVE-2024-36984,0,1,aadd2a0956da4c042f95ddb67cc43ff3cbcbb80f03933838e51074d950166f19,2025-03-07T16:48:11.150000 +CVE-2024-36985,0,1,b555ff5bac11a1d59d4c6dd9b65f1f5635248d92bd480b602f510a0f44720c7e,2025-03-07T16:48:11.150000 CVE-2024-36986,0,0,6171be6e726f563ccaa9f4e95f354cbb3f398a584112b7c348b97cc1f2873e12,2024-11-21T09:22:58.763000 CVE-2024-36987,0,0,2a177ddfb0ad1ed8451058008e2f729ba11b7a19f464c2d679b71cf8d8cb6f78,2024-11-21T09:22:58.897000 CVE-2024-36989,0,0,12e451674a72a486cf884a3b99bb279fbbbdec54b7e8608f5263c20d98ef01b3,2024-11-21T09:22:59.027000 @@ -261529,7 +261533,7 @@ CVE-2024-36993,0,0,42d720890d3b45924e92f33bc5db1ad66de8be2f7e6bc7f669a295af42dbe CVE-2024-36994,0,0,6ae6427754234d6ed256fc2331a8aa393d98984850d7174f5f368ebaf97165a5,2024-11-21T09:22:59.757000 CVE-2024-36995,0,0,73cd553f65536ac335f1c0746a6d405c1387e249d311b60b01b74411ff471384,2024-11-21T09:22:59.907000 CVE-2024-36996,0,0,59bb280a47ec504c1079da292d01df99037a869afd9838585b9a937a0dfbe247,2024-11-21T09:23:00.057000 -CVE-2024-36997,0,0,d16bf8b387fe3b9d665adcd4b222a22e88b0512aa442c11d99217d1cc1ac56c9,2024-11-21T09:23:00.207000 +CVE-2024-36997,0,1,5e61d0747434495a6647e49703498b4551b63571e73048415e98cdde987e8673,2025-03-07T16:48:11.150000 CVE-2024-36999,0,0,0ac26c45718774a5aac17dfd03fb5764d9aedbf616fce220cbaca06163c9bf91,2025-02-10T21:15:18.677000 CVE-2024-3700,0,0,aa45601f8be27c755b4915734976ba5d62a48c50c90edbc080613b6a4f600cee,2024-11-21T09:30:12.350000 CVE-2024-37000,0,0,f4c69baf3a5167528d99b97f298822f7b3831e8369b08557282b4a963e5e0dc2,2025-01-27T21:15:12.133000 @@ -261684,8 +261688,8 @@ CVE-2024-37154,0,0,79775441c2eac00a4330a7a5e5b73461a1a9196f77dbc6e682df7449a12cc CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d9094aa,2024-11-18T17:11:17.393000 CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000 CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000 -CVE-2024-37158,0,1,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000 -CVE-2024-37159,0,1,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000 +CVE-2024-37158,0,0,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000 +CVE-2024-37159,0,0,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000 CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000 CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000 CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000 @@ -263003,6 +263007,7 @@ CVE-2024-38634,0,0,069e9770c3e27677816270653e1104efb46dd73f59ad93690e8ad0f92b514 CVE-2024-38635,0,0,327ebe255f111748ccc3b39969e4e0cbc6b66d5c4259fae8aea4b849153a6587,2024-11-21T09:26:32.623000 CVE-2024-38636,0,0,0524f90fd2a47148b005b80306d9bc52fc1e23ffb39b5d42f99dd3c39ac72c23,2024-11-21T09:26:32.753000 CVE-2024-38637,0,0,b09e5d9967b78fc753bcb8611d452d07bb4d9e6be77cb0ab61cf099df2c19451,2024-11-21T09:26:32.887000 +CVE-2024-38638,1,1,fb084aadd03358ef51bf581c7a9dca0e01b9b93b119c668eb38a6b4a9aad9160,2025-03-07T17:15:18.707000 CVE-2024-3864,0,0,3271dcbd9974a4b6eba4e5f89efcb4e2480b28b6cb831e16674df7deca2899fc,2024-11-21T09:30:35.093000 CVE-2024-38640,0,0,99476650ee793e5ea6ecd4c44c7e3c5e951d6acda74411920c56ad884fc79c1c,2024-09-16T12:27:22.747000 CVE-2024-38641,0,0,4f90c85b92940ff2ac351ca39686e5704a699044d9908e513f2b89f705d8204b,2024-09-16T12:35:23.713000 @@ -263074,7 +263079,7 @@ CVE-2024-38701,0,0,ab53804bd7f862443190673e1ab00a59d838aebb91b605e2e7d23b18eecde CVE-2024-38702,0,0,3c4ba50317487924492ca168213a6ee8861658b1d8d73d68f67a1a5b824fdd0e,2024-11-01T20:24:53.730000 CVE-2024-38703,0,0,9f71f0f66667eee4520111e7a817856cbe4d6451b74cfba72f2fc8a8035bfc74,2024-11-21T09:26:39.793000 CVE-2024-38704,0,0,6d591c3940acd82eb3086f3502463b71238833bc6dbf15a99e173863eacb12f6,2024-11-21T09:26:39.920000 -CVE-2024-38705,0,0,2e6fa924bb5a44b6a89df1e9f147b9f7b1bcdfec97187c47f022b257e9fc1d3a,2024-11-21T09:26:40.053000 +CVE-2024-38705,0,1,7191feb6eaf480e8e6eb550f5f5e32f4856c4cf833ff627401b0e3864b0665d4,2025-03-07T16:48:11.150000 CVE-2024-38706,0,0,c793ed8b05a090829196219a03d730391cc7aba0d3d23364466dd55abd11ba86,2025-02-05T15:19:38.287000 CVE-2024-38707,0,0,d25d2c2c7d62aacc0617f006ea134a5267f10e5cde18b065e9091e448d5d2e62,2024-11-01T20:24:53.730000 CVE-2024-38708,0,0,83a10221309c2fcddbeb73d8601ccc5f941fc01f69e9577d48e2e4f826bcf18e,2024-11-21T09:26:40.387000 @@ -263831,7 +263836,7 @@ CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138 CVE-2024-39693,0,0,2a0c67223a67a4cd6565b19d41f2906bca2653f8f96542a5b62429b6479c76d0,2024-11-21T09:28:14.067000 CVE-2024-39694,0,0,b33f1bc6cdf86d31af1545130725483f2391aa4c76f60be75b33572bad66ef8f,2024-08-01T12:42:36.933000 CVE-2024-39695,0,0,4c6a4448c06a4c8d6ff6c2304228798d4d4aaab51edb52346088ef9cd9927593,2024-11-21T09:28:14.270000 -CVE-2024-39696,0,1,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000 +CVE-2024-39696,0,0,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000 CVE-2024-39697,0,0,f3a7cdaaf41d6cf05c77fea55d7ff9924821768d6a8fc884c5523aed59207e8a,2024-11-21T09:28:14.540000 CVE-2024-39698,0,0,118caf2e6cd58e2f99a9fe181f4d1112f02ddf5bbdd7ff18cf94ce3936612acc,2024-11-21T09:28:14.690000 CVE-2024-39699,0,0,09c189588d9dd611b59094ba3bc24c1b4e450d4d41ea906404b5a63c4aa31b07,2024-11-21T09:28:14.827000 @@ -264614,7 +264619,7 @@ CVE-2024-4097,0,0,028ac85c723d578a83d0df3ee04b5f87b583751d336fa4736a761030481871 CVE-2024-40970,0,0,8898c4049fa14396e223dbd774a10ef0716916d7e318a3cdb9e8a5d50ee417bd,2024-11-21T09:31:58.550000 CVE-2024-40971,0,0,604d56931c3387a7fa332d2b88d504a7175928f4e84d73064a010be7e73550e5,2024-11-21T09:31:58.680000 CVE-2024-40972,0,0,d7fd09a5c425015a6740d8f1abebe58d7bfcaf5db2c8d1774ec7d74d0dfdb64b,2025-02-03T15:43:00.767000 -CVE-2024-40973,0,0,6294b18460ef7514ce928be54d821826732b56b0e5313e7c7b2fbf639665332b,2024-11-21T09:31:58.917000 +CVE-2024-40973,0,1,4f11562d6cc2a837e14cf106b956dc0c08293e2d2fe3a28fc7b89b61ae29f009,2025-03-07T18:15:40.783000 CVE-2024-40974,0,0,b6a51bc421f4858319d1d11b535e9f0c7c1e0cc032cbf31bdaa70aca77cf9b0d,2024-11-21T09:31:59.047000 CVE-2024-40975,0,0,c95634b99ac5de870c313480d060cfdc3b3cfad72080543bf85013daecfbc46e,2024-12-09T13:10:01.607000 CVE-2024-40976,0,0,9d6f95cbcd7cc30b63959e63e7cf081c28a7c5898438c1286ef736954c419546,2024-11-21T09:31:59.313000 @@ -266217,7 +266222,7 @@ CVE-2024-4313,0,0,7d942770a1a4dc49c5d51e9696d69566959c4a585714bdbe873813ae04ebf9 CVE-2024-43130,0,0,1e591c9775a6b821f95179556691b7dbf7fca248e7b7a0986bc948da7925664a,2024-08-13T12:58:25.437000 CVE-2024-43131,0,0,a79ea17d741ce6c2427f437a6617d744634b4ab5c4d8cb1114509eab166bbb0a,2024-08-13T12:58:25.437000 CVE-2024-43132,0,0,a7e41eb29c7b0038ae266f989e98ee8056ba3594c845a171ae27ce35413128c9,2024-09-13T21:07:55.330000 -CVE-2024-43133,0,0,e41ce36fae7cc63e1e6e10348b9718e55cc92c6a030f6e29dbf11844e381a1bc,2024-08-13T12:58:25.437000 +CVE-2024-43133,0,1,0b22a5961055d89cc8b6547c5a82d2e424b8939dd8490aba085486c3c97804cd,2025-03-07T16:48:11.150000 CVE-2024-43134,0,0,e697a5405745c13967c582276615fed22c7922a3bed422fc074db4155fec68f1,2024-11-01T20:24:53.730000 CVE-2024-43135,0,0,a0469d70766a9d4d4a709a18b34213e7343b06f9f8a4b5b19c9b4341aa7968ba,2024-09-12T21:18:15.773000 CVE-2024-43136,0,0,1582518c745838c877399638da3c98ad2cdac482e1c2cf80f200ccc232862960,2024-11-01T20:24:53.730000 @@ -267594,7 +267599,7 @@ CVE-2024-4495,0,0,6e709f9ace414769d9cc3ea8289e9243ed8a2c8061b26956dc3b3654ccc408 CVE-2024-44950,0,0,27e2180bd27b63f0d75864bb94426d70ed574ad49ccac5abe47c96450a1c2433,2024-12-14T21:15:24.140000 CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000 CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000 -CVE-2024-44953,0,0,4dded2bb37acfb6eff4acd77c8806d5d13ef508d26de37379bffc5ecd90fdbbd,2024-09-06T16:37:33.650000 +CVE-2024-44953,0,1,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000 CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000 CVE-2024-44955,0,0,2bc6b0d941fdfccf3c93972ebd5efd5058cb7c721673095ebdd7739bcf15a6cb,2024-12-09T13:10:03.600000 CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000 @@ -267915,8 +267920,8 @@ CVE-2024-45289,0,0,d31a3e4a36b107e8a8e404759b2708654eea754f2b61637eee7237099c255 CVE-2024-4529,0,0,19a4b561c0dfb2c4c5ee51c74d6ef4dd1802fbdec551260281d22055a8f00c6b,2024-11-21T09:43:02.493000 CVE-2024-45290,0,0,5fec04f279aa2b7bef2db505872b58e2ca6543c1d2f496f9632044c158031133,2024-10-16T19:54:53.397000 CVE-2024-45291,0,0,db9f913cc87f43195dd179b7bba5ebd58dd0cc5f21f21ba4f27ee72528ead67f,2024-10-16T19:09:52.697000 -CVE-2024-45292,0,0,4bbbea9efaef28cba408c6ba944bc233f9f2c92b0520b2d3dae5e889f91e038a,2024-10-10T12:57:21.987000 -CVE-2024-45293,0,0,d3d493d8f8cb34c8eb46baece93bb38ae502ffd95bfac3aab404a1304b9ee887,2024-10-10T12:57:21.987000 +CVE-2024-45292,0,1,3f56d87a1522c0674da82db13d85b4bb359599e41f46a9bce86cdfc34925b5d6,2025-03-07T16:48:11.150000 +CVE-2024-45293,0,1,0cc74a1d1c1b8456f24111e1b0cd98af3c5c52264be47db7d739ba825d01b614,2025-03-07T16:48:11.150000 CVE-2024-45294,0,0,c892336db6e97945729784698a30c4434775db08a35a5ad837741c623dcd4529,2024-09-06T17:15:16.977000 CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 CVE-2024-45296,0,0,486e7f952c7eaae5bc2a0d9b313f98272bcfc325a472d908193b2678eaa8854c,2025-01-24T20:15:32.680000 @@ -269567,7 +269572,7 @@ CVE-2024-47627,0,0,eac568ce436a3c1e102e5798cb9b7d1795efa5c186cda626629d9650036a4 CVE-2024-47628,0,0,9d16ab34229dc7bdccc3dd2d0ef807eebf1526c12b182e2b7d23a0067ade62dd,2024-10-07T17:47:48.410000 CVE-2024-47629,0,0,6009b1526d22693480b805802e3e602ff608254d5b6838fb0f05645a5caf41c7,2024-10-07T17:47:48.410000 CVE-2024-4763,0,0,d9796f072cf5e3c46cb27da90b305b960b1393d62677a8f197641fe0723c5aac,2024-08-19T13:00:23.117000 -CVE-2024-47630,0,0,f20fe5ed2fdb81ffd8034059037fdb3d1da00dd04bc1b25c67896f4b0d35d591,2024-10-07T17:47:48.410000 +CVE-2024-47630,0,1,6688a3e4d3d19abab9a907fcdcde7eb4c19983229d4564f138664ae41c15471d,2025-03-07T16:48:11.150000 CVE-2024-47631,0,0,fc0671434abf129fe4a07da97f07fda78db508487080c3e74ad908ca721c023d,2024-10-07T17:47:48.410000 CVE-2024-47632,0,0,836cbbbcdecb032969ab43cb200ee2d9e9f527b4559baf95003ce2243541d560,2024-10-07T17:47:48.410000 CVE-2024-47633,0,0,b0928e299bfedbee2cda8ee029fcd82fb0924d77e9ef1fe1ac6c1b7e2fc89853,2024-10-07T17:47:48.410000 @@ -269703,7 +269708,7 @@ CVE-2024-47750,0,0,77c938e831fc298a4864be73d8faa815c5ecd1e1f7df019cd77676d105ec7 CVE-2024-47751,0,0,376896741f561252675c3b7f5567e8d9710d560baa434f67f31cd19bc85f698c,2024-10-23T17:33:52.440000 CVE-2024-47752,0,0,918cca47f4cabc53f1ef5f2243c96b36643fd61acaf3b0419e24062a34c5efee,2024-10-22T16:11:09.037000 CVE-2024-47753,0,0,bfd9a232a5f64bf53f2572bd574cad3ddaf8e02c73855ec0c1535a7e51c101f7,2024-10-22T16:10:40.380000 -CVE-2024-47754,0,0,15efe46b5acd24e6a048863fe4e659f9670882dda2e519b1e7e7ce2228e3bf0d,2024-10-22T16:10:21.907000 +CVE-2024-47754,0,1,edf7d3a667b4046cfc07e7f22040c75fc409488e9b68087ca879d42283b2affb,2025-03-07T18:15:41.160000 CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000 CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000 CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000 @@ -269806,7 +269811,7 @@ CVE-2024-4787,0,0,b7cc2ef631ed95f84e10cd73fd49ce38a2c2ecb8c447df5fbb2486dc5ffb36 CVE-2024-47870,0,0,9997eff64a8710817a7dcbc6ad59fedb1e7d5013abeaacff155b5c70fadb6cc1,2024-10-17T16:57:02.283000 CVE-2024-47871,0,0,c1f86b165ca70bde1db92973f4bfde4834cadf6700a886455612b2dde919ac98,2024-10-17T17:11:31.150000 CVE-2024-47872,0,0,e450eb43d077cdd12f4fb05ac26c70a02bba670db7b952b25f1ae77092a943ef,2024-10-17T16:54:34.383000 -CVE-2024-47873,0,0,e046b6930e39a494ea7f938419ec7450a28fab6911a5fe546c93b90a0d8e9486,2024-11-19T21:57:56.293000 +CVE-2024-47873,0,1,35587fced2f8a1cfc140a3ba143a74f0439640aa0d2d224444749f2e0102e5da,2025-03-07T16:48:11.150000 CVE-2024-47874,0,0,901c896d9499d8ec01c36bae77d3a309c31e148b996e907cd99ebd3207fbfb03,2024-11-21T17:15:17.990000 CVE-2024-47875,0,0,3327b34723dbb94d555f6a00e7b89ed291e8000417cf00e197a32e0c0c01d95d,2024-10-15T12:58:51.050000 CVE-2024-47876,0,0,aef469092b2ed3a37de28546014df59bbfedc9e07b86c5ad5df2edccfd6bd8aa,2024-11-21T17:15:18.227000 @@ -270301,6 +270306,7 @@ CVE-2024-48860,0,0,5019a6e5ad855b42ba7a0382529136c2e078d26be8e3341136aaeae311f54 CVE-2024-48861,0,0,f2e56e74772e56409fc2807a1473087052bb0f47a879527c35ea32b9a7cb30e9,2024-11-22T16:15:28.483000 CVE-2024-48862,0,0,34011f3d825da8e353de6ce07fcd70a7205f097b533b31757cbbc7381a7840b6,2024-11-22T16:15:28.623000 CVE-2024-48863,0,0,578a6f80749eb5a4d4232ec8ddda758d5aadd2e01991d40a39ced5ff791ab5f8,2024-12-06T17:15:08.533000 +CVE-2024-48864,1,1,33930bb5f90c6e24d85b46ba43ff76bd9ed4149008630a9769a32425f0567d79,2025-03-07T17:15:18.850000 CVE-2024-48865,0,0,247cc50c39d361aaec0dcad80786890e51d625f736d6b603da14a8203a55d7b5,2024-12-06T17:15:08.653000 CVE-2024-48866,0,0,723d77d7068b76827cfe6cdcef62bcad806888aec64cd00702023106e7b314bf,2024-12-06T17:15:08.800000 CVE-2024-48867,0,0,13129fdca7601277c3e567a9a828b6a10df15286823bb97275156f37dd622a7a,2024-12-06T17:15:08.940000 @@ -270343,7 +270349,7 @@ CVE-2024-48912,0,0,2bba8940b92e3253641c425098235f3e7518de3923b07dbd26d0ac61dd545 CVE-2024-48913,0,0,27febbef07f52d15082822a078467473fe159291b0acb1f4d5bbfdd00e1f7d37,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,06e6403f67b46df13be7d3307b268a340a7b5ecc4c110c41c7ad7a6e410813ce,2024-10-16T16:38:43.170000 CVE-2024-48915,0,0,22b831e4b76f3ff1bbf21dd69a4b74295f2c021ffd6565d2fbc637ebd54bb2d0,2024-11-21T17:15:20.387000 -CVE-2024-48917,0,0,1f86ead059500276c78b17cbe120360ead3484a8b53b48351179b6e8075ff832,2024-11-19T21:57:56.293000 +CVE-2024-48917,0,1,8aadd8407cd56abf96fe596e35986e1aed7a4dd7db0f5ef3b531963fff11bac3,2025-03-07T16:48:11.150000 CVE-2024-48918,0,0,cfae4446d62adc80a48f2ad18619403b9e405854ec4cb3c0b0fcd077c6f1add6,2024-10-18T12:53:04.627000 CVE-2024-48919,0,0,16efdb2b06ecb55d9885e13fd3da6695a4858f71e0605b88abf088c1c21e44e2,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,6afbad4df2bbec8e37756a6be046aab9281ae5b67f5cee15e3ed187ab73c9fa9,2024-11-21T09:43:48.390000 @@ -271295,7 +271301,7 @@ CVE-2024-50062,0,0,d50f044e8938707dae39384ec96cd77ececb8faa96071400b106a3c62189f CVE-2024-50063,0,0,3b5ab46f8320ec86decbfb8639e1b1e04d84924116cd0ee6210d300fde89b93d,2024-11-22T17:26:31.070000 CVE-2024-50064,0,0,2a0293833921e1332bfd350afcf732a34eb77b0abeb7f463e77d57b5bdb3f081,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,84caec01af79e694589460b1fd2d22181973d74a594b1014f17ab14d35b8559b,2024-11-20T20:07:01.320000 -CVE-2024-50066,0,0,5152114954b2ad4e8ec7b5c3a842d9a276a29bd9316bf6303fcd414599f10b2d,2024-11-25T15:15:07.570000 +CVE-2024-50066,0,1,f8cbeb952d27740648470cb34786d680aee0eb2b11c0988fbc6b4e4ca35c50e9,2025-03-07T17:15:18.990000 CVE-2024-50067,0,0,9104176565a799c30e4b5ab08e38eb10316f89060bebb875ebb360b27e4a0cc0,2024-12-11T15:15:10.943000 CVE-2024-50068,0,0,165746773322f9f91c4968723b044a9f5e9e5ffc592c2389d486be015509505a,2024-10-30T16:57:35.427000 CVE-2024-50069,0,0,1a3ff5e2e3c7d29ac1d15dff8ac05d381a9c14cbc1952960fbfe43f9fea6d99e,2024-10-30T16:58:19.983000 @@ -271641,7 +271647,9 @@ CVE-2024-50387,0,0,acfec5d4d4cc80fa5f6348d5ec56946ae7c6740c84044c594d2169b0248e1 CVE-2024-50388,0,0,ceaae89a7584b9dc450bb8edc74105b925067d554de9f0a5040b1238d634d613,2024-12-06T17:15:09.373000 CVE-2024-50389,0,0,63dd94c3355eb3b3a91e43e3e7656c4ce50024a7bbe4320fb7ef8cfba9d0187c,2024-12-06T17:15:09.510000 CVE-2024-5039,0,0,ca1a5b478adf545bef605821aa52dfdc080c393ef724b76b86d058944594ebdf,2024-11-21T09:46:50.100000 +CVE-2024-50390,1,1,ce917a41c0c8b5742b3d68e64479acb303dfd7a5742c49315f99fd3a209e9c05,2025-03-07T17:15:19.180000 CVE-2024-50393,0,0,ca657ca85a79d216d0254451add3fb18d94c238bddd9ad73bcfcbb175121b2e8,2024-12-06T17:15:09.637000 +CVE-2024-50394,1,1,4872132123299b87b7615918a5203592c67449af3d5e500763ed479755acce8a,2025-03-07T17:15:19.327000 CVE-2024-50395,0,0,a9ce7b3214bbae373a52ec1c7ed313fdc2a9cdee82d64882b0bdaf1203e223c8,2024-11-22T16:15:32.417000 CVE-2024-50396,0,0,4c0401f45da1156ccdcdf92aaf5d1c0a638cbdb1ba495db37a24b8dfe8cb7ddf,2024-11-22T16:15:32.540000 CVE-2024-50397,0,0,569cf2d0a93629e6552b4fdd82fb311970394a2b2fc90725a9defd0bb5b1ef0e,2024-11-22T16:15:32.700000 @@ -271653,6 +271661,7 @@ CVE-2024-50401,0,0,04e2ffb3123800a23312ebfe719d56ec98fa2857b5c8a044cd1d7d3d23bdd CVE-2024-50402,0,0,28472c7defbbac1b7ee91e0374b734ad9c07484f87a0834b751e8761f9fd2774,2024-12-06T17:15:09.757000 CVE-2024-50403,0,0,a4aa183b6f66c4ffb2fd1f183c9279ee43b63cdcaf8bd051b52907975e4618c5,2024-12-06T17:15:09.900000 CVE-2024-50404,0,0,b5b2cf7f4bf1d6f93ea84548591911fd77b0383a18caa9c4b41e9f2a677f47b0,2024-12-06T17:15:10.043000 +CVE-2024-50405,1,1,b6c1851e75be0d40c8a7dc0a4486c6f42b40df7ed00c60588d6d5369c6f004d6,2025-03-07T18:15:41.860000 CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000 CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000 CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000 @@ -271848,7 +271857,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000 CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000 -CVE-2024-50600,0,1,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000 +CVE-2024-50600,0,0,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000 @@ -273454,7 +273463,7 @@ CVE-2024-5305,0,0,37acecdce381251b4cf8d54680a176668d6b3042c421ee215ace13103ef148 CVE-2024-53050,0,0,df6b1c1016049cbc511c8b398cb2977c96026e0cd49f48682799d74d7cec0bfc,2024-11-20T16:17:12.003000 CVE-2024-53051,0,0,7bce6750344e15670478c9634ff864d215bae73a5591d86df30f0e74940d9128,2024-11-20T16:16:15.217000 CVE-2024-53052,0,0,f31738c767ce7baf113b651a03cbc6b38394a89a9d81a5ec6a6eac9e76fe85fc,2024-11-22T17:08:07.560000 -CVE-2024-53053,0,0,8df42326d26038cc637648740f856a1650c6e80e4e422314078ed2b335523fa4,2024-11-22T17:09:28.773000 +CVE-2024-53053,0,1,00053a3b7a0ffb584e8e635f0dcb3d1f0c0ec532322ef8f44c2d41c2da1d31d9,2025-03-07T18:15:42.883000 CVE-2024-53054,0,0,cf02ae7016d759ad466bd88de5cb08bce1aa8d7fd0df4ecdba05b4b1db2f1123,2024-11-28T17:15:48.820000 CVE-2024-53055,0,0,bdd2e409b84d1a5d2e2b4cf3650bbb080f228be966d252bdce6ddbd4360cd02c,2024-11-22T17:18:33.563000 CVE-2024-53056,0,0,ae5d112fd3aea822f75e2eb7364bd3e220e1ab500a2b5942a4ede94a922319d9,2024-11-22T17:55:51.830000 @@ -273469,7 +273478,7 @@ CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3 CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000 CVE-2024-53065,0,0,c5c6de1dc34956135702b6505991c2e7ff92bc704a59b87713633a300daa61a4,2024-11-25T21:04:38.343000 CVE-2024-53066,0,0,0c86d7ce5fb53df5464e6f073cc19a2aa67ae25292a1f6583a1478ef90016ea3,2024-11-25T21:03:09.620000 -CVE-2024-53067,0,0,d8942bf1aa909e21d0b48cd870079e0183034b36b3a36833f5334c885e8856cb,2024-11-25T21:00:06.237000 +CVE-2024-53067,0,1,53449440d4d3a5506538aa7c05924a7362ce8c674e9a82ba91662a5e4ff45db1,2025-03-07T18:15:43.577000 CVE-2024-53068,0,0,d5cdc1fd5d7fb0c7952a4dc84ce274e8dc2accbd15fa1ffb9e28901e55263200,2025-03-06T17:15:19.957000 CVE-2024-53069,0,0,2f8d2bb328ae06bfbd9a5aaf3e45bed4d90c0f43106ef8f4e009f680b4cec49c,2024-11-22T22:26:20.310000 CVE-2024-5307,0,0,5865308c4abde936d7b931374475ba3a6f8b899b5f443fa0d8a4411dbf222652,2024-11-21T09:47:24.087000 @@ -273577,7 +273586,7 @@ CVE-2024-53162,0,0,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c CVE-2024-53163,0,0,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000 CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 CVE-2024-53165,0,0,a4943f78f99297463146bf300537cb48a621a1dff9c540e1bec71a9d3b2949f4,2025-02-11T16:15:40.500000 -CVE-2024-53166,0,0,6b47b227a3c2839f79bbaeaa4f5e16e222ce5bbd89cad0bd429474bf1b6f91e1,2025-02-10T18:15:26.717000 +CVE-2024-53166,0,1,df1e2e2134692327c93f8c4b149b3eee4d7945b0cf559d41ecd431fd06521650,2025-03-07T18:15:43.973000 CVE-2024-53167,0,0,cb8147677dfafa0aff01cf4cd8a22b9d4f82e5ca11b808b017228795731965bc,2024-12-27T14:15:23.820000 CVE-2024-53168,0,0,2322d9bd473d53a376f45fd30f738149c190f220f68b45bc44ac680f0a0c5524,2025-02-10T18:15:26.970000 CVE-2024-53169,0,0,7a8f616983e90fab9da24cf74210604a973474b01aef0abb6badfb91bb61b143,2024-12-27T14:15:24.057000 @@ -273855,7 +273864,16 @@ CVE-2024-53689,0,0,c81052a2201a68b7784830dc72b4df307cc1b4bee2584137846b27671588c CVE-2024-5369,0,0,24094569c799eff834c0b09794b73b042353fa6c4475620088d57da4d7d9ef43,2025-02-11T18:32:18.170000 CVE-2024-53690,0,0,145186003a2e20e895b910273e087e978c037a99e9a7d237f6c4661d59d1c9b5,2025-01-11T13:15:26.470000 CVE-2024-53691,0,0,513214eab0c91d88abf946e0543867be43ef7fb949d65585eb405e446f16c6c2,2024-12-06T17:15:10.520000 +CVE-2024-53692,1,1,e7b6f0970a68b26db0edb8f623e79303c70b7589422e45e9d85c96c3949c62df,2025-03-07T17:15:19.703000 +CVE-2024-53693,1,1,0c8b7c773ea858406726c78a3d643e11d705a85e394747991a0f51091c0bc5d5,2025-03-07T17:15:19.910000 +CVE-2024-53694,1,1,19626d8a352cdab22dc038dc82445b5290c0ca2962cff9dafa77dfd6a231b3ac,2025-03-07T17:15:20.103000 +CVE-2024-53695,1,1,8b522a519c4717d288d8a651a0f4c0db9daa32ae9bd73b096cd7935386d2070d,2025-03-07T17:15:20.250000 +CVE-2024-53696,1,1,6f51ce388d9177df26464b4f423029fcf484ff4c6ef94b4d155aa8131f98f20c,2025-03-07T17:15:20.390000 +CVE-2024-53697,1,1,cbd46adf64c106369b53eeef07dc70a0dfbfa1280943490c25ccaaafbe9b1679,2025-03-07T17:15:20.527000 +CVE-2024-53698,1,1,62cb554bbecd0a67fb255273993343f08a20e5f208d736bd09f22377cfe6d762,2025-03-07T17:15:20.667000 +CVE-2024-53699,1,1,c0ac6652347d2429746f5776cf8a66bc4b483105f0360a5ff94485b6cfe2dac1,2025-03-07T17:15:20.813000 CVE-2024-5370,0,0,b1452cee20706ae85e99a41885590b1e78b1faa37e72d9c909063f8247e78007,2025-02-11T18:32:04.867000 +CVE-2024-53700,1,1,ab2019392ae9ca3e27540aec3c2e03403b33118a9bd8818e9277f924559af892,2025-03-07T17:15:20.957000 CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 @@ -275558,7 +275576,7 @@ CVE-2024-56618,0,0,24dc69f5038acb81c0d43fb548859cb5ae4a1aa14085271e2faac58cde3bf CVE-2024-56619,0,0,17b43a18083e10c744e7329bc0ede5e586834ec605148c351528783316bef618,2025-02-11T16:15:45.830000 CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000 CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000 -CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000 +CVE-2024-56621,0,1,9dc8625d157ca3689465a4d24b9a394084ecd0faa4a0ba0158776cdacf5ffdc8,2025-03-07T18:15:45.237000 CVE-2024-56622,0,0,90dd041f66ad97c8c7e4424d08636d2738bbe8a14292241e2b0155ecb704e99a,2025-01-14T15:45:40.167000 CVE-2024-56623,0,0,ea73f9992508782e28e0b2a30af559c0db5714a60552117a01fc21226146582d,2025-03-04T18:15:24.360000 CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000 @@ -275759,7 +275777,7 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3 CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000 CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000 -CVE-2024-5685,0,1,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000 +CVE-2024-5685,0,0,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000 CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 @@ -276332,19 +276350,19 @@ CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6 CVE-2024-57969,0,0,8a2052e46457143381617c41d784a01bcfd413646c5ba70b070b95c9aa759ff0,2025-02-14T07:15:32.340000 CVE-2024-57970,0,0,4db4cc3cdc42f255941d980da801a4e2e9f8b4ba6d1c25a10de778120606a2ba,2025-02-18T17:15:19.130000 CVE-2024-57971,0,0,19f9693c2a947ecc81adc9515f9451f49c9c0497b8a17c88b011da939c705fcc,2025-02-16T04:15:23.077000 -CVE-2024-57972,0,0,7dd207c51dc96d64f468230eb17b64271022770f03c36cdf21ceb6e2f3fa68da,2025-03-06T23:15:11.993000 +CVE-2024-57972,0,1,4fe45914cef442f475f299b5b8dde7bf05a99c90291481d796e9b55718630ff7,2025-03-07T18:15:45.673000 CVE-2024-57973,0,0,e36dc9fa64678728c73914207d5a8e86ee42e3f3a1717f446e674959249ee4fe,2025-02-27T02:15:10.490000 CVE-2024-57974,0,0,35099278a5a75222c052ac350d30ddc1388b2b90ab57d03eeba4eb4784ea8412,2025-02-27T02:15:10.590000 CVE-2024-57975,0,0,5b33132c3e0a596aa8c2f854f16c6756b27eb4a5de963161bb245dbc424d5acc,2025-02-27T02:15:10.687000 CVE-2024-57976,0,0,cd393dc40b8d12423e582db8f884621515bbb75c49217217a9b24bb6bbc79be5,2025-02-27T02:15:10.790000 -CVE-2024-57977,0,0,340c9d9f3586b17ef0c804662294da979a8f487352699035de550514b6c37f4d,2025-02-27T13:15:11.053000 +CVE-2024-57977,0,1,7762667a49c4712a83b3925e1c38afb659ab9b9a897f8ddfc93f62a4ee9c71f0,2025-03-07T18:15:45.997000 CVE-2024-57978,0,0,13850e6be331eb8920e3b1fa793d232603e7cba4948085d02e654385d67e18f4,2025-02-27T02:15:10.990000 CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b65646c3,2025-02-27T19:15:49.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-57980,0,0,10c77fb6a23488df204986089ebb05944e9c0539ba2e4d3b8fea5d9e62a33d18,2025-02-27T02:15:11.190000 CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000 -CVE-2024-57982,0,1,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000 -CVE-2024-57983,0,1,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000 +CVE-2024-57982,0,0,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000 +CVE-2024-57983,0,0,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000 CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000 CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000 CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000 @@ -276365,10 +276383,10 @@ CVE-2024-57999,0,0,192cd62115ee0eebfc0e3194a10d118c6cde7d7dffe718c35de3e7f488afc CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000 CVE-2024-58000,0,0,9bead4c6f4a6e6b0b3e4ccb9dcb95d8e89506cd6b149e93be860b24427528e09,2025-02-27T02:15:14.033000 CVE-2024-58001,0,0,062b95b71d62b8392e7dec859d235ae0235da3e946e47b40e89a8df2d660fc6c,2025-02-27T03:15:11.080000 -CVE-2024-58002,0,0,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000 +CVE-2024-58002,0,1,29cfe2a7ef092142b0779c922fa8565123f09a5865c52e691d5eb135f1e80a5c,2025-03-07T18:15:46.417000 CVE-2024-58003,0,0,d63162215e1a5dbdf2f26a3a80f9f12faed3d9c520fa6be1ac27c057f67243cd,2025-02-27T03:15:11.277000 CVE-2024-58004,0,0,68844712d1835a2f20b5302361ac491d98dd1a1f13907be2f39c078787a0c250,2025-02-27T03:15:11.380000 -CVE-2024-58005,0,0,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000 +CVE-2024-58005,0,1,dd8a054e5a1adae6fe62574360af2fd4fda6aa17a2196d019e7e8a84626e8220,2025-03-07T18:15:46.880000 CVE-2024-58006,0,0,99bcd7c70bad6c86d4a686c41e032b597709b74aa5784099886d83704a9dc686,2025-02-27T03:15:11.583000 CVE-2024-58007,0,0,67d1a33387f15c92a6fa64adac47eabb908d372f8ed57c978a5e97a65ff756f2,2025-03-07T12:30:28.963000 CVE-2024-58008,0,0,83bb44015382c711e9fe765b2c4558ae62041f53545addc939db33a1da1a9569,2025-02-27T03:15:11.780000 @@ -276431,7 +276449,7 @@ CVE-2024-58075,0,0,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8 CVE-2024-58076,0,0,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000 CVE-2024-58077,0,0,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000 CVE-2024-58078,0,0,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000 -CVE-2024-58079,0,0,579d9d645c94a89400ca687a17c00a8eeebf4813296e5c52f584eb6e27eeb15c,2025-03-06T17:15:21.360000 +CVE-2024-58079,0,1,0489bcb218c455f1fe45767363ca697b65c94ba3e6d21a28867c0f2c4f081c72,2025-03-07T18:15:47.040000 CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000 CVE-2024-58080,0,0,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000 CVE-2024-58081,0,0,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000 @@ -276920,8 +276938,8 @@ CVE-2024-6312,0,0,0c54128647e80712d90400a801d9880628c2b1741704a31bdedfcfd80d65d9 CVE-2024-6313,0,0,753b75f17a3f3ec57fe609d32a2c3aa9af71672c8858deefb2e7f96177c2545e,2024-11-21T09:49:24.717000 CVE-2024-6314,0,0,bd7e8659eda4fe06384f4f5f59a460bbcd88d9b591229c72a52e844ac7b92683,2024-11-21T09:49:24.830000 CVE-2024-6315,0,0,ef1ce4f4ba0131e5f3eff0f1603994118387c059d09ece1613d98d76d07a486a,2024-08-06T16:30:24.547000 -CVE-2024-6316,0,0,dd5a7dd268e619a2a79f0d5718ea91d75fbeba4b5152ec168f19761208d9caa9,2024-11-21T09:49:25.057000 -CVE-2024-6317,0,0,846f051ba490361012a7c77e289350543883b1aea51b3744cef7ebcf4b6a805a,2024-11-21T09:49:25.173000 +CVE-2024-6316,0,1,69192392c6338c8c254e87dc6cb05eac671f91e204156470f8709f599ad92392,2025-03-07T16:48:11.150000 +CVE-2024-6317,0,1,4e9bf276b111e8fe4e09ea1baea460f987704c5f04431089d0e65ac871f8848c,2025-03-07T16:48:11.150000 CVE-2024-6318,0,0,5f106f35b92dd631584d337f663b474255ddd50a7f1f8610056f45ebe6db8c5a,2024-11-21T09:49:25.283000 CVE-2024-6319,0,0,8b351291dae58ab1dd68bad56bbe84e03e46abfdf9784d16d4a3cf75ceba1734,2024-11-21T09:49:25.423000 CVE-2024-6320,0,0,b473609913519a737186d8d4224686486fd33ffcfab73ef05e3c3cf037998af4,2024-11-21T09:49:25.550000 @@ -279451,7 +279469,7 @@ CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8a CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000 CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000 CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000 -CVE-2024-9221,0,1,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000 +CVE-2024-9221,0,0,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000 CVE-2024-9222,0,0,a4a3a09199c7d8b09b4738998d8104dbe367bbcd208fb9266439d154c7f5ddaa,2024-10-08T15:34:13.250000 CVE-2024-9223,0,0,34caff13ef1092c98bf872963a60e7b0f874ac576cd17eef87075b656fb0164c,2024-11-23T04:15:10.037000 CVE-2024-9224,0,0,39d8d5cb3a7793ab0481956574ccd81167c7fcdc46c2c7fe36e709b73a8dce1c,2024-10-07T19:19:38.157000 @@ -279645,7 +279663,7 @@ CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84b CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000 CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000 CVE-2024-9457,0,0,237bf133deeeb6ce22bd7cb82b0da8d260edebfa1038d864508e5e70f23de04e,2024-10-15T14:23:57.307000 -CVE-2024-9458,0,1,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000 +CVE-2024-9458,0,0,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000 CVE-2024-9459,0,0,b5f8918700d9fe4520a35b012c84c07b7eef34f306e657c26f87c88066e73f05,2024-11-06T15:29:04.917000 CVE-2024-9460,0,0,a4133ee84221254d0c0b2ee042e3007266c6114612acf7d4db07e6602d682abe,2024-10-08T14:33:42.703000 CVE-2024-9461,0,0,7d9c91cbe544cc2689e175f532112ea98289124a3780c869e31650a971e49d9c,2024-11-26T14:15:22.533000 @@ -280162,6 +280180,7 @@ CVE-2025-0158,0,0,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc2 CVE-2025-0159,0,0,da072f8e2bfae3faad56b7993bdef58007c1768b134558714a537dfc9135c68d,2025-02-28T19:15:36.243000 CVE-2025-0160,0,0,56a2c0b88768866a06a1cafe52553211de3c4fe7f1bdd2a1b69e2c78efb329c1,2025-02-28T19:15:36.393000 CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000 +CVE-2025-0162,1,1,c98031bc8c519f3da09a456385ae46f1f328a956c39e6c9186405a6de7ba8344,2025-03-07T17:15:21.110000 CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000 CVE-2025-0168,0,0,a3bb306c5c1038cf3ae7cdc9fefc0119ef962391dad7848c675894c708a175c1,2025-02-25T21:26:07.113000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 @@ -280771,7 +280790,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4 CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000 CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000 CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000 -CVE-2025-1121,0,0,cc85dfaa58aa2a031948199f09d77c3f144cca76d8fe4709dc2255cf56107e73,2025-03-07T02:15:37.977000 +CVE-2025-1121,0,1,ec35ef5cdd68bac1ff15ee1e7299eb21916b54df11c1a13087054f4fb359a391,2025-03-07T18:15:47.253000 CVE-2025-1125,0,0,2f04992a8811506ffd86df04ce8fd4c4eaf818b2350c9b37d99c1e9008bb7d98,2025-03-05T21:15:19.707000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000 @@ -281358,7 +281377,7 @@ CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e8 CVE-2025-2085,0,0,191ae6560abe8476fe190d0474dcec83084d054bdfc1b3da1737410b52c6b5f9,2025-03-07T12:15:35.270000 CVE-2025-2086,0,0,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000 CVE-2025-2087,0,0,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000 -CVE-2025-2088,1,1,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000 +CVE-2025-2088,0,0,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000 CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000 @@ -281368,7 +281387,7 @@ CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0f CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000 CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000 CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000 -CVE-2025-2089,1,1,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000 +CVE-2025-2089,0,0,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000 CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000 CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000 CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000 @@ -281379,7 +281398,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9 CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000 CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000 CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000 -CVE-2025-2090,1,1,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000 +CVE-2025-2090,0,0,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000 CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 @@ -281605,7 +281624,7 @@ CVE-2025-21329,0,0,981c92b2418e9fc608fe5f0e4736606b39274ac7e94c0f92045bfd4fcbd70 CVE-2025-21330,0,0,630a00257c77e08d68c8ee0fddc53011d52b9c8247b0bd6fa5d0f2ffb1bc0037,2025-01-21T20:04:19.400000 CVE-2025-21331,0,0,ccad9675417e0dde69b86789c97697f2c4d8ee1cd0a2974500669089590e694d,2025-01-21T19:58:20.833000 CVE-2025-21332,0,0,edf859babd061219cc1cce3d52c09e668a5e0f31058bfea0e2ae4470ea2b16a4,2025-01-21T19:57:17.993000 -CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca8e6,2025-01-15T20:57:37.467000 +CVE-2025-21333,0,1,37aa092b6c47c28ac440d43eef0284776444e111ad1ea71f754dceacd19a2263,2025-03-07T17:15:21.473000 CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000 @@ -281872,7 +281891,7 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 CVE-2025-21700,0,0,3fc056d46af8f0b78d97452f108ed5d658c922ab699c8a2bb43cbeaf9fbd76c6,2025-02-21T14:15:54.717000 CVE-2025-21701,0,0,d7c054d565dcf2a6e8d7012de1892a0a2fe63adaff9755c9d55124b93699efd4,2025-02-21T14:15:55.747000 -CVE-2025-21702,0,0,d363aa73cef2e84d05fef6ef479e127c11617ea6c3706bfabd35a9d26103dec7,2025-02-18T15:15:18.530000 +CVE-2025-21702,0,1,295a0e49717454cc39c315053488b66f87a86e159e62fafe9cfc381cb821411c,2025-03-07T18:15:47.370000 CVE-2025-21703,0,0,1b70a75eeb992a0cedbee9d2af799a85c7fa5ad6d64038ed6ea31d816ef224ad,2025-02-21T14:15:56.627000 CVE-2025-21704,0,0,9a86e02d9fb8c5baad271d9c9853ec1586b3eb8ed9ce0a3de54fa8b76bfb26a0,2025-02-22T10:15:11.263000 CVE-2025-21705,0,0,2467d79f909fb2b3c476b851a8fb43c3d27c899ca736969d71f4984f2c4ea275,2025-02-27T02:15:14.137000 @@ -281882,7 +281901,7 @@ CVE-2025-21708,0,0,70bef15eb629c71a7c7afc009d0349c18f7b5709bb6199a7d97913b37e48b CVE-2025-21709,0,0,44d922fbf11b96fa3e8079490f77a83bf9c187d3dfdbafefd95f19de9384caca,2025-02-27T02:15:14.560000 CVE-2025-21710,0,0,ad1ac658b3da7bd5fe6c6ae0ece92eb2ca2472ae6a28a64d02e88b70117f1cab,2025-02-27T02:15:14.657000 CVE-2025-21711,0,0,cf13ec528d96da9ae0e87fafb4c97741efa997ed948d0a3082efb2148163b1a3,2025-03-07T12:30:28.963000 -CVE-2025-21712,0,0,3ecca46cce58c37600e18eb395369b792d056c177c4e0245142c917aeb36341c,2025-02-27T13:15:12.043000 +CVE-2025-21712,0,1,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000 CVE-2025-21713,0,0,7c581c2faa371aaa484ee1f08d6f34bd30d17480a8c9dcbd1ac4ebd0bef8b279,2025-03-07T12:30:28.963000 CVE-2025-21714,0,0,b84f2d3cd3971aa8d897029bf67e816ffa7bfda27b2568647ef8ebb4293771b1,2025-02-27T19:15:49.637000 CVE-2025-21715,0,0,ef47aa883e62901a193ae5a74d7d9fdf8a378adb5672814422ac32cf6dd0950f,2025-02-27T18:15:28.153000 @@ -282008,7 +282027,7 @@ CVE-2025-21834,0,0,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32c CVE-2025-21835,0,0,78792f5e0a0fc396121255e44d86498bf71f7b17f11fbf08ffdd550ea81440ba,2025-03-07T09:15:16.473000 CVE-2025-21836,0,0,0c96d33aa4ba09e5132941f84daaf21d3a8de4d459f5c3f80ca7fb04c000f41f,2025-03-07T09:15:16.600000 CVE-2025-21837,0,0,d71f7670b9f3de6bab1a766e0565d97c4b19cdacaebfbf655b97ae2c2428104f,2025-03-07T09:15:16.710000 -CVE-2025-21838,0,0,3c5f0d4f5a33bb974046ee4a47234b3fde861634a7fd92368e8aa2916a376fa0,2025-03-07T09:15:16.810000 +CVE-2025-21838,0,1,c3ce5f80630165d59b68bdf67b00f3ac2acff4fb25dc7c433d137ffea7bbff7b,2025-03-07T18:15:47.713000 CVE-2025-21839,0,0,73960dd2df31123c2ce4caa2af112eb496473962b756cba9905bed564b371cfc,2025-03-07T09:15:16.923000 CVE-2025-21840,0,0,f7a54e15cb3fc24ad92d37cb06eba5f72f4005541c2a332b47cf70e0a8758a64,2025-03-07T09:15:17.033000 CVE-2025-21841,0,0,9c7a1022d9f429220d2416fff9a1e040611d0aac489e05d5f694d8a693548a17,2025-03-07T09:15:17.137000 @@ -283850,9 +283869,9 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 -CVE-2025-25450,0,0,aa4833b6644c3dd5960a0ce2b32c1809568594c111878547965e7753c3a3e64d,2025-03-06T15:15:17.443000 -CVE-2025-25451,0,0,9a00d9588ff78fdad113f032ac06c8c05ea1e58a9277ce3535667ac0c4e0fc27,2025-03-06T15:15:17.553000 -CVE-2025-25452,0,0,7cbb267f940e24fd6826e8276f8a69f8095a90b9586be4c674267b8cf033d3b6,2025-03-06T15:15:17.667000 +CVE-2025-25450,0,1,69c0e66b5259cd848a36ee3387e165b3c13a6a4ba2233dfb5d5ef1991e65c690,2025-03-07T17:15:21.640000 +CVE-2025-25451,0,1,718dba12e459406ad47aed831fc7ed49761e2789191f94dd42a964acf6eab8d8,2025-03-07T17:15:21.803000 +CVE-2025-25452,0,1,db97c2b1a3f3fe6a0b532c32e3b1c28c0459e3ade994dc2ef24db5bea6bd3c1d,2025-03-07T17:15:21.947000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 @@ -283893,7 +283912,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25617,1,1,865fa4993189a6053ac23342f82c40fff5f1cf19a2ef6e091748583a81dd852b,2025-03-07T16:15:38.543000 +CVE-2025-25617,0,1,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000 CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284024,7 +284043,7 @@ CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000 CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000 -CVE-2025-26331,0,1,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000 +CVE-2025-26331,0,0,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 @@ -284306,7 +284325,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75 CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000 CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000 CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000 -CVE-2025-27152,1,1,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000 +CVE-2025-27152,0,0,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000 CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000 CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000 CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000 @@ -284377,8 +284396,8 @@ CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 -CVE-2025-27370,0,0,cb1da8898ee5a31817ad922078eead78a820d1050fd07cee6c6cb22d7a73a529,2025-03-03T19:15:35.717000 -CVE-2025-27371,0,0,faee6e4ab8c9b25a7425e6e20b19acd9e485a3c93dbbf835a72dad70fe8350fe,2025-03-03T19:15:35.843000 +CVE-2025-27370,0,1,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 +CVE-2025-27371,0,1,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000 CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000 CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000 @@ -284407,15 +284426,15 @@ CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2 CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000 CVE-2025-27506,0,0,8313f9e93dd55499421f598ef258d63dd49365e5994019d7f3a4774aaadb291a,2025-03-06T19:15:27.833000 CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000 -CVE-2025-27508,0,0,021b134ab746fdb21c1b6afba20d8b4449f142dd50a7aeaf2a0e333d5dbea12b,2025-03-05T22:15:35.867000 +CVE-2025-27508,0,1,6296c41bdf17b79783782f3620ad94a749ef956bf3a0c0cbdee8ca138d0376e6,2025-03-07T18:15:48.033000 CVE-2025-27509,0,0,717db0d8d3de1a389b101d9ff9200fdda3ba763adad4feb3ab4fe65755010e9d,2025-03-06T19:15:27.973000 CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000 CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000 CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000 CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000 CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000 -CVE-2025-27518,1,1,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000 -CVE-2025-27519,1,1,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000 +CVE-2025-27518,0,0,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000 +CVE-2025-27519,0,0,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000 CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000 CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 @@ -284423,10 +284442,12 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 -CVE-2025-27597,1,1,6cd2d27e6f70c8b8dc560cd90930a7c6cca00c2cfb8b49c56b00236be1fb725c,2025-03-07T16:15:39.893000 +CVE-2025-27597,0,1,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000 CVE-2025-27598,0,0,d2c5c2693a9de5786fd83ab9383213352b59e0b62bd0678134b8bb8975df0743,2025-03-06T23:15:12.183000 CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000 -CVE-2025-27603,1,1,f47d7ab377c12d55b3fa6ae6bb3381884e202826994bb1575cdd6dffba4dc2d5,2025-03-07T16:15:40.037000 +CVE-2025-27603,0,1,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000 +CVE-2025-27604,1,1,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000 +CVE-2025-27607,1,1,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000 CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 @@ -284480,6 +284501,6 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000 CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000 CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000 -CVE-2025-27795,0,1,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000 -CVE-2025-27796,0,1,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000 +CVE-2025-27795,0,0,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000 +CVE-2025-27796,0,0,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000 CVE-2025-27816,0,0,5b2e23c42ea7b22c782ca4f40314ad964756890209d1d752208955d5f400b7bd,2025-03-07T08:15:44.527000