From 926f2ce3ef5bce553dffc75608439ce52c9cb515 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 24 Feb 2025 17:04:07 +0000 Subject: [PATCH] Auto-Update: 2025-02-24T17:00:39.541398+00:00 --- CVE-2017/CVE-2017-30xx/CVE-2017-3066.json | 32 +- CVE-2019/CVE-2019-152xx/CVE-2019-15271.json | 4 +- CVE-2019/CVE-2019-16xx/CVE-2019-1652.json | 16 +- CVE-2020/CVE-2020-128xx/CVE-2020-12812.json | 4 +- CVE-2020/CVE-2020-31xx/CVE-2020-3118.json | 4 +- CVE-2020/CVE-2020-31xx/CVE-2020-3153.json | 4 +- CVE-2020/CVE-2020-31xx/CVE-2020-3161.json | 4 +- CVE-2020/CVE-2020-32xx/CVE-2020-3259.json | 4 +- CVE-2020/CVE-2020-34xx/CVE-2020-3432.json | 6 +- CVE-2020/CVE-2020-34xx/CVE-2020-3433.json | 4 +- CVE-2020/CVE-2020-34xx/CVE-2020-3452.json | 4 +- CVE-2020/CVE-2020-35xx/CVE-2020-3566.json | 4 +- CVE-2020/CVE-2020-35xx/CVE-2020-3569.json | 6 +- CVE-2020/CVE-2020-35xx/CVE-2020-3580.json | 4 +- CVE-2021/CVE-2021-14xx/CVE-2021-1497.json | 4 +- CVE-2021/CVE-2021-14xx/CVE-2021-1498.json | 4 +- CVE-2021/CVE-2021-226xx/CVE-2021-22600.json | 4 +- CVE-2021/CVE-2021-330xx/CVE-2021-33044.json | 4 +- CVE-2021/CVE-2021-330xx/CVE-2021-33045.json | 4 +- CVE-2021/CVE-2021-337xx/CVE-2021-33742.json | 6 +- CVE-2021/CVE-2021-344xx/CVE-2021-34448.json | 4 +- CVE-2021/CVE-2021-344xx/CVE-2021-34473.json | 4 +- CVE-2021/CVE-2021-344xx/CVE-2021-34486.json | 4 +- CVE-2021/CVE-2021-413xx/CVE-2021-41379.json | 4 +- CVE-2022/CVE-2022-207xx/CVE-2022-20701.json | 4 +- CVE-2022/CVE-2022-208xx/CVE-2022-20821.json | 4 +- CVE-2022/CVE-2022-219xx/CVE-2022-21919.json | 9 +- CVE-2022/CVE-2022-219xx/CVE-2022-21971.json | 4 +- CVE-2022/CVE-2022-219xx/CVE-2022-21999.json | 4 +- CVE-2022/CVE-2022-245xx/CVE-2022-24521.json | 4 +- CVE-2022/CVE-2022-269xx/CVE-2022-26904.json | 4 +- CVE-2022/CVE-2022-269xx/CVE-2022-26923.json | 10 +- CVE-2022/CVE-2022-269xx/CVE-2022-26925.json | 10 +- CVE-2022/CVE-2022-410xx/CVE-2022-41040.json | 10 +- CVE-2022/CVE-2022-410xx/CVE-2022-41073.json | 4 +- CVE-2022/CVE-2022-410xx/CVE-2022-41082.json | 9 +- CVE-2022/CVE-2022-411xx/CVE-2022-41125.json | 4 +- CVE-2022/CVE-2022-413xx/CVE-2022-41328.json | 4 +- CVE-2022/CVE-2022-424xx/CVE-2022-42475.json | 8 +- CVE-2022/CVE-2022-483xx/CVE-2022-48352.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48353.json | 32 +- CVE-2023/CVE-2023-201xx/CVE-2023-20109.json | 24 +- CVE-2023/CVE-2023-202xx/CVE-2023-20269.json | 1233 +------------------ CVE-2023/CVE-2023-209xx/CVE-2023-20993.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21013.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21020.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21047.json | 32 +- CVE-2023/CVE-2023-217xx/CVE-2023-21715.json | 4 +- CVE-2023/CVE-2023-248xx/CVE-2023-24880.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28470.json | 32 +- CVE-2023/CVE-2023-286xx/CVE-2023-28679.json | 32 +- CVE-2023/CVE-2023-353xx/CVE-2023-35311.json | 26 +- CVE-2024/CVE-2024-107xx/CVE-2024-10763.json | 44 +- CVE-2024/CVE-2024-120xx/CVE-2024-12041.json | 69 +- CVE-2024/CVE-2024-121xx/CVE-2024-12184.json | 37 +- CVE-2024/CVE-2024-126xx/CVE-2024-12620.json | 32 +- CVE-2024/CVE-2024-129xx/CVE-2024-12916.json | 56 + CVE-2024/CVE-2024-129xx/CVE-2024-12917.json | 56 + CVE-2024/CVE-2024-129xx/CVE-2024-12918.json | 56 + CVE-2024/CVE-2024-132xx/CVE-2024-13227.json | 70 +- CVE-2024/CVE-2024-133xx/CVE-2024-13343.json | 44 +- CVE-2024/CVE-2024-133xx/CVE-2024-13374.json | 54 +- CVE-2024/CVE-2024-135xx/CVE-2024-13547.json | 54 +- CVE-2024/CVE-2024-135xx/CVE-2024-13573.json | 54 +- CVE-2024/CVE-2024-135xx/CVE-2024-13576.json | 54 +- CVE-2024/CVE-2024-136xx/CVE-2024-13600.json | 49 +- CVE-2024/CVE-2024-136xx/CVE-2024-13654.json | 32 +- CVE-2024/CVE-2024-136xx/CVE-2024-13656.json | 32 +- CVE-2024/CVE-2024-136xx/CVE-2024-13658.json | 54 +- CVE-2024/CVE-2024-136xx/CVE-2024-13665.json | 54 +- CVE-2024/CVE-2024-137xx/CVE-2024-13769.json | 66 +- CVE-2024/CVE-2024-138xx/CVE-2024-13800.json | 32 +- CVE-2024/CVE-2024-300xx/CVE-2024-30040.json | 10 +- CVE-2024/CVE-2024-547xx/CVE-2024-54772.json | 4 +- CVE-2024/CVE-2024-568xx/CVE-2024-56897.json | 29 + CVE-2024/CVE-2024-569xx/CVE-2024-56938.json | 61 +- CVE-2024/CVE-2024-569xx/CVE-2024-56939.json | 61 +- CVE-2024/CVE-2024-569xx/CVE-2024-56940.json | 63 +- CVE-2024/CVE-2024-576xx/CVE-2024-57602.json | 64 +- CVE-2024/CVE-2024-60xx/CVE-2024-6097.json | 59 +- CVE-2025/CVE-2025-03xx/CVE-2025-0365.json | 32 +- CVE-2025/CVE-2025-03xx/CVE-2025-0366.json | 49 +- CVE-2025/CVE-2025-11xx/CVE-2025-1197.json | 82 +- CVE-2025/CVE-2025-15xx/CVE-2025-1555.json | 14 +- CVE-2025/CVE-2025-16xx/CVE-2025-1632.json | 10 +- CVE-2025/CVE-2025-230xx/CVE-2025-23017.json | 67 + CVE-2025/CVE-2025-245xx/CVE-2025-24527.json | 11 +- CVE-2025/CVE-2025-252xx/CVE-2025-25282.json | 12 +- CVE-2025/CVE-2025-254xx/CVE-2025-25460.json | 25 + CVE-2025/CVE-2025-257xx/CVE-2025-25746.json | 76 +- CVE-2025/CVE-2025-268xx/CVE-2025-26803.json | 72 ++ CVE-2025/CVE-2025-268xx/CVE-2025-26883.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27265.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27266.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27272.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27276.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27277.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27280.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27290.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27294.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27296.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27297.json | 56 + CVE-2025/CVE-2025-272xx/CVE-2025-27298.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27300.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27301.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27303.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27304.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27305.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27306.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27307.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27311.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27312.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27315.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27316.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27317.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27318.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27320.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27321.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27323.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27325.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27327.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27328.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27329.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27330.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27331.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27332.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27335.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27336.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27339.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27340.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27341.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27342.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27344.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27347.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27348.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27349.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27351.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27352.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27353.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27355.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27356.json | 56 + CVE-2025/CVE-2025-273xx/CVE-2025-27357.json | 56 + README.md | 88 +- _state.csv | 282 +++-- 144 files changed, 5155 insertions(+), 1652 deletions(-) create mode 100644 CVE-2024/CVE-2024-129xx/CVE-2024-12916.json create mode 100644 CVE-2024/CVE-2024-129xx/CVE-2024-12917.json create mode 100644 CVE-2024/CVE-2024-129xx/CVE-2024-12918.json create mode 100644 CVE-2024/CVE-2024-568xx/CVE-2024-56897.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23017.json create mode 100644 CVE-2025/CVE-2025-254xx/CVE-2025-25460.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26803.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26883.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27265.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27266.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27272.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27276.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27277.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27280.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27290.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27294.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27296.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27297.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27298.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27300.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27301.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27303.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27304.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27305.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27306.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27307.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27311.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27312.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27315.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27316.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27317.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27318.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27320.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27321.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27323.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27325.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27327.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27328.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27329.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27330.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27331.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27332.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27335.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27336.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27339.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27340.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27341.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27342.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27344.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27347.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27348.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27349.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27351.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27352.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27353.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27355.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27356.json create mode 100644 CVE-2025/CVE-2025-273xx/CVE-2025-27357.json diff --git a/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json b/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json index 0c424eb26d3..5b3f1a1e615 100644 --- a/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json +++ b/CVE-2017/CVE-2017-30xx/CVE-2017-3066.json @@ -2,7 +2,7 @@ "id": "CVE-2017-3066", "sourceIdentifier": "psirt@adobe.com", "published": "2017-04-27T14:59:00.233", - "lastModified": "2024-11-21T03:24:45.723", + "lastModified": "2025-02-24T16:15:10.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json b/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json index 19e9a6f75c9..9b37960be27 100644 --- a/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json +++ b/CVE-2019/CVE-2019-152xx/CVE-2019-15271.json @@ -2,8 +2,8 @@ "id": "CVE-2019-15271", "sourceIdentifier": "psirt@cisco.com", "published": "2019-11-26T03:15:11.050", - "lastModified": "2024-11-21T04:28:20.240", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:35:55.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json index f0ea1c39a65..584dab16586 100644 --- a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json +++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1652", "sourceIdentifier": "psirt@cisco.com", "published": "2019-01-24T15:29:00.953", - "lastModified": "2024-11-21T04:37:01.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:03:38.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,8 +122,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089" + "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.2.15", + "versionEndExcluding": "1.4.2.22", + "matchCriteriaId": "DD8708CE-218E-4B82-ACA2-A7FCFEB73086" } ] }, @@ -149,8 +151,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3" + "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.2.15", + "versionEndExcluding": "1.4.2.22", + "matchCriteriaId": "CF1269CE-6D9B-4497-9987-D107239AB632" } ] }, diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json index 773a07611d4..3f40b3f95f1 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12812", "sourceIdentifier": "psirt@fortinet.com", "published": "2020-07-24T23:15:12.003", - "lastModified": "2025-02-04T20:15:36.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:43:27.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json index 893afeb0dd1..cb18da3b847 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3118.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3118", "sourceIdentifier": "psirt@cisco.com", "published": "2020-02-05T18:15:10.907", - "lastModified": "2024-11-21T05:30:21.770", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:35:44.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json index 0e8237a4be9..4c86a51d4fb 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3153.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3153", "sourceIdentifier": "psirt@cisco.com", "published": "2020-02-19T20:15:15.113", - "lastModified": "2024-11-21T05:30:26.193", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:34:56.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json index ecb795f540c..c55df33b99e 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3161.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3161", "sourceIdentifier": "psirt@cisco.com", "published": "2020-04-15T20:15:15.097", - "lastModified": "2024-11-21T05:30:27.190", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T16:14:27.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json index 8d1d83e4460..1821a4acd54 100644 --- a/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json +++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3259.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3259", "sourceIdentifier": "psirt@cisco.com", "published": "2020-05-06T17:15:12.777", - "lastModified": "2024-11-21T05:30:40.517", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:40:35.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json index 96e9241f74a..49d00d1cdd2 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json @@ -2,13 +2,13 @@ "id": "CVE-2020-3432", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-12T00:15:07.670", - "lastModified": "2025-02-18T18:15:09.930", + "lastModified": "2025-02-24T16:15:11.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the uninstaller component of Cisco AnyConnect Secure Mobility Client for Mac OS could allow an authenticated, local attacker to corrupt the content of any file in the filesystem.\r\n The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a symbolic link (symlink) to a target file on a specific path. A successful exploit could allow the attacker to corrupt the contents of the file. If the file is a critical systems file, the exploit could lead to a denial of service condition. To exploit this vulnerability, the attacker would need to have valid credentials on the system." + "value": "A vulnerability in the uninstaller component of Cisco AnyConnect Secure Mobility Client for Mac OS could allow an authenticated, local attacker to corrupt the content of any file in the filesystem.\r\nThe vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a symbolic link (symlink) to a target file on a specific path. A successful exploit could allow the attacker to corrupt the contents of the file. If the file is a critical systems file, the exploit could lead to a denial of service condition. To exploit this vulnerability, the attacker would need to have valid credentials on the system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json index ffba4885cf4..63f5eba95e6 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3433", "sourceIdentifier": "psirt@cisco.com", "published": "2020-08-17T18:15:12.947", - "lastModified": "2024-11-21T05:31:03.480", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:40:28.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json index d1d1e6848ac..938735425b8 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3452.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3452", "sourceIdentifier": "psirt@cisco.com", "published": "2020-07-22T20:15:11.970", - "lastModified": "2024-11-21T05:31:05.770", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:40:15.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json index 7db6de663da..4b7f331f1b6 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3566.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3566", "sourceIdentifier": "psirt@cisco.com", "published": "2020-08-29T16:15:09.797", - "lastModified": "2024-11-21T05:31:19.740", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:39:27.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json index 5f72d8cccdf..53928a698e1 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3569.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3569", "sourceIdentifier": "psirt@cisco.com", "published": "2020-09-23T01:15:15.503", - "lastModified": "2024-11-21T05:31:20.100", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:39:08.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -524,6 +524,7 @@ "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz", "source": "psirt@cisco.com", "tags": [ + "Mitigation", "Vendor Advisory" ] }, @@ -531,6 +532,7 @@ "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mitigation", "Vendor Advisory" ] } diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json index 5fff2626e42..df2ebb6eb2f 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3580.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3580", "sourceIdentifier": "psirt@cisco.com", "published": "2020-10-21T19:15:18.607", - "lastModified": "2024-11-21T05:31:21.103", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:36:35.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json index 3cbc3b3da5a..42d9bf9390a 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1497.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1497", "sourceIdentifier": "psirt@cisco.com", "published": "2021-05-06T13:15:10.500", - "lastModified": "2024-11-21T05:44:29.070", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:36:23.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json index c336998d588..e4e8c675f4f 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1498.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1498", "sourceIdentifier": "psirt@cisco.com", "published": "2021-05-06T13:15:10.537", - "lastModified": "2024-11-21T05:44:29.210", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:36:01.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json index ff9fa572d56..4d86e6db1b7 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22600", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-01-26T14:15:08.123", - "lastModified": "2024-11-21T05:50:21.440", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:41:32.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33044.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33044.json index 7f714ea5c58..ed6c5cfca54 100644 --- a/CVE-2021/CVE-2021-330xx/CVE-2021-33044.json +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33044.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33044", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2021-09-15T22:15:10.497", - "lastModified": "2024-11-21T06:08:10.943", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:01:40.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33045.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33045.json index 8e3003c94fc..9cbbd5563a9 100644 --- a/CVE-2021/CVE-2021-330xx/CVE-2021-33045.json +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33045.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33045", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2021-09-15T22:15:10.687", - "lastModified": "2024-11-21T06:08:11.097", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:01:15.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-337xx/CVE-2021-33742.json b/CVE-2021/CVE-2021-337xx/CVE-2021-33742.json index a2a409bc545..cd35153b186 100644 --- a/CVE-2021/CVE-2021-337xx/CVE-2021-33742.json +++ b/CVE-2021/CVE-2021-337xx/CVE-2021-33742.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33742", "sourceIdentifier": "secure@microsoft.com", "published": "2021-06-08T23:15:09.540", - "lastModified": "2025-02-04T18:15:28.917", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:46:27.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] }, diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34448.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34448.json index 6acac815deb..f6e96aa6c15 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34448.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34448.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34448", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-16T21:15:09.580", - "lastModified": "2025-02-04T19:15:24.500", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:50.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json index 98477534b5b..71c5bbe71b6 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34473.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34473", "sourceIdentifier": "secure@microsoft.com", "published": "2021-07-14T18:15:11.163", - "lastModified": "2025-02-04T16:15:33.243", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:47:44.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json b/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json index 1826a408636..0ab50b1f97a 100644 --- a/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json +++ b/CVE-2021/CVE-2021-344xx/CVE-2021-34486.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34486", "sourceIdentifier": "secure@microsoft.com", "published": "2021-08-12T18:15:09.190", - "lastModified": "2025-02-04T16:15:33.430", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:47:13.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41379.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41379.json index 64243a75bb7..9975096f584 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41379.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41379.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41379", "sourceIdentifier": "secure@microsoft.com", "published": "2021-11-10T01:19:32.127", - "lastModified": "2025-02-04T18:15:29.393", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:45:58.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json index e66bdd08ada..ef4796af727 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20701", "sourceIdentifier": "psirt@cisco.com", "published": "2022-02-10T18:15:09.087", - "lastModified": "2024-11-21T06:43:21.653", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:23:58.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json index ae29342a290..eb0016da202 100644 --- a/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20821.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20821", "sourceIdentifier": "psirt@cisco.com", "published": "2022-05-26T14:15:08.123", - "lastModified": "2024-11-21T06:43:37.250", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:24:27.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json index 3f9075ddc4a..c1aa4c59707 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21919", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.463", - "lastModified": "2025-02-04T18:15:31.033", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:45:53.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -238,7 +238,10 @@ }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21919", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json index fb25047c4aa..1d9e7c7bdb4 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21971", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:08.640", - "lastModified": "2025-01-29T21:15:12.387", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:49:16.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21999.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21999.json index 9ab04caeddc..8b17f007147 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21999.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21999.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21999", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:09.563", - "lastModified": "2025-01-29T21:15:12.597", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:49:00.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json index 9586a35e60b..d436b5a315d 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24521.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24521", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:11.107", - "lastModified": "2025-02-04T15:15:15.040", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:24.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26904.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26904.json index 5fd282cfbb8..3fa2bef9c6d 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26904.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26904.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26904", "sourceIdentifier": "secure@microsoft.com", "published": "2022-04-15T19:15:15.027", - "lastModified": "2025-02-04T19:15:25.737", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:46.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json index 0c26e9ed392..2ea5be1216b 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26923", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.133", - "lastModified": "2025-02-04T19:15:25.930", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:42.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -186,7 +186,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923", diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json index 69a736e3632..d25ea9c2632 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26925", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.187", - "lastModified": "2025-02-04T19:15:26.153", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:37.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -232,7 +232,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json index c612e707f28..d61a288078d 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41040", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.753", - "lastModified": "2025-02-04T19:15:26.590", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:30.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -105,7 +105,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41040", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json index 6d3bcd97123..061e8fb7d6b 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41073", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:21.207", - "lastModified": "2025-02-04T15:15:16.030", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:06.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index 756739997b1..dd357eeaa61 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41082", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.843", - "lastModified": "2025-02-04T18:15:32.070", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:45:38.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -105,7 +105,10 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41082", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html", diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json index e18d76776fa..9ca42b7ba0f 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41125", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:25.307", - "lastModified": "2025-02-04T16:15:34.370", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:47:00.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json index 2a83015e9cc..45aabb03361 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41328", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-03-07T17:15:12.093", - "lastModified": "2024-11-21T07:23:03.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:45:02.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json index f21dd708833..4337cc998d1 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42475", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-01-02T09:15:09.490", - "lastModified": "2024-11-21T07:25:02.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:44:21.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -190,8 +190,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.0", - "versionEndIncluding": "2.0.11", - "matchCriteriaId": "6607C71D-D434-430A-8DFD-9125381D2D36" + "versionEndExcluding": "2.0.12", + "matchCriteriaId": "954674E3-7E54-4D94-80DE-CB73AE0452EA" }, { "vulnerable": true, diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48352.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48352.json index 4287b9ef3c0..d882e7ce86b 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48352.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48352.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48352", "sourceIdentifier": "psirt@huawei.com", "published": "2023-03-27T22:15:20.207", - "lastModified": "2024-11-21T07:33:13.967", + "lastModified": "2025-02-24T15:15:10.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48353.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48353.json index 51d6852699a..ac1d27f4276 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48353.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48353.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48353", "sourceIdentifier": "psirt@huawei.com", "published": "2023-03-27T22:15:20.310", - "lastModified": "2024-11-21T07:33:14.083", + "lastModified": "2025-02-24T15:15:11.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json index 3e4baf9e67a..e3702d4fe43 100644 --- a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20109", "sourceIdentifier": "psirt@cisco.com", "published": "2023-09-27T18:15:10.860", - "lastModified": "2024-11-21T07:40:34.167", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:23:16.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -1797,11 +1797,6 @@ "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*", "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10e:*:*:*:*:*:*:*", - "matchCriteriaId": "CD7EF09E-2D74-4B05-B36E-263E35448FC1" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", @@ -3767,11 +3762,6 @@ "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10ee:*:*:*:*:*:*:*", - "matchCriteriaId": "9D497018-2ED5-4A0C-9E1E-1441C7F596D4" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", @@ -5182,6 +5172,11 @@ "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", @@ -5257,11 +5252,6 @@ "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2b:*:*:*:*:*:*:*", - "matchCriteriaId": "91A099C9-0C81-4819-BE4A-FE59144C55BD" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json index 7fc7b9b2fed..b7ded9f8e1b 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20269", "sourceIdentifier": "psirt@cisco.com", "published": "2023-09-06T18:15:08.303", - "lastModified": "2024-11-21T07:41:02.433", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:08:29.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,381 +92,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C01E8C87-8982-491F-B0ED-5AD17BDBBC1D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E881DFE5-9180-49BA-8D66-2BD96FC23BE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "81FC6BE6-1DF5-41FE-B66D-05A8D3DCDDD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E6033411-4722-4CDD-BF8A-152C13FA3926" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "37495D3A-FB87-40F6-B6E6-7870393F8D68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E59E5B90-18F4-48D6-A38A-D4BDFE8C3091" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "6458E8C7-84F0-49DF-99DC-99810AA71AF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "7E59FF48-5291-4CC2-9A2E-38819B7322AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "E40F113E-208E-4015-815C-492EFC7F7C99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "905B866F-B3E8-4240-9942-8DBEAB2F3C08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B3DE2A18-0E0F-4926-BC8A-B44558EA8DBF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "13E5F3D0-02BB-45E6-81B8-B7CC09346FFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "DA3A6F7D-CF96-492E-9C03-827382B0D0A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.13:*:*:*:*:*:*:*", - "matchCriteriaId": "153216C5-8239-4F62-8751-49AFD5A1B600" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "DB28D358-3C2E-4D55-B429-EF805689691D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "52E3338A-93BC-4263-B3D7-13F1EC35004C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.16:*:*:*:*:*:*:*", - "matchCriteriaId": "4B849B7C-A3DE-4230-B765-3335864EE02A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.17:*:*:*:*:*:*:*", - "matchCriteriaId": "9B84A0B2-8631-4CE7-9636-9E4956073DA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.18:*:*:*:*:*:*:*", - "matchCriteriaId": "4BCE1C81-A824-43A9-B0F2-C5F8C4B98B60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "348B0FAC-A97D-4A9C-8D98-C0C347532112" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E4213D8C-4A4A-4C95-8500-3B056EF537C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E713AF7B-6C50-4205-8320-CE833D5C7409" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5AEDA6C9-B87B-446E-AE63-6A0BAD3A20B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B1B2EE3B-D640-476E-BFBD-A5147EC4134A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8117D925-7E20-45BB-8A75-740700FD216F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1529CCAE-3A67-41C7-8A14-5E85D8D43C13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "5E8BF178-C267-4571-9581-224F7488BDA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "843C4F5F-C0B3-40C9-BC03-9F5B21D18637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5E7FBCD9-10D2-470B-9B29-4DD1E3240DE7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "A872D2D1-3391-4A4A-8409-5760ACA8C252" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "8738A0E2-489E-42C3-B675-243BAF46E7F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "9123ACEF-35AB-4EC2-A2C4-B6A6C570951B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "A11043D9-DFA6-43E0-A58C-1D7FA52A8D6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "BC0CCF6C-E140-4C76-B2EC-7BDA9F9291D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C13B826E-FB8D-49E5-B866-2606AD904513" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D6AB1039-6A7C-42A5-A931-3C3C2D6DDB95" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9BE4B4C7-9686-4BC4-925C-23D700416875" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "761ADC40-51DF-455D-8E43-BED6F98A68B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8540F8BE-B396-47CB-AB8C-A32AF1942C70" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CE7CF2BE-D6F0-4C95-9FC8-9F2611D7E2BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D027DA95-EC2D-4CDA-9458-E5315E8EF92A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "20FB8F1C-2757-4C48-BA17-9D0BEF671ACF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "89D368A3-6202-4C14-9DD6-6FE73B5F06F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28AE56F0-52C7-4BF3-BBA2-FC6946C2617B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "33E5B23F-8986-49D2-BE0C-E3576C703EDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B41A653B-E947-4C3B-82AA-42F5F282FA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "CEFB54B2-5026-482B-B226-FC07841C6FC5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1BBBF462-9E15-4526-A437-B78CA24832C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8D00BA69-08A6-4796-BDE6-E5E2D7C66E23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BF2B032F-6C40-4D12-8D7F-C41A6F75941F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D05CDFBE-0206-490E-B916-EEFE787CE975" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8A26CA-12C8-44B5-902E-D450127A0197" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "45E1B068-FF70-4A61-9932-02626A2207CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "92F386BB-96E5-47FF-92FE-BB19B83FF054" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9CBC03FE-3A54-450E-A8CE-844C4A6E54B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "078352DC-CEB3-47BC-B1F7-05AA3DBD5D8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "096B8FFA-6C54-44A9-97C9-0479C802E25C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "028024EF-84D1-4250-B697-D33E8E79DE9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CE2EC687-1EEF-4F47-B509-2E9D7D7DB21A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1197F620-536D-4891-97B0-B17D7F76B621" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "68C616AE-4B20-47A1-854E-89899BBF79B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5BE03156-2E96-4D0E-909F-E424515C12D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FE43737-1463-4C93-9549-1D5BF3BB308B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F5DD95E7-841A-475C-A302-6E7D48E887C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4C12C224-AB9E-42A7-8A26-94D6B4378CEA" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*", @@ -712,11 +337,6 @@ "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", "matchCriteriaId": "D6FEF0DA-741E-4361-8143-068EB47D6520" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "69289C72-01B5-4280-A382-665C1224C850" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*", @@ -1709,853 +1329,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AAC0A7B7-2FE5-40ED-80F3-70F6CC2065F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B066DB88-FB86-467E-8AE2-3AC76B202082" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8A356E12-DFC8-45D3-A72B-133C72011A85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "40955D09-9351-436D-A93A-266913CFE407" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "CCDA8B7D-108E-4851-BDDD-E81C58131B8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "975AA7EF-3BE1-4112-AAAE-80C678DF06FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "EDDC513A-8B98-4904-BC39-E178D6CABD86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "D6A4E4A8-3FB8-4EAA-ADD8-D8A48269C7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "E00E1A95-4D81-4D8C-8E9F-02F9866DEC19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "968A5890-B604-4AF7-88FD-52512DE60A0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C3390375-1D75-4D28-AA2B-4D28FC006B2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "134FBA88-E8BF-4757-9ED5-449A03ED4FEB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.33:*:*:*:*:*:*:*", - "matchCriteriaId": "17F83FA7-11A1-48D1-AAD9-80EB8330C576" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.35:*:*:*:*:*:*:*", - "matchCriteriaId": "2250FD43-E360-4BB9-8444-47C6014E77F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.38:*:*:*:*:*:*:*", - "matchCriteriaId": "33E18DBD-6477-4DEF-9A4F-884F0987C89C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "41A26F87-4A82-4BF1-9B69-3FDA62659237" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "82B5E7C5-CE7E-45CF-9B02-D174F99D3379" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "6A59FF9C-0A15-4F9F-A807-5F4B5FDD83F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "E0912860-7B6E-4AF9-8208-0F51A11B0CBD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.16:*:*:*:*:*:*:*", - "matchCriteriaId": "1136F1DA-65C0-4D46-87EE-63A5EA8BCC82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DEA9D4DA-1CC3-4F76-8AC2-936DF68608A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.21:*:*:*:*:*:*:*", - "matchCriteriaId": "A1A05215-3700-4DF3-8CDF-25E40065B539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.26:*:*:*:*:*:*:*", - "matchCriteriaId": "BBE017C1-28CE-4219-9BC4-E7AC61A836E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.29:*:*:*:*:*:*:*", - "matchCriteriaId": "BDB86586-4D1A-415D-9070-EAAFFFF670AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2443A527-3A65-4226-A643-B683072CB664" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BA645994-0744-446B-96EA-21915AF3BEC6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "BA1E87A4-A9EB-4BFC-9070-F32ABD32D33C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "D5B63317-7612-4B7C-8AE8-F18AEFAF4560" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "4CF8BD7E-31C0-4F05-A092-64D9918ED5DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0BBD9E97-0BC5-4120-8E03-1EE9D11E3359" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "4D724096-92CD-457E-8CC5-B8099A8E3187" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "66EA1792-85AC-4AD1-8213-A992F623D743" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "86C7966B-2EB0-4970-B2D5-9F892F2D1C8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "50C1D4AD-01C0-4591-9308-625FEF736D7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "4EE06D7A-8DF5-4C98-AEDB-CF0DC5DFF565" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "3B9027F6-F91E-49D3-9328-C72E18625292" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "E1C4EBE8-60A7-4F71-959A-1127DAF2A262" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "3484693F-1D88-44AA-B739-6E0B2C359A4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.33:*:*:*:*:*:*:*", - "matchCriteriaId": "413E425D-9BD5-4A9B-9FE6-6190C488C1D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.34:*:*:*:*:*:*:*", - "matchCriteriaId": "753121F0-AE17-49FE-B5F3-71DFBD9A4634" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.35:*:*:*:*:*:*:*", - "matchCriteriaId": "A583EEC5-7EA9-422E-8C1C-4C28CDBC65F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.39:*:*:*:*:*:*:*", - "matchCriteriaId": "3FDAA778-942A-433F-88E5-359490AA28CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.40:*:*:*:*:*:*:*", - "matchCriteriaId": "5DC8A5AE-032F-49C7-B1D3-FA68351E9C3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.41:*:*:*:*:*:*:*", - "matchCriteriaId": "D0F554EB-CCF5-4779-B199-B5F54DDEF79A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.43:*:*:*:*:*:*:*", - "matchCriteriaId": "E2FD6008-65F5-4AA5-A824-674863D55F3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.44:*:*:*:*:*:*:*", - "matchCriteriaId": "21908446-BEEC-4E62-AC98-A29CC1130C71" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.45:*:*:*:*:*:*:*", - "matchCriteriaId": "66F24887-C173-4EEB-A299-104C1E3FA701" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.46:*:*:*:*:*:*:*", - "matchCriteriaId": "8040CC3D-FC71-4E9F-B47F-29C076A45783" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.48:*:*:*:*:*:*:*", - "matchCriteriaId": "E828CC88-B141-42C4-8A99-6B7D21AEB955" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "55711FD3-EF2E-4247-883B-03A40FD97612" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "91495846-B9D1-4EBD-9AB3-3B93B85AC279" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D2C17961-8069-4D62-ABC1-DCAB7329C3FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B2D742BF-6E32-4510-A484-EB478EE12132" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ED71E067-9788-4369-BD9B-DAC3AA1A26BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "344AAD16-48F8-470F-A292-1CA3D21A75D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AF6A591D-2AC6-4A28-B6CD-BD2A3F8D3C26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "95EC0A62-B604-4913-B52F-478FA03A5949" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "934198F1-D461-4881-B8C7-8CCECB730FA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E357084A-5E12-41E8-9944-1451A55A2D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B5D877E6-5623-41B0-BE45-4D8697DF1715" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EA3917D9-E072-4474-B236-AE25875AA509" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0561BA9E-415A-4D2A-95A2-0C4A706E19A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "52E4A054-1837-436E-A1BF-68FF5213EE91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B2CC50D9-10AC-4098-8C09-E46A3BB2DB2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "420D097B-8D7F-455A-8FFD-3D07722CB232" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FBBAE927-0B79-4EFA-BC6B-08134B03DAB6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "3B9CA5A8-6C58-44DA-8786-0A1784D73A0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "42E47AFC-3BC4-4B8D-AC45-D71A0DB8937C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "A81420A1-7B35-4C48-AF03-82F0ACDEC038" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "7FAC37E6-81AC-4B7C-9C8B-EE9AFB4EF36B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "CD9D1E08-2203-4C5D-A6CA-1041312AAAC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "874B8CDA-1A5B-4F26-B7DF-34204FD481CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "D9C2D047-BE9B-4A8C-A34E-77D9F1E4EEA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "D0481146-DDE9-4B0A-907E-867CCCA79F8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.35:*:*:*:*:*:*:*", - "matchCriteriaId": "EA8D47A5-60F7-48F7-B8D1-BCE9E9976CFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.37:*:*:*:*:*:*:*", - "matchCriteriaId": "6362C627-390E-4183-B6D2-981E0EA1C89F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.38:*:*:*:*:*:*:*", - "matchCriteriaId": "B3D4927A-2CC4-4BAD-B365-4844FDE85583" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.39:*:*:*:*:*:*:*", - "matchCriteriaId": "D1733786-193E-4107-A3E7-A640905A14EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.40:*:*:*:*:*:*:*", - "matchCriteriaId": "A9272CE2-6C53-4486-BBC5-1DABBBA3E609" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.41:*:*:*:*:*:*:*", - "matchCriteriaId": "44DD2A20-7E82-41D7-8DF0-5C4EF7550159" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.47:*:*:*:*:*:*:*", - "matchCriteriaId": "54039A5F-6CF5-45C5-A34E-5426BD5BBDE9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.48:*:*:*:*:*:*:*", - "matchCriteriaId": "9A4B5CFF-9F97-4F99-A07A-5E18019DB2DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.50:*:*:*:*:*:*:*", - "matchCriteriaId": "47C355F9-7B58-4CA6-AE00-7D985E2C647F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.52:*:*:*:*:*:*:*", - "matchCriteriaId": "0A2A893A-99DD-4892-9771-65BD52C6596A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.54:*:*:*:*:*:*:*", - "matchCriteriaId": "56279156-4E4C-4CEC-869A-E244CDC320FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.55:*:*:*:*:*:*:*", - "matchCriteriaId": "D984A56E-7B51-4D35-94AC-0395409C9E07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.56:*:*:*:*:*:*:*", - "matchCriteriaId": "F56FB13C-1AF0-411E-B341-7BAFF75B79B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.58:*:*:*:*:*:*:*", - "matchCriteriaId": "C0C8EF96-D9CB-44A6-A4DA-81C24319D6EA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "22038B43-6CE2-413A-8334-32BF9137E574" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "15464E33-3166-4401-993D-FEB12DBF0CC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "0BEAC68D-1A73-492B-A932-50048090A855" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "82EB29B3-F12B-41DC-B573-3FFC0EB9D26B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.19:*:*:*:*:*:*:*", - "matchCriteriaId": "41F732E6-A003-4B38-9057-A962C7EDFC6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.30:*:*:*:*:*:*:*", - "matchCriteriaId": "1AF57890-3CD7-41A3-A93A-4E3609CA1BF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D2183862-4E0A-4046-AA22-53B8CFFAE9C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B87C2BF2-D4F5-43FD-805C-B93D752ABAD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "21AF5911-BFE9-414B-AD39-F1E2E06377C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "02C8586E-8BBE-45FA-80AA-5C1F2AC79BD5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "4726A373-71E1-4E12-BEBB-62DF6293B45B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3:*:*:*:*:*:*:*", - "matchCriteriaId": "03F02586-FB92-4A39-8141-A9BD55C52D6B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D66B0B2F-B191-47A2-917E-AC4616CC39AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "88A3E2E8-2E7E-469F-B396-902706C5863F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "E247E151-E5C3-4A39-AA3F-BA77FBD743D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.13:*:*:*:*:*:*:*", - "matchCriteriaId": "73F35B92-5A4B-4194-A7F0-721E12F7A427" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "D7F58F94-4010-4B3F-BD37-5DB291BFC082" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.18:*:*:*:*:*:*:*", - "matchCriteriaId": "756045B0-6A52-4B98-9EE3-455A71F39034" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E2B09FED-126F-494A-BCAD-01B020B1C1B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "06B44703-0EDC-4E7C-B381-8016F354A3AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "71F1C7CE-8BFD-4270-BFE3-5479D6712484" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F1E9D7E5-8A81-432F-8B17-6CF95B2622B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "DFF2AF6B-13FD-4EED-8A53-FE417BDFF9AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "CBBBB059-A956-4C74-A4F4-1D1BEA5C42E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "DF3512B9-0995-4004-B6FB-921A01B48F59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "9A95F782-0124-427A-B838-CE16730537F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F328B623-F3E2-4EBF-86F8-854F8E683F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "BCD6F39C-4558-4A2B-95D0-F0C0EB691933" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E02DCB5D-818B-498E-B077-6C73568EC7A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8C65E767-7E10-45CE-B46D-32A512D37E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E9B33FEB-0DB6-4F2F-BCB8-67CB26C5F127" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "03700A91-CFC9-4038-AEC6-1D693F2577C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "929439FB-D5E7-4E13-979B-8F0E407E17B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.16:*:*:*:*:*:*:*", - "matchCriteriaId": "C107667C-A223-4EA1-ABB0-45E0AC6E0A1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.17:*:*:*:*:*:*:*", - "matchCriteriaId": "143F8F07-9B3B-4015-AC57-B17F007D92E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.21:*:*:*:*:*:*:*", - "matchCriteriaId": "A963BCC1-C1EF-4294-AF84-6969807E9B60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "52E31CF5-7241-4DC5-97F9-C2EFC9E44A90" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.1.28:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D20C10-2129-4AEE-87A1-05BD05690823" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D84F31E-6830-4B79-BC20-584E622E3861" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2A45DA2B-089E-476D-B2B5-18337AA54B6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "4CA21B4B-0D0D-4F43-AC83-D979EFCCCBAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "8D06B1D5-4CDE-406C-A667-1A2226B5229A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "01C7232A-EDE8-4AF1-BEF0-B1E32CB7FA3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "B727AF3E-0332-4708-A791-07609C159B3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0FB43006-7ADB-4A2A-9F25-2AA15EFF12A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C9AD0F0D-4E30-42ED-AAD5-2B910703E92D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "381D4076-593A-4A0B-B889-2A7A24566E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.15:*:*:*:*:*:*:*", - "matchCriteriaId": "795BFE71-D25D-4B46-BCCC-F130BEEA4244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.19:*:*:*:*:*:*:*", - "matchCriteriaId": "1E77F26B-0367-4242-BB76-87CC94E5586C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.23:*:*:*:*:*:*:*", - "matchCriteriaId": "1EFBEFEC-27C0-40A9-82EC-FCC32656C2E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DEF1F7B4-E4EC-4A4B-9E1A-3DD040CB1336" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "4D9F9738-5EAA-4A38-928F-83386F37042E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "5E0C8A97-27C9-4DB0-A6B4-A281741DAF88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "1C460231-555D-4AB8-A262-F26CB2CC48D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "848C6044-C8DF-4BA3-9C58-096AC6C847DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9CDBB14-52F1-4FD7-8971-433650DF9944" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.38:*:*:*:*:*:*:*", - "matchCriteriaId": "9535E887-28C2-4F4D-BDAE-6FD2ECCDC26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1D5859D3-D831-44BB-A72C-E2509054BB6B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B2C7225F-B430-48DF-ACFF-61687A4A2448" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F02E16DE-FF05-4629-90E5-C26077BA9100" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "113B5A3A-C36B-4A5E-8B24-D7706F496DAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D086EF92-21C5-4F14-BEBB-A35648E6DA1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "6D758AFC-A874-4137-800A-B8E1630DAA81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AA2E52-0636-47E4-BA09-BAAACE9C9DC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FC35A95F-6F7D-4767-856D-7CE8D214520F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.30:*:*:*:*:*:*:*", - "matchCriteriaId": "AC285311-2538-4337-B87F-50264DC2F7CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.1:*:*:*:*:*:*:*", - "matchCriteriaId": "063B39F3-7D62-4E4A-864A-54EF5ADA46F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BE8AF564-B9A1-4236-BFED-C42B759EA1D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DBA7D1-6CFF-45BC-9342-8079E4624552" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "7748A078-8185-4C38-A47E-C44105C3EE3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FB406721-7B8D-48EC-9521-AC74D3877AF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "65D5E552-2677-4E8E-809E-53A6B1889154" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3:*:*:*:*:*:*:*", - "matchCriteriaId": "EFDDE002-A886-4C6D-9373-7FEB4D6B6A4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.39:*:*:*:*:*:*:*", - "matchCriteriaId": "28FA58BD-B33E-45EC-AA58-A33CEC12C6BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.46:*:*:*:*:*:*:*", - "matchCriteriaId": "373DE7AE-EF8A-47C2-8BAF-25E6C762EEB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.53:*:*:*:*:*:*:*", - "matchCriteriaId": "2973DA5E-B5EE-430F-93CD-E9288C5BF3FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F9362F3E-9E96-47D0-B059-A4A350E2BC77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1:*:*:*:*:*:*:*", - "matchCriteriaId": "98FFEC19-5D89-414A-94C4-744C72E057B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "09635D47-0FD8-46EE-ADF8-D7C191C67F19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "2678EC5C-F330-485E-9901-2AB410E10581" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.12:*:*:*:*:*:*:*", - "matchCriteriaId": "D1EC0911-A71B-43CC-8C48-0292E518E157" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.18:*:*:*:*:*:*:*", - "matchCriteriaId": "2BE9BF7D-C928-402C-A90D-B35AF4210B7F" + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E08AAC-9C5E-4D18-817C-C466D1D6C4DE" } ] } diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20993.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20993.json index 3a6ebb00f57..d378c98502a 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20993.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20993.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20993", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:12.130", - "lastModified": "2024-11-21T07:41:57.913", + "lastModified": "2025-02-24T15:15:11.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21013.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21013.json index dde53f30241..e72b6dacfdf 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21013.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21013.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21013", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:13.037", - "lastModified": "2024-11-21T07:42:00.110", + "lastModified": "2025-02-24T15:15:11.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21020.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21020.json index 7f8cf2e278c..c1f01623ffd 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21020.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21020", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:13.287", - "lastModified": "2024-11-21T07:42:00.867", + "lastModified": "2025-02-24T15:15:11.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21047.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21047.json index a24b1c2315c..02fd953427e 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21047.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21047", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.197", - "lastModified": "2024-11-21T07:42:03.770", + "lastModified": "2025-02-24T15:15:11.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21715.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21715.json index 88bac37e456..a26d6679519 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21715.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21715.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21715", "sourceIdentifier": "secure@microsoft.com", "published": "2023-02-14T20:15:14.280", - "lastModified": "2025-02-04T17:15:11.147", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:46:48.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json index 81507f2ceae..4c2652d5b2c 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24880", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:17.683", - "lastModified": "2025-02-04T15:15:16.667", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:48:01.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28470.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28470.json index be9ef647c49..9e7a6198544 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28470.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28470.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28470", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-23T01:15:12.317", - "lastModified": "2024-11-21T07:55:09.477", + "lastModified": "2025-02-24T16:15:11.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28679.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28679.json index aed47a0a566..a5e5482a5b2 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28679.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28679.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28679", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-04-02T21:15:09.240", - "lastModified": "2024-11-21T07:55:47.547", + "lastModified": "2025-02-24T15:15:12.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json index 534dee2756b..710561962e6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35311.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35311", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:17.177", - "lastModified": "2025-02-04T18:15:34.150", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:45:28.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -82,16 +82,6 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-367" - } - ] - }, - { - "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -101,7 +91,7 @@ ] }, { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -109,6 +99,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json index 498d232e403..41dee6b084a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10763", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:12.943", - "lastModified": "2025-02-13T05:15:12.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T16:41:26.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apuswp:campress:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.35", + "matchCriteriaId": "E46EEC69-2827-4E8B-95EF-DB1C69881C09" + } + ] + } + ] } ], "references": [ { "url": "https://themeforest.net/item/campress-responsive-education-courses-and-events-wordpress-theme/19355619", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d818b467-a893-4f4f-b623-abff99ef37b4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json index 2a92b763dde..83c1436e6f5 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12041", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:29.527", - "lastModified": "2025-02-01T06:15:29.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:05:18.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -42,27 +62,64 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-359" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.1", + "matchCriteriaId": "54E6D716-FD5C-4A7F-AA25-541983BA57E9" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3208874/directorist/tags/8.0.9/includes/rest-api/Version1/class-users-controller.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3231156/directorist/tags/8.1/includes/rest-api/Version1/class-users-controller.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d9817ff-ca56-4941-97bc-f26defe7ddd5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json index 597c2427be3..4ff079116ca 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12184", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.443", - "lastModified": "2025-02-01T04:15:30.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:48:58.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cimatti:wordpress_contact_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.5", + "matchCriteriaId": "76073E28-ABA2-4035-80A2-DF1E6C0B121A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3231363%40contact-forms&new=3231363%40contact-forms&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3232168%40contact-forms&new=3232168%40contact-forms&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/695df547-f068-4ac1-926f-80dbf75632dd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json index b6f131cd6f2..bbd5ae6f4e4 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12620", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.583", - "lastModified": "2025-02-01T04:15:30.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:41:10.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativeinteractivemedia:animategl_animations:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.23", + "matchCriteriaId": "769B6217-EA5F-436C-9EEE-FA4DC3F60A91" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/animategl/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/841a028d-ff36-4e3f-903b-e25951648075?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12916.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12916.json new file mode 100644 index 00000000000..f46690b4ddc --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12916.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12916", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-02-24T15:15:12.240", + "lastModified": "2025-02-24T15:15:12.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Life4All allows SQL Injection.This issue affects Life4All: before 10.01.2025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0042", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12917.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12917.json new file mode 100644 index 00000000000..45b847b19b5 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12917.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12917", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-02-24T15:15:12.383", + "lastModified": "2025-02-24T15:15:12.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Files or Directories Accessible to External Parties vulnerability in Agito Computer Health4All allows Exploiting Incorrectly Configured Access Control Security Levels, Authentication Abuse.This issue affects Health4All: before 10.01.2025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0042", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12918.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12918.json new file mode 100644 index 00000000000..fcdd6b3bf21 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12918.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12918", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-02-24T15:15:12.537", + "lastModified": "2025-02-24T15:15:12.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Health4All allows SQL Injection.This issue affects Health4All: before 10.01.2025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0042", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json index 8cbfc247904..f03ff6794d6 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13227.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13227", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T05:15:13.727", - "lastModified": "2025-02-13T05:15:13.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T16:44:13.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,26 +71,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.0.236", + "matchCriteriaId": "B4C1FD19-885F-49CB-BFA6-37BD2D7FBA26" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/seo-by-rank-math/trunk/includes/rest/class-shared.php#L257", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3222905/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://rankmath.com/changelog/free/page/2/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://wordpress.org/plugins/seo-by-rank-math/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24df10fb-5143-478e-90f0-27f604ad43ee?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json index 1e4c6514378..d4ac8238eba 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13343.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13343", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.717", - "lastModified": "2025-02-01T04:15:30.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:21:30.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanquish:woocommerce_customers_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "31.4", + "matchCriteriaId": "ADA0EC91-5D22-4D0C-A1A2-687283717151" + } + ] + } + ] } ], "references": [ { "url": "https://codecanyon.net/item/woocommerce-customers-manager/10965432", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/193c9fe9-17bc-47e7-b93d-dfcebcf8004d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json index 0028ed040b4..eff4b7b3fd3 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13374", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.303", - "lastModified": "2025-02-12T06:15:19.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:55:44.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomunited:wp_table_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.4", + "matchCriteriaId": "12FC9BA5-82CC-4871-A715-A19104A94402" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.joomunited.com/wordpress-products/wp-table-manager", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/128bc7ee-9763-415f-b726-0e63d4b62271?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json index 3ae30c84be0..c321576726d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13547", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T04:15:30.857", - "lastModified": "2025-02-01T04:15:30.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:16:56.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:athemes:athemes_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.0.13", + "matchCriteriaId": "536B04BA-5EEC-417F-AD26-7556503676A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3230740/athemes-addons-for-elementor-lite/trunk/inc/modules/widgets/image-accordion/class-image-accordion.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e0f7686-1c8c-49d6-9d0b-3c8df6c24d0d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json index 9f99c46ae48..ec0aa7ccc63 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13573", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-18T05:15:14.007", - "lastModified": "2025-02-18T05:15:14.007", - "vulnStatus": "Received", + "lastModified": "2025-02-24T15:40:57.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softdiscover:zigaform:*:*:*:*:lite:wordpress:*:*", + "versionEndIncluding": "7.4.2", + "matchCriteriaId": "928A5CA9-ED04-449E-A239-077D638B0B3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/zigaform-form-builder-lite/trunk/modules/formbuilder/controllers/uiform-fb-controller-frontend.php#L366", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/768d0ef5-5213-4283-b95e-ddfe0d2196bf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json index 175e227bf17..80821f33836 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13576", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-18T05:15:14.157", - "lastModified": "2025-02-18T05:15:14.157", - "vulnStatus": "Received", + "lastModified": "2025-02-24T15:42:32.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adityapatadia:gumlet_video:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "373BB5ED-03A5-4318-BBE2-BD98ED3105DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gumlet-video/tags/1.0.3/gumlet-video.php#L112", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b8b94fc-9ae7-47f3-b804-92d0948b662e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json index 50c009d8810..d98a78d6a6b 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13600", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T06:15:19.643", - "lastModified": "2025-02-12T06:15:19.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:56:30.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,27 +42,64 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:majesticsupport:majestic_support:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.6", + "matchCriteriaId": "1C81ADD0-65E9-4F00-98B4-3B2E0443AD50" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/majestic-support/tags/1.0.5/includes/classes/uploads.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3231938/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a8fd90-49dd-4a5e-88f2-cd6b338da2d6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json index a4a60dc0a95..3bfa86ef7b7 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13654", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:11.987", - "lastModified": "2025-02-12T05:15:11.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:45:29.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mvpthemes:zoxpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.12.1", + "matchCriteriaId": "916710F8-20C4-4DDB-AE61-C1DE6852390E" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/zoxpress-allinone-wordpress-news-theme/25586170", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f616be03-229b-4c50-b837-508da4d2b090?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json index dae331665e2..103472ca808 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13656", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.143", - "lastModified": "2025-02-12T05:15:12.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:46:39.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mvpthemes:click_mag:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.7.0", + "matchCriteriaId": "58DF9EAA-88DD-4E4C-BF8F-B770B958A2F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/click-mag-viral-wordpress-news-magazineblog-theme/18081003", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ee5df5fe-4213-4d36-aa8f-7eb2710c32b6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json index dad4bffc410..159edac4017 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13658", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.320", - "lastModified": "2025-02-12T05:15:12.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:49:58.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpo-hr:ngg_smart_image_search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.2", + "matchCriteriaId": "BA5220BA-971E-487F-9490-31CDB7330103" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3233519%40ngg-smart-image-search&new=3233519%40ngg-smart-image-search&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d916e320-e78b-4305-a4da-10c6fb8db41a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json index c29b6f203e9..f8a9af524d3 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13665", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.483", - "lastModified": "2025-02-12T05:15:12.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:51:18.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:admire_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7", + "matchCriteriaId": "3B6EDE5C-E03D-4E0D-B161-C1EC47F6F5AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3233979%40admire-extra&new=3233979%40admire-extra", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf682127-4b97-44ce-a94d-3a237c5af1cc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json index 8bd0ade95b4..b59b9387ea0 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13769", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.637", - "lastModified": "2025-02-12T05:15:12.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:54:05.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,29 +36,83 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themerex:puzzles:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.5", + "matchCriteriaId": "5AAE3046-FED7-4569-A768-9BC8A285190C" + } + ] + } + ] } ], "references": [ { "url": "https://themeforest.net/item/puzzles-wordpress-magazinereview-with-wooc/5690583", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c22d064-348d-4335-beaf-22dcdcf88518?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json index 18630ce02ac..edff87c4769 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13800", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T05:15:12.810", - "lastModified": "2025-02-12T05:15:12.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T15:55:09.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:convertplug:convertplus:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.31", + "matchCriteriaId": "D487C5EA-9EF9-4B42-BEA2-47AAD239DA76" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.convertplug.com/plus/product/convertplug/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/580ae2da-76f2-42b3-a26c-62ad8d6d1686?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json index 8b8ef9cf3d5..4222a6562cc 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30040", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:12.410", - "lastModified": "2025-01-28T17:15:24.213", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T15:50:23.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -76,7 +76,7 @@ }, { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -86,7 +86,7 @@ }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json index ccfe1eafed3..9a9ed788e1b 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json @@ -2,13 +2,13 @@ "id": "CVE-2024-54772", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.117", - "lastModified": "2025-02-12T22:15:40.110", + "lastModified": "2025-02-24T16:15:12.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue was discovered in the Winbox service of MikroTik RouterOS v6.43 through v7.16.1. A discrepancy in response times between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts." + "value": "An issue was discovered in the Winbox service of MikroTik RouterOS long-term release v6.43.13 through v6.49.13 and stable v6.43 through v7.17.2. A patch is available in the stable release v6.49.18. A discrepancy in response size between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56897.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56897.json new file mode 100644 index 00000000000..9291520e82d --- /dev/null +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56897.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-56897", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-24T16:15:12.463", + "lastModified": "2025-02-24T16:15:12.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the HTTP server in YI Car Dashcam v3.88 allows unrestricted file downloads, uploads, and API commands. API commands can also be made to make unauthorized modifications to the device settings, such as disabling recording, disabling sounds, factory reset." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://geochen.medium.com/cve-2024-56897-yi-car-dashcam-39304a4b21b4", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/geo-chen/YI-Smart-Dashcam/", + "source": "cve@mitre.org" + }, + { + "url": "https://yitechnology.com.sg/products/dash-camera/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json index d3c43d8b10e..601e9c4c781 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56938", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.430", - "lastModified": "2025-02-14T20:15:33.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:33:42.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:learndash:learndash:6.7.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "ECD966AA-D79D-4986-A978-EFF6D03AE45B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/nikolas-ch/CVEs/blob/main/LearnDash_v6.7.1/CVE-2024-56938/StoredXSS_MaterialsContent_LearnDash_v6.7.1.PNG", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json index 65e4e5f416c..e858fc17dae 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56939", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.530", - "lastModified": "2025-02-14T20:15:34.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:34:05.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:learndash:learndash:6.7.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "ECD966AA-D79D-4986-A978-EFF6D03AE45B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/nikolas-ch/CVEs/blob/main/LearnDash_v6.7.1/CVE-2024-56939/StoredXSS_LDCommentBody_LearnDash_v6.7.1.PNG", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json index c75ae8ae323..6bf378ab3f8 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56940", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.643", - "lastModified": "2025-02-18T18:15:27.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:34:30.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Un problema en la funci\u00f3n de carga de im\u00e1genes de perfil de LearnDash v6.7.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante cargas excesivas de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:learndash:learndash:6.7.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "ECD966AA-D79D-4986-A978-EFF6D03AE45B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json index 7080f0c7719..10a922aec02 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57602", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.867", - "lastModified": "2025-02-12T22:15:40.867", - "vulnStatus": "Received", + "lastModified": "2025-02-24T16:40:27.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Un problema en Alex Tselegidis EasyAppointments v.1.5.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del archivo index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easyappointments:easyappointments:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EDEF4F7C-3B6E-4278-81C6-77D85F626E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://hkohi.ca/vulnerability/12", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json index 6afda979a44..8b6120051fd 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6097", "sourceIdentifier": "security@progress.com", "published": "2025-02-12T18:15:21.977", - "lastModified": "2025-02-12T18:15:21.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T16:31:32.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@progress.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-36" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0.25.211", + "matchCriteriaId": "402A86E7-1D88-4985-86FB-D91E0F63F795" + } + ] + } + ] } ], "references": [ { "url": "https://docs.telerik.com/reporting/knowledge-base/kb-security-absolute-path-traversal-CVE-2024-6097", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json index 046a45045f3..586cfb09579 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0365.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0365", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:31.213", - "lastModified": "2025-02-01T06:15:31.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:56:57.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.8", + "matchCriteriaId": "E0A7CCAB-3FA9-4EFE-8BD2-5C479D5E3EF3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/inline-svg/widgets/inline-svg.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bc5ef7-6825-463f-a3ce-d6ab1fc0e030?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json index 6b5471a6e9c..d26f355d8f6 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0366.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0366", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T06:15:31.367", - "lastModified": "2025-02-01T06:15:31.367", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T15:56:36.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,27 +42,64 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.8", + "matchCriteriaId": "E0A7CCAB-3FA9-4EFE-8BD2-5C479D5E3EF3" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/video/widgets/video.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a20dc1d-eb7c-47ac-ad9a-ec4c0d5db62e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json index 4fe82cd603d..d6641b463cf 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1197", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:08.983", - "lastModified": "2025-02-18T18:15:33.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T16:15:20.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/YinshengLu/CVE/blob/main/cve3.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295105", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295105", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496856", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1555.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1555.json index 09e601951e9..66ccd92d854 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1555.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1555.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1555", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-21T21:15:13.703", - "lastModified": "2025-02-21T21:15:13.703", + "lastModified": "2025-02-24T15:15:12.810", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. This vulnerability affects the function saveImage. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en hzmanyun Education and Training System 3.1.1. Esta vulnerabilidad afecta a la funci\u00f3n saveImage. La manipulaci\u00f3n del archivo de argumentos permite la carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.496932", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1632.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1632.json index 955f27b5e0a..4c1c58cc029 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1632.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1632.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1632", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-24T14:15:11.590", - "lastModified": "2025-02-24T14:15:11.590", + "lastModified": "2025-02-24T15:15:13.217", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.496460", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23017.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23017.json new file mode 100644 index 00000000000..0a7d509696b --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23017.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2025-23017", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-24T15:15:13.393", + "lastModified": "2025-02-24T16:15:14.420", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "WorkOS Hosted AuthKit before 2025-01-07 allows a password authentication MFA bypass (by enrolling a new authentication factor) when the attacker knows the user's password. No exploitation occurred." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "https://workos.com/security/advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://www.authkit.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24527.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24527.json index 7c3362e82e1..8ef890976d0 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24527.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24527.json @@ -2,9 +2,16 @@ "id": "CVE-2025-24527", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-29T17:15:29.873", - "lastModified": "2025-02-06T08:15:30.500", + "lastModified": "2025-02-24T16:15:14.683", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "exclusively-hosted-service" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25282.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25282.json index 0a505193afa..7dfbe681d6b 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25282.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25282.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25282", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-21T21:15:23.590", - "lastModified": "2025-02-21T21:15:23.590", + "lastModified": "2025-02-24T15:15:13.620", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET //user/list), add user account to other tenant (POST //user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix." + }, + { + "lang": "es", + "value": "RAGFlow es un motor RAG (Retrieval-Augmented Generation) de c\u00f3digo abierto basado en una comprensi\u00f3n profunda de los documentos. Un usuario autenticado puede explotar la vulnerabilidad de referencia directa a objetos inseguros (IDOR) que puede provocar un acceso no autorizado entre inquilinos (enumerar cuentas de usuario de inquilinos, agregar una cuenta de usuario a otro inquilino). Acceso no autorizado entre inquilinos: enumerar usuarios de otros inquilinos (por ejemplo, a trav\u00e9s de GET //user/list), agregar una cuenta de usuario a otro inquilino (POST //user). Este problema a\u00fan no se ha solucionado. Se recomienda a los usuarios que se pongan en contacto con los encargados del mantenimiento del proyecto para coordinar una soluci\u00f3n." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +55,10 @@ { "url": "https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25460.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25460.json new file mode 100644 index 00000000000..7114d9bc368 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25460.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25460", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-24T16:15:14.873", + "lastModified": "2025-02-24T16:15:14.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored Cross-Site Scripting (XSS) vulnerability was identified in FlatPress 1.3.1 within the \"Add Entry\" feature. This vulnerability allows authenticated attackers to inject malicious JavaScript payloads into blog posts, which are executed when other users view the posts. The issue arises due to improper input sanitization of the \"TextArea\" field in the blog entry submission form." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25460", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/flatpressblog/flatpress", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json index 23dc23205bb..5a18ec7a1e9 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25746", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.500", - "lastModified": "2025-02-12T17:15:24.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-24T16:30:37.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,79 @@ "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro Contrase\u00f1a en el m\u00f3dulo SetWanSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-853_firmware:1.20b07:*:*:*:*:*:*:*", + "matchCriteriaId": "DD86F202-BD48-4C40-97C1-8D74422FF28E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-853:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "8B2B23D3-C719-4537-9F25-7302A7159F9A" + } + ] + } + ] + } + ], "references": [ { "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-5-1812386a66448044b489f223b8c2e78a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json new file mode 100644 index 00000000000..971da6125da --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26803.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-26803", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-24T16:15:15.020", + "lastModified": "2025-02-24T16:15:15.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://blog.phusion.nl/2025/02/19/passenger-6-0-26/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/phusion/passenger/releases/tag/release-6.0.26", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phusionpassenger.com/support", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26883.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26883.json new file mode 100644 index 00000000000..eb11516fd4e --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26883.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26883", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.007", + "lastModified": "2025-02-24T15:15:14.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in bPlugins Animated Text Block allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Animated Text Block: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/animated-text-block/vulnerability/wordpress-animated-text-block-plugin-1-0-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27265.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27265.json new file mode 100644 index 00000000000..047dcf1b4b1 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27265.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27265", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.310", + "lastModified": "2025-02-24T15:15:14.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aaron D. Campbell Google Maps for WordPress allows DOM-Based XSS. This issue affects Google Maps for WordPress: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-maps-for-wordpress/vulnerability/wordpress-google-maps-for-wordpress-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27266.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27266.json new file mode 100644 index 00000000000..b7c4fa2240d --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27266.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27266", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.443", + "lastModified": "2025-02-24T15:15:14.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ignacio Perez Hover Image Button allows DOM-Based XSS. This issue affects Hover Image Button: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hover-image-button/vulnerability/wordpress-hover-image-button-plugin-1-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27272.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27272.json new file mode 100644 index 00000000000..0c1794e43e3 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27272.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27272", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.587", + "lastModified": "2025-02-24T15:15:14.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in vinagecko VG PostCarousel allows PHP Local File Inclusion. This issue affects VG PostCarousel: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vg-postcarousel/vulnerability/wordpress-vg-postcarousel-plugin-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27276.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27276.json new file mode 100644 index 00000000000..013c501bcc0 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27276.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27276", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.730", + "lastModified": "2025-02-24T15:15:14.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in lizeipe Photo Gallery ( Responsive ) allows Privilege Escalation. This issue affects Photo Gallery ( Responsive ): from n/a through 4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/photo-gallery-pearlbells/vulnerability/wordpress-photo-gallery-responsive-plugin-4-0-csrf-to-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27277.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27277.json new file mode 100644 index 00000000000..494ed5a3bd6 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27277.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27277", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:14.867", + "lastModified": "2025-02-24T15:15:14.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in tiefpunkt Add Linked Images To Gallery allows Cross Site Request Forgery. This issue affects Add Linked Images To Gallery: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/add-linked-images-to-gallery-v01/vulnerability/wordpress-add-linked-images-to-gallery-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27280.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27280.json new file mode 100644 index 00000000000..6a538f48d58 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27280.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27280", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.007", + "lastModified": "2025-02-24T15:15:15.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alobaidi Archive Page allows DOM-Based XSS. This issue affects Archive Page: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/archive-page/vulnerability/wordpress-archive-page-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27290.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27290.json new file mode 100644 index 00000000000..a5196dbe140 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27290.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27290", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.153", + "lastModified": "2025-02-24T15:15:15.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in seyyed-amir Erima Zarinpal Donate allows Cross Site Request Forgery. This issue affects Erima Zarinpal Donate: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/erima-zarinpal-donate/vulnerability/wordpress-select-erima-zarinpal-donate-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27294.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27294.json new file mode 100644 index 00000000000..f8112c31466 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27294.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27294", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.287", + "lastModified": "2025-02-24T15:15:15.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in platcom WP-Asambleas allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP-Asambleas: from n/a through 2.85.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-asambleas/vulnerability/wordpress-wp-asambleas-plugin-2-85-0-arbitrary-shortcode-execution-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27296.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27296.json new file mode 100644 index 00000000000..fe4b6c7e1df --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27296.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27296", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.423", + "lastModified": "2025-02-24T15:15:15.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in revenueflex Auto Ad Inserter \u2013 Increase Google Adsense and Ad Manager Revenue allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Auto Ad Inserter \u2013 Increase Google Adsense and Ad Manager Revenue: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/revenueflex-easy-ads/vulnerability/wordpress-auto-ad-inserter-increase-google-adsense-and-ad-manager-revenue-plugin-1-5-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27297.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27297.json new file mode 100644 index 00000000000..61013a7678e --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27297.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27297", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.567", + "lastModified": "2025-02-24T15:15:15.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in guelben Bravo Search & Replace allows Blind SQL Injection. This issue affects Bravo Search & Replace: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bravo-search-and-replace/vulnerability/wordpress-bravo-search-replace-plugin-1-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27298.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27298.json new file mode 100644 index 00000000000..7b485ee36c2 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27298.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27298", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.703", + "lastModified": "2025-02-24T15:15:15.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in cmstactics WP Video Posts allows OS Command Injection. This issue affects WP Video Posts: from n/a through 3.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-video-posts/vulnerability/wordpress-wp-video-posts-plugin-3-5-1-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27300.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27300.json new file mode 100644 index 00000000000..a50fd8421c2 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27300.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27300", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.853", + "lastModified": "2025-02-24T15:15:15.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in giuliopanda ADFO allows Object Injection. This issue affects ADFO: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/admin-form/vulnerability/wordpress-adfo-plugin-1-9-1-deserialization-of-untrusted-data-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27301.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27301.json new file mode 100644 index 00000000000..fce2d8bb68f --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27301.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27301", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:15.983", + "lastModified": "2025-02-24T15:15:15.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Nazmul Hasan Robin NHR Options Table Manager allows Object Injection. This issue affects NHR Options Table Manager: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nhrrob-options-table-manager/vulnerability/wordpress-nhr-options-table-manager-plugin-1-1-2-deserialization-of-untrusted-data-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27303.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27303.json new file mode 100644 index 00000000000..bfdba1efdb5 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27303.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27303", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.123", + "lastModified": "2025-02-24T15:15:16.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themelogger Contact Form 7 Star Rating allows Stored XSS. This issue affects Contact Form 7 Star Rating: from n/a through 1.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contact-form-7-star-rating/vulnerability/wordpress-contact-form-7-star-rating-plugin-1-10-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27304.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27304.json new file mode 100644 index 00000000000..fedbce83a54 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27304.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27304", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.260", + "lastModified": "2025-02-24T15:15:16.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themelogger Contact Form 7 Star Rating with font Awesome allows Stored XSS. This issue affects Contact Form 7 Star Rating with font Awesome: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contact-form-7-star-rating-with-font-awersome/vulnerability/wordpress-contact-form-7-star-rating-with-font-awesome-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27305.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27305.json new file mode 100644 index 00000000000..8204ef00821 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27305.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27305", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.387", + "lastModified": "2025-02-24T15:15:16.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Achal Jain Table of Contents Block allows Stored XSS. This issue affects Table of Contents Block: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/table-of-contents/vulnerability/wordpress-table-of-contents-block-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27306.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27306.json new file mode 100644 index 00000000000..0d06d76adbb --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27306.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27306", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.523", + "lastModified": "2025-02-24T15:15:16.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pathomation Pathomation allows Stored XSS. This issue affects Pathomation: from n/a through 2.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pathomation/vulnerability/wordpress-pathomation-plugin-2-5-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27307.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27307.json new file mode 100644 index 00000000000..35ba74bedb0 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27307.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27307", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.653", + "lastModified": "2025-02-24T15:15:16.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in oooorgle Quotes llama allows Reflected XSS. This issue affects Quotes llama: from n/a through 3.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/quotes-llama/vulnerability/wordpress-quotes-llama-plugin-3-0-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27311.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27311.json new file mode 100644 index 00000000000..47854890d08 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27311.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27311", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.783", + "lastModified": "2025-02-24T15:15:16.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in luk3thomas Bulk Content Creator allows Cross Site Request Forgery. This issue affects Bulk Content Creator: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bulk-content-creator/vulnerability/wordpress-bulk-content-creator-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27312.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27312.json new file mode 100644 index 00000000000..8453f29f21b --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27312.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27312", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:16.917", + "lastModified": "2025-02-24T15:15:16.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jenst WP Sitemap allows SQL Injection. This issue affects WP Sitemap: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-sitemap/vulnerability/wordpress-wp-sitemap-plugin-1-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27315.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27315.json new file mode 100644 index 00000000000..e8ff2cc6881 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27315.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27315", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.047", + "lastModified": "2025-02-24T15:15:17.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wptom All-In-One Cufon allows Cross Site Request Forgery. This issue affects All-In-One Cufon: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/all-in-one-cufon/vulnerability/wordpress-all-in-one-cufon-plugin-1-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27316.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27316.json new file mode 100644 index 00000000000..f08a89c5a29 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27316.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27316", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.193", + "lastModified": "2025-02-24T15:15:17.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in hosting.io JPG, PNG Compression and Optimization allows Cross Site Request Forgery. This issue affects JPG, PNG Compression and Optimization: from n/a through 1.7.35." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-image-compression/vulnerability/wordpress-jpg-png-compression-and-optimization-plugin-1-7-35-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27317.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27317.json new file mode 100644 index 00000000000..04b76a3be37 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27317.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27317", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.353", + "lastModified": "2025-02-24T15:15:17.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in IT-RAYS RAYS Grid allows Cross Site Request Forgery. This issue affects RAYS Grid: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rays-grid/vulnerability/wordpress-rays-grid-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27318.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27318.json new file mode 100644 index 00000000000..9296d39a6ad --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27318.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27318", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.487", + "lastModified": "2025-02-24T15:15:17.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ixiter Simple Google Sitemap allows Cross Site Request Forgery. This issue affects Simple Google Sitemap: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-google-sitemap/vulnerability/wordpress-simple-google-sitemap-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27320.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27320.json new file mode 100644 index 00000000000..c747d6a60a4 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27320.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27320", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.620", + "lastModified": "2025-02-24T15:15:17.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pankaj Mondal Profile Widget Ninja allows DOM-Based XSS. This issue affects Profile Widget Ninja: from n/a through 4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/profile-widget-ninja/vulnerability/wordpress-profile-widget-ninja-plugin-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27321.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27321.json new file mode 100644 index 00000000000..cfc801b07f5 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27321.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27321", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.753", + "lastModified": "2025-02-24T15:15:17.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Blighty Blightly Explorer allows Stored XSS. This issue affects Blightly Explorer: from n/a through 2.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/blighty-explorer/vulnerability/wordpress-blightly-explorer-plugin-2-3-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27323.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27323.json new file mode 100644 index 00000000000..b79eef81b6b --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27323.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27323", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:17.887", + "lastModified": "2025-02-24T15:15:17.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jon Bishop WP About Author allows DOM-Based XSS. This issue affects WP About Author: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-about-author/vulnerability/wordpress-wp-about-author-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27325.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27325.json new file mode 100644 index 00000000000..e4bae282a60 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27325.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27325", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.033", + "lastModified": "2025-02-24T15:15:18.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bruce Video.js HLS Player allows DOM-Based XSS. This issue affects Video.js HLS Player: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/videojs-hls-player/vulnerability/wordpress-video-js-hls-player-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27327.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27327.json new file mode 100644 index 00000000000..0f3edc97d4e --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27327.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27327", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.180", + "lastModified": "2025-02-24T15:15:18.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Winlin Live Streaming Video Player \u2013 by SRS Player allows DOM-Based XSS. This issue affects Live Streaming Video Player \u2013 by SRS Player: from n/a through 1.0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/srs-player/vulnerability/wordpress-live-streaming-video-player-by-srs-player-plugin-1-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27328.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27328.json new file mode 100644 index 00000000000..32dc64a86b7 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27328.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27328", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.337", + "lastModified": "2025-02-24T15:15:18.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in queeez WP-PostRatings Cheater allows Cross Site Request Forgery. This issue affects WP-PostRatings Cheater: from n/a through 1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-postratings-cheater/vulnerability/wordpress-wp-postratings-cheater-plugin-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27329.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27329.json new file mode 100644 index 00000000000..ee29d73d843 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27329.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27329", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.493", + "lastModified": "2025-02-24T15:15:18.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in inlinkz EZ InLinkz linkup allows DOM-Based XSS. This issue affects EZ InLinkz linkup: from n/a through 0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/inlinkz-scripter/vulnerability/wordpress-ez-inlinkz-linkup-plugin-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27330.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27330.json new file mode 100644 index 00000000000..b7eaf3615ec --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27330.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27330", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.660", + "lastModified": "2025-02-24T15:15:18.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PlayerJS PlayerJS allows DOM-Based XSS. This issue affects PlayerJS: from n/a through 2.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/playerjs/vulnerability/wordpress-playerjs-plugin-2-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27331.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27331.json new file mode 100644 index 00000000000..aeccdd214ca --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27331.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27331", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.827", + "lastModified": "2025-02-24T15:15:18.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in S\u00e9bastien Dumont WooCommerce Display Products by Tags allows DOM-Based XSS. This issue affects WooCommerce Display Products by Tags: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-display-products-by-tags/vulnerability/wordpress-woocommerce-display-products-by-tags-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27332.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27332.json new file mode 100644 index 00000000000..588ad84b0e7 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27332.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27332", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:18.997", + "lastModified": "2025-02-24T15:15:18.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in gmnazmul Smart Maintenance & Countdown allows Stored XSS. This issue affects Smart Maintenance & Countdown: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/smart-maintenance-countdown/vulnerability/wordpress-smart-maintenance-countdown-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27335.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27335.json new file mode 100644 index 00000000000..1b7c9f98c6a --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27335.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27335", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.137", + "lastModified": "2025-02-24T15:15:19.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Free plug in by SEO Roma Auto Tag Links allows Cross Site Request Forgery. This issue affects Auto Tag Links: from n/a through 1.0.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/auto-tag-links/vulnerability/wordpress-auto-tag-links-plugin-1-0-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27336.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27336.json new file mode 100644 index 00000000000..6202e6aba66 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27336.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27336", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.283", + "lastModified": "2025-02-24T15:15:19.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Alex Prokopenko / JustCoded Just Variables allows Cross Site Request Forgery. This issue affects Just Variables: from n/a through 1.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/just-wp-variables/vulnerability/wordpress-just-variables-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27339.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27339.json new file mode 100644 index 00000000000..f01e8c8fdfe --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27339.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27339", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.430", + "lastModified": "2025-02-24T15:15:19.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Will Anderson Minimum Password Strength allows Cross Site Request Forgery. This issue affects Minimum Password Strength: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/minimum-password-strength/vulnerability/wordpress-minimum-password-strength-plugin-1-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27340.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27340.json new file mode 100644 index 00000000000..74f00d0aea8 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27340.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27340", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.567", + "lastModified": "2025-02-24T15:15:19.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Marc F12-Profiler allows Cross Site Request Forgery. This issue affects F12-Profiler: from n/a through 1.3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/f12-profiler/vulnerability/wordpress-f12-profiler-plugin-1-3-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27341.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27341.json new file mode 100644 index 00000000000..97d92cb9e92 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27341.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27341", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.703", + "lastModified": "2025-02-24T15:15:19.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in afzal_du Reactive Mortgage Calculator allows Stored XSS. This issue affects Reactive Mortgage Calculator: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/reactive-mortgage-calculator/vulnerability/wordpress-reactive-mortgage-calculator-plugin-1-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27342.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27342.json new file mode 100644 index 00000000000..35c8b4847d5 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27342.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27342", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.833", + "lastModified": "2025-02-24T15:15:19.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-recargo-de-equivalencia/vulnerability/wordpress-woocommerce-recargo-de-equivalencia-plugin-1-6-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27344.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27344.json new file mode 100644 index 00000000000..768dfd9835b --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27344.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27344", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:19.963", + "lastModified": "2025-02-24T15:15:19.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in filipstepanov Phee's LinkPreview allows Cross Site Request Forgery. This issue affects Phee's LinkPreview: from n/a through 1.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/linkpreview/vulnerability/wordpress-phee-s-linkpreview-plugin-1-6-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27347.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27347.json new file mode 100644 index 00000000000..a411342c735 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27347.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27347", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.097", + "lastModified": "2025-02-24T15:15:20.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in techmix Direct Checkout Button for WooCommerce allows Stored XSS. This issue affects Direct Checkout Button for WooCommerce: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-direct-checkout-button/vulnerability/wordpress-direct-checkout-button-for-woocommerce-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27348.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27348.json new file mode 100644 index 00000000000..9f5d0ccb060 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27348.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27348", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.230", + "lastModified": "2025-02-24T15:15:20.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel WP Social SEO Booster \u2013 Knowledge Graph Social Signals SEO allows Stored XSS. This issue affects WP Social SEO Booster \u2013 Knowledge Graph Social Signals SEO: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-social-seo-booster/vulnerability/wordpress-wp-social-seo-booster-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27349.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27349.json new file mode 100644 index 00000000000..fcb12a07ef6 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27349.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27349", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.363", + "lastModified": "2025-02-24T15:15:20.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nurelm Get Posts allows Stored XSS. This issue affects Get Posts: from n/a through 0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nurelm-get-posts/vulnerability/wordpress-get-posts-plugin-0-6-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27351.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27351.json new file mode 100644 index 00000000000..10dcbb3f00d --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27351.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27351", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.503", + "lastModified": "2025-02-24T15:15:20.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExpertBusinessSearch Local Search SEO Contact Page allows Stored XSS. This issue affects Local Search SEO Contact Page: from n/a through 4.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/local-search-seo-contact-page/vulnerability/wordpress-local-search-seo-contact-page-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27352.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27352.json new file mode 100644 index 00000000000..20fbb3073f9 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27352.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27352", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.643", + "lastModified": "2025-02-24T15:15:20.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wumii team \u65e0\u89c5\u76f8\u5173\u6587\u7ae0\u63d2\u4ef6 allows Stored XSS. This issue affects \u65e0\u89c5\u76f8\u5173\u6587\u7ae0\u63d2\u4ef6: from n/a through 1.0.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wumii-related-posts/vulnerability/wordpress-plugin-1-0-5-7-csrf-to-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27353.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27353.json new file mode 100644 index 00000000000..b5601ff8c4c --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27353.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27353", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.780", + "lastModified": "2025-02-24T15:15:20.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Bob Namaste! LMS allows Cross Site Request Forgery. This issue affects Namaste! LMS: from n/a through 2.6.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/namaste-lms/vulnerability/wordpress-namaste-lms-plugin-2-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27355.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27355.json new file mode 100644 index 00000000000..f5b8c5e9c14 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27355.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27355", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:20.917", + "lastModified": "2025-02-24T15:15:20.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nicolas GRILLET Woocommerce \u2013 Loi Hamon allows Stored XSS. This issue affects Woocommerce \u2013 Loi Hamon: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/loi-hamon/vulnerability/wordpress-woocommerce-loi-hamon-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27356.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27356.json new file mode 100644 index 00000000000..38ab3d67525 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27356.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27356", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:21.077", + "lastModified": "2025-02-24T15:15:21.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Hardik Sticky Header On Scroll allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Sticky Header On Scroll: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sticky-header-on-scroll/vulnerability/wordpress-sticky-header-on-scroll-plugin-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27357.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27357.json new file mode 100644 index 00000000000..c92d07f3bd2 --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27357.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27357", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-24T15:15:21.233", + "lastModified": "2025-02-24T15:15:21.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Musa AVCI \u00d6nceki Yaz\u0131 Link allows Cross Site Request Forgery. This issue affects \u00d6nceki Yaz\u0131 Link: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/onceki-yazi-linki/vulnerability/wordpress-oenceki-yazi-link-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3b22f328377..5192e233572 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-24T15:01:09.787715+00:00 +2025-02-24T17:00:39.541398+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-24T14:59:31.717000+00:00 +2025-02-24T16:48:58.427000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -282148 +282206 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `58` -- [CVE-2024-5174](CVE-2024/CVE-2024-51xx/CVE-2024-5174.json) (`2025-02-24T14:15:10.327`) -- [CVE-2025-0545](CVE-2025/CVE-2025-05xx/CVE-2025-0545.json) (`2025-02-24T14:15:10.910`) -- [CVE-2025-1632](CVE-2025/CVE-2025-16xx/CVE-2025-1632.json) (`2025-02-24T14:15:11.590`) +- [CVE-2025-27321](CVE-2025/CVE-2025-273xx/CVE-2025-27321.json) (`2025-02-24T15:15:17.753`) +- [CVE-2025-27323](CVE-2025/CVE-2025-273xx/CVE-2025-27323.json) (`2025-02-24T15:15:17.887`) +- [CVE-2025-27325](CVE-2025/CVE-2025-273xx/CVE-2025-27325.json) (`2025-02-24T15:15:18.033`) +- [CVE-2025-27327](CVE-2025/CVE-2025-273xx/CVE-2025-27327.json) (`2025-02-24T15:15:18.180`) +- [CVE-2025-27328](CVE-2025/CVE-2025-273xx/CVE-2025-27328.json) (`2025-02-24T15:15:18.337`) +- [CVE-2025-27329](CVE-2025/CVE-2025-273xx/CVE-2025-27329.json) (`2025-02-24T15:15:18.493`) +- [CVE-2025-27330](CVE-2025/CVE-2025-273xx/CVE-2025-27330.json) (`2025-02-24T15:15:18.660`) +- [CVE-2025-27331](CVE-2025/CVE-2025-273xx/CVE-2025-27331.json) (`2025-02-24T15:15:18.827`) +- [CVE-2025-27332](CVE-2025/CVE-2025-273xx/CVE-2025-27332.json) (`2025-02-24T15:15:18.997`) +- [CVE-2025-27335](CVE-2025/CVE-2025-273xx/CVE-2025-27335.json) (`2025-02-24T15:15:19.137`) +- [CVE-2025-27336](CVE-2025/CVE-2025-273xx/CVE-2025-27336.json) (`2025-02-24T15:15:19.283`) +- [CVE-2025-27339](CVE-2025/CVE-2025-273xx/CVE-2025-27339.json) (`2025-02-24T15:15:19.430`) +- [CVE-2025-27340](CVE-2025/CVE-2025-273xx/CVE-2025-27340.json) (`2025-02-24T15:15:19.567`) +- [CVE-2025-27341](CVE-2025/CVE-2025-273xx/CVE-2025-27341.json) (`2025-02-24T15:15:19.703`) +- [CVE-2025-27342](CVE-2025/CVE-2025-273xx/CVE-2025-27342.json) (`2025-02-24T15:15:19.833`) +- [CVE-2025-27344](CVE-2025/CVE-2025-273xx/CVE-2025-27344.json) (`2025-02-24T15:15:19.963`) +- [CVE-2025-27347](CVE-2025/CVE-2025-273xx/CVE-2025-27347.json) (`2025-02-24T15:15:20.097`) +- [CVE-2025-27348](CVE-2025/CVE-2025-273xx/CVE-2025-27348.json) (`2025-02-24T15:15:20.230`) +- [CVE-2025-27349](CVE-2025/CVE-2025-273xx/CVE-2025-27349.json) (`2025-02-24T15:15:20.363`) +- [CVE-2025-27351](CVE-2025/CVE-2025-273xx/CVE-2025-27351.json) (`2025-02-24T15:15:20.503`) +- [CVE-2025-27352](CVE-2025/CVE-2025-273xx/CVE-2025-27352.json) (`2025-02-24T15:15:20.643`) +- [CVE-2025-27353](CVE-2025/CVE-2025-273xx/CVE-2025-27353.json) (`2025-02-24T15:15:20.780`) +- [CVE-2025-27355](CVE-2025/CVE-2025-273xx/CVE-2025-27355.json) (`2025-02-24T15:15:20.917`) +- [CVE-2025-27356](CVE-2025/CVE-2025-273xx/CVE-2025-27356.json) (`2025-02-24T15:15:21.077`) +- [CVE-2025-27357](CVE-2025/CVE-2025-273xx/CVE-2025-27357.json) (`2025-02-24T15:15:21.233`) ### CVEs modified in the last Commit -Recently modified CVEs: `26` +Recently modified CVEs: `84` -- [CVE-2021-43141](CVE-2021/CVE-2021-431xx/CVE-2021-43141.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-26283](CVE-2022/CVE-2022-262xx/CVE-2022-26283.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-28339](CVE-2022/CVE-2022-283xx/CVE-2022-28339.json) (`2025-02-24T13:15:09.560`) -- [CVE-2022-30053](CVE-2022/CVE-2022-300xx/CVE-2022-30053.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-30837](CVE-2022/CVE-2022-308xx/CVE-2022-30837.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-34067](CVE-2022/CVE-2022-340xx/CVE-2022-34067.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-42067](CVE-2022/CVE-2022-420xx/CVE-2022-42067.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-42069](CVE-2022/CVE-2022-420xx/CVE-2022-42069.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-42070](CVE-2022/CVE-2022-420xx/CVE-2022-42070.json) (`2025-02-24T14:07:36.703`) -- [CVE-2022-42071](CVE-2022/CVE-2022-420xx/CVE-2022-42071.json) (`2025-02-24T14:07:36.703`) -- [CVE-2023-36158](CVE-2023/CVE-2023-361xx/CVE-2023-36158.json) (`2025-02-24T14:07:36.703`) -- [CVE-2023-36844](CVE-2023/CVE-2023-368xx/CVE-2023-36844.json) (`2025-02-24T14:59:31.717`) -- [CVE-2023-44047](CVE-2023/CVE-2023-440xx/CVE-2023-44047.json) (`2025-02-24T14:07:36.703`) -- [CVE-2024-12813](CVE-2024/CVE-2024-128xx/CVE-2024-12813.json) (`2025-02-24T14:24:12.300`) -- [CVE-2024-13464](CVE-2024/CVE-2024-134xx/CVE-2024-13464.json) (`2025-02-24T14:25:04.513`) -- [CVE-2024-13501](CVE-2024/CVE-2024-135xx/CVE-2024-13501.json) (`2025-02-24T14:27:50.777`) -- [CVE-2024-13522](CVE-2024/CVE-2024-135xx/CVE-2024-13522.json) (`2025-02-24T14:28:46.687`) -- [CVE-2024-13535](CVE-2024/CVE-2024-135xx/CVE-2024-13535.json) (`2025-02-24T14:45:46.473`) -- [CVE-2024-13538](CVE-2024/CVE-2024-135xx/CVE-2024-13538.json) (`2025-02-24T14:49:46.413`) -- [CVE-2024-13540](CVE-2024/CVE-2024-135xx/CVE-2024-13540.json) (`2025-02-24T14:52:53.740`) -- [CVE-2024-13555](CVE-2024/CVE-2024-135xx/CVE-2024-13555.json) (`2025-02-24T14:54:29.683`) -- [CVE-2024-13565](CVE-2024/CVE-2024-135xx/CVE-2024-13565.json) (`2025-02-24T14:55:25.973`) -- [CVE-2024-40982](CVE-2024/CVE-2024-409xx/CVE-2024-40982.json) (`2025-02-24T13:15:10.790`) -- [CVE-2024-52939](CVE-2024/CVE-2024-529xx/CVE-2024-52939.json) (`2025-02-24T13:15:33.387`) -- [CVE-2025-24989](CVE-2025/CVE-2025-249xx/CVE-2025-24989.json) (`2025-02-24T14:55:58.823`) +- [CVE-2024-13547](CVE-2024/CVE-2024-135xx/CVE-2024-13547.json) (`2025-02-24T16:16:56.543`) +- [CVE-2024-13573](CVE-2024/CVE-2024-135xx/CVE-2024-13573.json) (`2025-02-24T15:40:57.757`) +- [CVE-2024-13576](CVE-2024/CVE-2024-135xx/CVE-2024-13576.json) (`2025-02-24T15:42:32.780`) +- [CVE-2024-13600](CVE-2024/CVE-2024-136xx/CVE-2024-13600.json) (`2025-02-24T15:56:30.290`) +- [CVE-2024-13654](CVE-2024/CVE-2024-136xx/CVE-2024-13654.json) (`2025-02-24T15:45:29.457`) +- [CVE-2024-13656](CVE-2024/CVE-2024-136xx/CVE-2024-13656.json) (`2025-02-24T15:46:39.887`) +- [CVE-2024-13658](CVE-2024/CVE-2024-136xx/CVE-2024-13658.json) (`2025-02-24T15:49:58.910`) +- [CVE-2024-13665](CVE-2024/CVE-2024-136xx/CVE-2024-13665.json) (`2025-02-24T15:51:18.327`) +- [CVE-2024-13769](CVE-2024/CVE-2024-137xx/CVE-2024-13769.json) (`2025-02-24T15:54:05.167`) +- [CVE-2024-13800](CVE-2024/CVE-2024-138xx/CVE-2024-13800.json) (`2025-02-24T15:55:09.120`) +- [CVE-2024-30040](CVE-2024/CVE-2024-300xx/CVE-2024-30040.json) (`2025-02-24T15:50:23.420`) +- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-02-24T16:15:12.213`) +- [CVE-2024-56938](CVE-2024/CVE-2024-569xx/CVE-2024-56938.json) (`2025-02-24T16:33:42.337`) +- [CVE-2024-56939](CVE-2024/CVE-2024-569xx/CVE-2024-56939.json) (`2025-02-24T16:34:05.060`) +- [CVE-2024-56940](CVE-2024/CVE-2024-569xx/CVE-2024-56940.json) (`2025-02-24T16:34:30.233`) +- [CVE-2024-57602](CVE-2024/CVE-2024-576xx/CVE-2024-57602.json) (`2025-02-24T16:40:27.567`) +- [CVE-2024-6097](CVE-2024/CVE-2024-60xx/CVE-2024-6097.json) (`2025-02-24T16:31:32.893`) +- [CVE-2025-0365](CVE-2025/CVE-2025-03xx/CVE-2025-0365.json) (`2025-02-24T15:56:57.453`) +- [CVE-2025-0366](CVE-2025/CVE-2025-03xx/CVE-2025-0366.json) (`2025-02-24T15:56:36.713`) +- [CVE-2025-1197](CVE-2025/CVE-2025-11xx/CVE-2025-1197.json) (`2025-02-24T16:15:20.820`) +- [CVE-2025-1555](CVE-2025/CVE-2025-15xx/CVE-2025-1555.json) (`2025-02-24T15:15:12.810`) +- [CVE-2025-1632](CVE-2025/CVE-2025-16xx/CVE-2025-1632.json) (`2025-02-24T15:15:13.217`) +- [CVE-2025-24527](CVE-2025/CVE-2025-245xx/CVE-2025-24527.json) (`2025-02-24T16:15:14.683`) +- [CVE-2025-25282](CVE-2025/CVE-2025-252xx/CVE-2025-25282.json) (`2025-02-24T15:15:13.620`) +- [CVE-2025-25746](CVE-2025/CVE-2025-257xx/CVE-2025-25746.json) (`2025-02-24T16:30:37.200`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f74f88ed8fb..e4ad7254f8a 100644 --- a/_state.csv +++ b/_state.csv @@ -103544,7 +103544,7 @@ CVE-2017-3062,0,0,ac3b345ad95f10e735ab69ea990c6af9b3230ef38a4463030828d3964f78f4 CVE-2017-3063,0,0,5fa9f659f2774399f1708168687d3e98afe75edad415c1aa6e5016e3e3e51fd4,2024-11-21T03:24:45.347000 CVE-2017-3064,0,0,63f6d50ceccfed39ecbbeee37cef38bd6ffe17a20574544916dfe225da95171b,2024-11-21T03:24:45.477000 CVE-2017-3065,0,0,0963c2ea0b754d113dd707a8e8b0d5bf5afc17d081be5b0ca1a48f32865e2497,2024-11-21T03:24:45.600000 -CVE-2017-3066,0,0,d415109d7f48b58c6b2f86caf8e8bf0e91add39b331b3a7aae8b6ef606117df8,2024-11-21T03:24:45.723000 +CVE-2017-3066,0,1,e5359aae9fa9461cf6147103113b6014ffbbe4d86adbd3f949050c9a9e303519,2025-02-24T16:15:10.670000 CVE-2017-3067,0,0,791a33003dd1e11c651c188e4f03f08ab06e2e31440f58108137e87ceef3bbd2,2024-11-21T03:24:45.847000 CVE-2017-3068,0,0,af80d0c3c329fc69043b3685c041805dc046bbe7ad713185db1fd6aa7c72c33d,2024-11-21T03:24:45.967000 CVE-2017-3069,0,0,d3276aefa92679d09fe4b20dbe1190ee1aaeabf36bdd233a71239fdc29223803,2024-11-21T03:24:46.100000 @@ -133245,7 +133245,7 @@ CVE-2019-15268,0,0,d2ff45fa84caade01586621c57b63b3090ef8caab2453f860ebe6d4841809 CVE-2019-15269,0,0,fb56ffc8627365f22b1f42864df305988829a3358c279d0acbda26dc0b5612b9,2024-11-21T04:28:19.893000 CVE-2019-1527,0,0,fdaee23fee4dc5e1b236a06f25f74afaefe5b16e114e3ac28443ace8bb778053,2023-11-07T03:08:22.330000 CVE-2019-15270,0,0,e2b3737ffa5137926147fac683f5c456dec815e83b6e2031fb4d40b5a5b5ce42,2024-11-21T04:28:20.103000 -CVE-2019-15271,0,0,1181768f0077c842888f0982b2db3bfb8842926d194bc9e1051c2e4e01bda231,2024-11-21T04:28:20.240000 +CVE-2019-15271,0,1,deacd9a24e4705437872e238fab9d92f965d4acb5e32757bcfc4c01f062cc910,2025-02-24T15:35:55.637000 CVE-2019-15272,0,0,7cf3e457bd974bfff86038c8fa762828499a812bd186f06bcf8187c4085e3c48,2024-11-21T04:28:21.120000 CVE-2019-15273,0,0,379186bff76bc501e54c67182677224c3c9c58ae343eb97b4ce8081620c32b1e,2024-11-21T04:28:21.247000 CVE-2019-15274,0,0,eb8deb157943704cd3b3c3d2f1418efe46d9638fddaec0a75aa8bfb7d2fd9259,2024-11-21T04:28:21.370000 @@ -134380,7 +134380,7 @@ CVE-2019-16516,0,0,d30583ecc33ac622b8bef687c972d231e6e7a88cfb12a2e2eb5e602a80e12 CVE-2019-16517,0,0,06e1e2d9a09c82ac5e37c416ffdb091067576da11213abe67a353352608be8d0,2024-11-21T04:30:44.773000 CVE-2019-16518,0,0,371ff8cd1814b34e4ee5f74c84ea4bc85e40aa0b4dfff5c305e6a526ef4d55bd,2024-11-21T04:30:44.913000 CVE-2019-16519,0,0,e0e03160c7a07f50bc7ebffea82797083edc2d36c364829cc3c57b96868e1bae,2024-11-21T04:30:45.043000 -CVE-2019-1652,0,0,52d8cac1adff3ed5816ac2b62052cdc4a784f08dec252ccd5b63568885419d5e,2024-11-21T04:37:01.077000 +CVE-2019-1652,0,1,9bd0bf068aa3c9b8e66977abc061bb8b4042b81406408edec22777f211ba7ba1,2025-02-24T15:03:38.597000 CVE-2019-16520,0,0,8dba449bb9571e640f531f9d6a74aab5838cdc579f2092375f63ab7671df12a0,2024-11-21T04:30:45.180000 CVE-2019-16521,0,0,b9665867e96d541e593baf6f0269bffc6571e5ebeef46426432c63848794b77a,2024-11-21T04:30:45.330000 CVE-2019-16522,0,0,b2fe50efec30dbae822dcb51e3e840a6b9d4a94d74a867b679e8011e2bb31f87,2024-11-21T04:30:45.480000 @@ -147857,7 +147857,7 @@ CVE-2020-12802,0,0,395d69f197a3ced3455109e5bd05746be48c447f66319d54c30e04abf5d16 CVE-2020-12803,0,0,37af94dbae7cd76b1e10c001886b0726f1c52c6df9e5edadf1db6c3628d0b1c7,2024-11-21T05:00:19.277000 CVE-2020-1281,0,0,5b630652f79a78b4c5d028fc3aacc60e3ead12a03695dc3d5b0b00f09a84e9dc,2024-11-21T05:10:09.350000 CVE-2020-12811,0,0,dc952fbead7c0a414715b956b577ba130da8f1aec2890e1431a81dfc08512fab,2024-11-21T05:00:19.410000 -CVE-2020-12812,0,0,ea1d245267bb54900e015bcc5486740af69de734727b2af7b3f96776414fd1d1,2025-02-04T20:15:36.260000 +CVE-2020-12812,0,1,bf258d568f66a37014dcc7f91539a19a494b41d5d41ac1ec207f232514b48cee,2025-02-24T15:43:27.603000 CVE-2020-12814,0,0,67560e8bab0e4919f7b69453065b8a11372c957cb00fed4734deebc86cd6c533,2024-11-21T05:00:19.660000 CVE-2020-12815,0,0,df32f1c62003cdadbb0afc24ca75df39ca4dc0804ab8b97162715dc4a5294a28,2024-11-21T05:00:19.800000 CVE-2020-12816,0,0,48c51f0235980afbcbab50ea2cb90c8fe4004526e9c3a06265fc9b2c75882eaf,2024-11-21T05:00:19.927000 @@ -157835,7 +157835,7 @@ CVE-2020-3114,0,0,377879646a6f39d980991c5ce9f2844ce896cec6719ea2cc176054a30b7655 CVE-2020-3115,0,0,cf3a7daa96960a42fcda3ee2cb9c8f7b6ecb105d40d4f3c5ba778c1d5b32347d,2024-11-21T05:30:21.387000 CVE-2020-3116,0,0,e101d5393efea18d32a8fd8f8deb73c6d7ed7e2fc763fe4e1a74e8a2930964a2,2024-11-21T05:30:21.520000 CVE-2020-3117,0,0,a9e064562ca1eba8e3711df0df8e2c9eb418c3175b3e2b6290bd2519bd06e78f,2024-11-21T05:30:21.650000 -CVE-2020-3118,0,0,bea5549d70c06d861d64fcf826e63ca2bae281a231b4f39301257074e19d9759,2024-11-21T05:30:21.770000 +CVE-2020-3118,0,1,ab3d8ab3aa505c2c0d05ad5df043a25ffb5a170413595648bcabb8b1b1d972a2,2025-02-24T15:35:44.490000 CVE-2020-3119,0,0,0870dee6bca2f4249667243d4049273e03b842939953ccfd2796129499d443d1,2024-11-21T05:30:21.903000 CVE-2020-3120,0,0,97360dafe2754942cbbb79bf509a7de595d46c19be8f6643a32688ca08cac22b,2024-11-21T05:30:22.057000 CVE-2020-3121,0,0,ed15543005c12fde1ae863fa626214726d57ca2a6dce777d35eccc784c07b467,2024-11-21T05:30:22.217000 @@ -157869,7 +157869,7 @@ CVE-2020-3149,0,0,ea96e613578551c58dee903e04c2ace183432fd6908c433cc64cbf1c87c502 CVE-2020-3150,0,0,a6df5dca11e8ef39722b02b4786ce3e24a0af3ec14b5ea478f53527f3b448ef1,2024-11-21T05:30:25.813000 CVE-2020-3151,0,0,41ae8f0fcb14ce7d5c825245834a3bb7c882d4ba784836f543a3559045310a9a,2024-11-21T05:30:25.937000 CVE-2020-3152,0,0,1d5cd1f85e2c114cb3e2af3d881f39310715e75237dbd9ca470305cc51752332,2024-11-21T05:30:26.070000 -CVE-2020-3153,0,0,a5ba0cfceefebb88908ecaa605c4c942657567b8e10ff8c9371f5f39b9d64504,2024-11-21T05:30:26.193000 +CVE-2020-3153,0,1,7ee3e7d001c1f1edd05ed4bff03a784484617fa1c755e20903084cf300399bd1,2025-02-24T15:34:56.417000 CVE-2020-3154,0,0,d9e945aba2b66afbea398f5efe226493c960ef94620869d9e12ac22e6943dc52,2024-11-21T05:30:26.333000 CVE-2020-3155,0,0,7be9d744e39e3bd78aa15d09734f70408756917adf5c50a6662565c9c35c834c,2024-11-21T05:30:26.457000 CVE-2020-3156,0,0,227901c14d101b638f16e6a3628b350f533e846bb1938781f3b026b6880bc71f,2024-11-21T05:30:26.580000 @@ -157877,7 +157877,7 @@ CVE-2020-3157,0,0,858f785d1eccfedf4855205a58f929659c60784006ba24e865cb1097dc4292 CVE-2020-3158,0,0,d55fd1658d2550b83c2b52aaa7b40ba3e715ef740bb01acd34aa6e9688c93161,2024-11-21T05:30:26.837000 CVE-2020-3159,0,0,07a43b41c8fed8a1f1a97b4f496ecf45805f8493fb663d49c8706cc023a5e4fe,2024-11-21T05:30:26.970000 CVE-2020-3160,0,0,a2c8c20cabf843063b29826a62dcdb45cc7290bd8385bfb323b4046029c5a978,2024-11-21T05:30:27.080000 -CVE-2020-3161,0,0,85418ae50586a84c431b727825ba2f5eb5796fd3b8644caeef1912e7c1a2fc26,2024-11-21T05:30:27.190000 +CVE-2020-3161,0,1,95147d24211cae714f6052176041f2841db1a79846a3fb85c6c28588f726fc43,2025-02-24T16:14:27.920000 CVE-2020-3162,0,0,84cacd319bfac765fb0f8cdc6c8fdf15f2564b4f7aff41a76a048cf5919c6a05,2024-11-21T05:30:27.343000 CVE-2020-3163,0,0,5a5d623e72b7989768905a3d978185cae873553d8550f60eeecd3b63ea2a3f51,2024-11-21T05:30:27.467000 CVE-2020-3164,0,0,986c03557815533ea36eacf809dd88ebc80f2090cdd8dd3a95a7427a4add3f61,2024-11-21T05:30:27.597000 @@ -157973,7 +157973,7 @@ CVE-2020-3255,0,0,804328c94eb6152b103d12a86180f75c8985b2e43eb08160465d0b52d393b1 CVE-2020-3256,0,0,43608713b11472eb86e51d7c58f543d7912fc864d33e88e1323e57d603676f57,2024-11-21T05:30:40.163000 CVE-2020-3257,0,0,dc82d92d3b344393c5e6fdaf848a90c1b3b88fbe8e1a59bf683f046b3be27768,2024-11-21T05:30:40.277000 CVE-2020-3258,0,0,c82cb449d38686f280bfef39355bcae95567e81ae3d66957d065d6c6fc2689c6,2024-11-21T05:30:40.403000 -CVE-2020-3259,0,0,fea96f2f687d8e0e1085c6113ef451591be04b4a6988a1ac698f50dccb6f4e06,2024-11-21T05:30:40.517000 +CVE-2020-3259,0,1,3c09b0cbba61254b069291c9c5baf0214a0c08054477d7595be994bdf91bf43c,2025-02-24T15:40:35.140000 CVE-2020-3260,0,0,66b25f597087d125d6c6808981224f77985615beccda81f596818efef719ef74,2024-11-21T05:30:40.647000 CVE-2020-3261,0,0,3706c6ce93988aa91e324004b4ae69dbcb49b8d404a2e308f3d36ab4f0f5b22b,2024-11-21T05:30:40.760000 CVE-2020-3262,0,0,4cbbb0209e4a928dbabb51b4470cfe1f5a4ed7802b18f72e5cb0c42de14299ac,2024-11-21T05:30:40.903000 @@ -158135,8 +158135,8 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,0,0,95c64972df835e085b2fae9ea962c2b05ad745d4a5e6908c7fbaa34828380db2,2025-02-18T18:15:09.930000 -CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 +CVE-2020-3432,0,1,bbe7edf78b101f7d200386b3adba4245c294e0e397a21299eb820f8cdd5b3dc4,2025-02-24T16:15:11.573000 +CVE-2020-3433,0,1,2c85045431b9488c2e1c1014ac599de02c76a7bc319f5ca94e1cd53433e20ccb,2025-02-24T15:40:28.853000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 CVE-2020-3436,0,0,040ccc9f433fab9b8d33bc2531e38ae49015225d6b0d7b208f29d38db33a50af,2024-11-21T05:31:03.880000 @@ -158153,7 +158153,7 @@ CVE-2020-3448,0,0,16c7ae3414a0bd4b72c46f8efad5ee3d6c36821d705dc786111f80e681a139 CVE-2020-3449,0,0,38bebf7f459d68f3af8a5d5d9b328934c9b75c7f91c707c129bcb9280458125f,2024-11-21T05:31:05.380000 CVE-2020-3450,0,0,d785f218a360448ddf558a7264b717ac9dc79d7a55d00ae72e129f7015a41794,2024-11-21T05:31:05.513000 CVE-2020-3451,0,0,79293baa2d1757e78bed131bff52a6beb0d01c4880956161b0ff1698c5ecea52,2024-11-21T05:31:05.643000 -CVE-2020-3452,0,0,6b499eaad4610867034a6fb6cffd446674506a895fdfd32489275ecdd639d43f,2024-11-21T05:31:05.770000 +CVE-2020-3452,0,1,6e765c380cdea9d42a9939aa9657fa95bdf27f0de5561c5d90751db05d727185,2025-02-24T15:40:15.277000 CVE-2020-3453,0,0,36410e71346619ac9ad69e3a402e93ca8c313dca90bc2b497a11c14dffae1acf,2024-11-21T05:31:05.933000 CVE-2020-3454,0,0,ae5c23e56b05b33d7574b4319b4d164f4b1844648ad8be0b1019a0c7b7ab89a3,2024-11-21T05:31:06.053000 CVE-2020-3455,0,0,02ce289e70ef3409c5f26622fc539b8b37ea6b9bccf84fc82c301d3d6d946e05,2024-11-21T05:31:06.197000 @@ -158615,7 +158615,7 @@ CVE-2020-35656,0,0,495943dea16d1cd4e7a937ec1a9712e8c40316322dc99ce5159b033e35d1d CVE-2020-35657,0,0,5a0f67ca966195383639c1a5cf80c3b8b9a5b507cda8a9b641ab9b553f4de546,2024-11-21T05:27:46.800000 CVE-2020-35658,0,0,fe025ab272438ea534b29038fb88f398672d82b57c1a2957e1154c2113a3e81e,2024-11-21T05:27:46.940000 CVE-2020-35659,0,0,4069f57874e825df82988e2830f0222212f562e099b64de9d921b09257ee9389,2024-11-21T05:27:47.110000 -CVE-2020-3566,0,0,9f95473586309219a4b342827c24df4e8570d9849a289526a2bde31c4e9e5ff6,2024-11-21T05:31:19.740000 +CVE-2020-3566,0,1,5b3f05d58b18064c67496a9b1c8b4bf950488b6036d5f1af51c2a4e5487deba7,2025-02-24T15:39:27.530000 CVE-2020-35660,0,0,453fceb014d20fa28c9e2d01a01c819155e855906fb6e377514499ed2ab20777,2024-11-21T05:27:47.283000 CVE-2020-35662,0,0,c27c3fac9f83a2026f4c6bdc7457fc7bfdad17a73c0922b2072a091955deb967,2024-11-21T05:27:47.453000 CVE-2020-35664,0,0,45e63c2300f4592eb8b26a7568acaa3e7a661e4188c9f19cd55a22a95c1f672d,2024-11-21T05:27:47.813000 @@ -158640,7 +158640,7 @@ CVE-2020-35684,0,0,2c9b8de68c5be7e19ce60ba2a04621b32a86c366ed35c8fef392163545f3b CVE-2020-35685,0,0,8716243572a509b5c9e561ccebaceb637401b931f64f5f50f9728ff4b7fb2a3e,2024-11-21T05:27:50.993000 CVE-2020-35686,0,0,d6b8e057d76db83e1d5dadaf5dc54cc25c61d2322bdbd88c4fd43b14e4502e61,2024-11-21T05:27:51.177000 CVE-2020-35687,0,0,417bc14ae03655c8c37901ea819c14198b021dde526e9cb798393be6ac8cce35,2024-11-21T05:27:51.357000 -CVE-2020-3569,0,0,942447488e9ab6806d093f65db706dab3d77ec425f1f2f77fbb5374867825c60,2024-11-21T05:31:20.100000 +CVE-2020-3569,0,1,ea1d34d01750decd3e5352cb21f2846981681087a0b893e59d6669b020c0cb81,2025-02-24T15:39:08.970000 CVE-2020-35693,0,0,91adab232264d796a89a07c074590caf9f02f0c9469c0ecd5c7829fdc3bb907f,2024-11-21T05:27:51.537000 CVE-2020-35698,0,0,4d0e770ce8a3d7c91e336007a5ad9a7ca29a728ee4de118a3379880afd672dfc,2024-11-21T05:27:51.713000 CVE-2020-35700,0,0,489a0005e34d52d79d309e9505cc41b292b0c75cf66a29f4ed9c18580c913ea7,2024-11-21T05:27:52 @@ -158733,7 +158733,7 @@ CVE-2020-35796,0,0,31a3b83f53c539296aed1df9f55c24771e7bcd54881f59903be624d0052d4 CVE-2020-35797,0,0,a3bc1f316b39a99fc3ae258e06cbd70ea7d67ea59c30ca9793a9489542dbce0e,2024-11-21T05:28:07.980000 CVE-2020-35798,0,0,2301e0d50968247b1454003c8168b1fe1c7b09170027d90006c4efc03a06f0b2,2024-11-21T05:28:08.150000 CVE-2020-35799,0,0,38304cb1c423b61afd592948d833cb588d2984165c467f11569a85fbd6d43832,2024-11-21T05:28:08.360000 -CVE-2020-3580,0,0,c20f7ceadb7ed2276a415bb77845d7bd7452c6e21ffc793298caba4a307942ea,2024-11-21T05:31:21.103000 +CVE-2020-3580,0,1,3d45c0d10169ab06e436172d788549da044a51023817a0ab2eb68d7f0aa2c061,2025-02-24T15:36:35.007000 CVE-2020-35800,0,0,3c1e6b63735596604d5c4501d05acd1eddeafad528ac726c49f7a16a23e9a4bd,2024-11-21T05:28:08.620000 CVE-2020-35801,0,0,87833a41c39c2ec59c3bd36b610e5345cd7c11bb8ca5710c64a5a6a0377a40b4,2024-11-21T05:28:08.977000 CVE-2020-35802,0,0,c0dea1aab72a07d3d7f06ad309850f1fa463b9de58bec993442ae3d4fc8b8e49,2024-11-21T05:28:09.167000 @@ -166160,8 +166160,8 @@ CVE-2021-1493,0,0,d9d55dcde245958b0ba49c9136722eb20c8ccee4608bbd292194c81a5e4172 CVE-2021-1494,0,0,2fdda37344773c09c498c942fc56d92ede935611ef773f0132df966703c1ac1d,2024-11-18T17:11:56.587000 CVE-2021-1495,0,0,492bc57403dc8d739d012384ab476d3878e399d6b7568a9b09b00cce42738ec5,2024-11-21T05:44:28.830000 CVE-2021-1496,0,0,6f49b90d98ab17b8133e0b14929f201844da53f694ce0bb5444d990c765ffcfc,2024-11-21T05:44:28.950000 -CVE-2021-1497,0,0,9ae760081239d6299d8a81e130a5f78a32670d1dd81ee2a1c1e35361322a74e9,2024-11-21T05:44:29.070000 -CVE-2021-1498,0,0,97d074bf52e43de31404894fc9272d97287859397a7acd230467c4a47aa09cb8,2024-11-21T05:44:29.210000 +CVE-2021-1497,0,1,e0b61bfa1d3ffe24155961817d089edb3bcf8b9eb1dd482382cab66c3e7260b0,2025-02-24T15:36:23.223000 +CVE-2021-1498,0,1,bb854559631bb0d778dc2cf0d240e6e8bb5205bcf974c77fac9713262ef5fa9b,2025-02-24T15:36:01.567000 CVE-2021-1499,0,0,bf358ffad98f8a6b7e0e1826003094df54246a52dc683b0b2ef057085ff9d722,2024-11-21T05:44:29.350000 CVE-2021-1500,0,0,8a934316c9d00de7d20fd1960e8e870dbbad5854eeff946c5aeaa2a3ec976565,2024-11-21T05:44:29.503000 CVE-2021-1501,0,0,ab416d10b8205b761a6e3be7ab14635b8d5fad5c6df8f0660dda6eef39675997,2024-11-21T05:44:29.640000 @@ -169096,7 +169096,7 @@ CVE-2021-22573,0,0,5d547ac05a681ba950c3a9f299272ffb30c222eb56e5b13abb70d6cf4b9e5 CVE-2021-2258,0,0,6093eee6215ab8ecdfcf8de50bca6aced859ecb03c6bb2eba602071e7f17d41f,2024-11-21T06:02:44.657000 CVE-2021-2259,0,0,2eb71d9e037afffdfb7c365bf6a5879b455b504af3c951c85d68006ae1f32d48,2024-11-21T06:02:44.787000 CVE-2021-2260,0,0,eb63a878cf372ae1bb84bbbd5e9675c44a0842416804da2fd04640ee17086d28,2024-11-21T06:02:44.920000 -CVE-2021-22600,0,0,6d538eace048a02ca65e68ed96882f2d20b28dcdfa0d3ed6a3e926d588bcac8d,2024-11-21T05:50:21.440000 +CVE-2021-22600,0,1,489b3ee19ea3c8ed20a48ef291d6fac5025368f285e79ba84966940c3eb47654,2025-02-24T15:41:32.757000 CVE-2021-2261,0,0,e929a5a6a7b2f81f3b785ff3126c7dce5f002684037adbb6f656c28a1c862bf7,2024-11-21T06:02:45.057000 CVE-2021-2262,0,0,1e15ed0e5403561d2a627cc1c0ec69c36ef99cb3a78125041abee24ca74b78bd,2024-11-21T06:02:45.193000 CVE-2021-2263,0,0,d724cb902557b22b95e7b31d6c4b892c95585c4856b8552eb71b4cc60570bfa1,2024-11-21T06:02:45.327000 @@ -176974,8 +176974,8 @@ CVE-2021-33038,0,0,79134c980f88566e38dc139afedf0163cc8b8bb9d94266adf183dd94b702f CVE-2021-3304,0,0,2d64940eb30884e4aafb297c55907f56a49572885d24af33bb418977c74b5be2,2024-11-21T06:21:14.647000 CVE-2021-33040,0,0,05d448aa7e4a851a821a0c6a4e9ae20fed3c01b6608e9194f9147d8139e59311,2024-11-21T06:08:10.670000 CVE-2021-33041,0,0,6dbc972101b926aeca778ad74dafd6f696e7db7424db946155bdc880cff7f105,2024-11-21T06:08:10.810000 -CVE-2021-33044,0,0,acd65301dc86fcf0eac55b40ad345dd652ca3bccaf17c8beaf67193116f48c95,2024-11-21T06:08:10.943000 -CVE-2021-33045,0,0,a7f6e45da4646276f4c461525bc80e7e0bd9e7a4f8ab697c2ee6f706f7750249,2024-11-21T06:08:11.097000 +CVE-2021-33044,0,1,d061564cff82883c333660e5e626625289f19779487d65751bbc44a1b115cc64,2025-02-24T15:01:40.390000 +CVE-2021-33045,0,1,e89ef6cc368189bc7a92247bc0130bb9d2870b5d50b636fa6f28e70aa93a5490,2025-02-24T15:01:15.070000 CVE-2021-33046,0,0,5a8a090f380dc73ca13f0b41b8b6132aa1c876122850b5e96dd81667dbfcc8ba,2024-11-21T06:08:11.233000 CVE-2021-3305,0,0,98b2410e6129abd2c3873f51b31bc1667f8535399d9478726b578cea87d98752,2024-11-21T06:21:14.807000 CVE-2021-33054,0,0,08a99aca7cd93ea52ee00ebf5fea9c71a6d05d7057388eac0330ec4098844e03,2024-11-21T06:08:11.387000 @@ -177527,7 +177527,7 @@ CVE-2021-33739,0,0,50838aa378d23435b7b7d0e16c5f4f742b2654b8fc3968d4171f4b29f1114 CVE-2021-3374,0,0,f300f32a3c55a2f58bcdb4dc62a8b0c193d4b1cf584095165cdfe93f380f5cd9,2024-11-21T06:21:22.537000 CVE-2021-33740,0,0,44a0ab62cc7c81c9b3327db2a16fc5c7cdd23b4d7cf6d50e56fe5e3ed94324d0,2024-11-21T06:09:29.150000 CVE-2021-33741,0,0,f4fd4b54f9fa9b2f76189bbd04f73b8a5d01a5f8abc65ea9a58b7a058e46bc77,2024-11-21T06:09:29.270000 -CVE-2021-33742,0,0,f86ead090d2191163f156e0bda5e9b93471af410f76f1b492f5eb613a3fad8e6,2025-02-04T18:15:28.917000 +CVE-2021-33742,0,1,40030aaeda532c1d8664b261809fea0aea68360b78d044416d44ede24833a611,2025-02-24T15:46:27.040000 CVE-2021-33743,0,0,6c9c7495b2cfac767c1e25b94f037f41e3db7f8f691c1ff0199fc9e27d763abe,2024-11-21T06:09:29.533000 CVE-2021-33744,0,0,d6bf169bee6c71ec87525f0fd84fff657af881bedc071ece5ba45633acb89a71,2024-11-21T06:09:29.660000 CVE-2021-33745,0,0,4279b561b44959e23cc0a27217364fef1c33c66466342764cdb82e8a5a68f7a9,2024-11-21T06:09:29.793000 @@ -177959,7 +177959,7 @@ CVE-2021-34444,0,0,641f62d28d162e2f1b275db0274fb3439a5d7c46fe88ab52f1b0ee1b00f8e CVE-2021-34445,0,0,3be053a81f0869f1e0b85e13e959aa9c57b85c94202fc6f3c2a2979b99a6a3e7,2024-11-21T06:10:25.613000 CVE-2021-34446,0,0,26368510f2c106944bc5778718e81227231724fb987fd9db58449c9aec707741,2024-11-21T06:10:25.753000 CVE-2021-34447,0,0,b51302f17bd284381248841696cf978a79d8878f8eac6ca04d0207f01d0e22aa,2024-11-21T06:10:25.940000 -CVE-2021-34448,0,0,9a7221bc824b048ddb1ea6a8a23b64f552b1f6c6f338fe5435d45f6106a7fdba,2025-02-04T19:15:24.500000 +CVE-2021-34448,0,1,332ea54b153b6366892e7a4492b66c263e1a2d31cc7b8caa317eeacb8d876fe8,2025-02-24T15:48:50.077000 CVE-2021-34449,0,0,bdeb3723e98c8328d35121e29bf6d4cf6fbb5d640b1faf7b0465afef03f4c70a,2024-11-21T06:10:26.270000 CVE-2021-3445,0,0,9dcdbe113c8bf9acae51b0f86b771e4cdfe623ee5c624edf7f05acd1d8c947f4,2024-11-21T06:21:32.420000 CVE-2021-34450,0,0,558a31e63bfadc425eac560c2df7fd387b02ac050955f52fffee4b4529fb0d52,2024-11-21T06:10:26.417000 @@ -177984,7 +177984,7 @@ CVE-2021-34469,0,0,d4dbc48ce9563a483455b43cdb9625d3b723f3b7bbac8da7f56a38837e996 CVE-2021-3447,0,0,1e7558907c1c1faba522cc7a6730edf6ac5facb27d87689e27df1c15a6b9e864,2024-11-21T06:21:32.710000 CVE-2021-34470,0,0,da05bdace483db545d4950e89ab5caa8d4704a9cbef95e25b4526976371d7619,2024-11-21T06:10:28.947000 CVE-2021-34471,0,0,31018fb1130f9a345d4966602af418d2b134d9e36f03eaf8c025bdfc4923486c,2024-11-21T06:10:29.080000 -CVE-2021-34473,0,0,cf59bfbacf9453e5a1cc2aca457255091a87aa1d7ce4704d9572d0e411953823,2025-02-04T16:15:33.243000 +CVE-2021-34473,0,1,090b1c6e5508af4b3386ef8d4b78b7433826dc0804729b21123c8f87c9586bc5,2025-02-24T15:47:44.973000 CVE-2021-34474,0,0,735de343dc608f0136e4af8f6909c6448a8f08bfdede68f6071e7c8b222ceacc,2024-11-21T06:10:29.333000 CVE-2021-34475,0,0,387e0dbb7edf18b41bb58e0f66e068cfd81597b0f3ab3b1ebfb8d1339f8690bc,2024-11-21T06:10:29.460000 CVE-2021-34476,0,0,b2c84dc9acd4339fb28788804a6452b29cbfe33dcd8d2805272f323fbe1e46fa,2024-11-21T06:10:29.577000 @@ -177997,7 +177997,7 @@ CVE-2021-34481,0,0,fa9f58a34ed425a85fb32c16b6516829698221f7cd1ef8caa2d810c37809a CVE-2021-34483,0,0,b1bcf3bf0153b3e21f85a32e1c1320e1bc1a3f2dec9aac2b8c831fa061f8a0c5,2024-11-21T06:10:30.470000 CVE-2021-34484,0,0,6dabe49c49aa1942857bfc753ff3ddda1cd8c6501dac1cda002856653f71f81b,2024-11-21T06:10:30.613000 CVE-2021-34485,0,0,7ec07ddc7298b19a8bd5cacbf8ba2419676dd38d881ceb2cddd8bc3466b58d19,2024-11-21T06:10:30.770000 -CVE-2021-34486,0,0,705af7f0fd93080f383cb775c23fd117526d2db5dcc62d9c994d62ce39e2ee94,2025-02-04T16:15:33.430000 +CVE-2021-34486,0,1,85746913a6e6f5f06b486630792b96823c7a78f6fb1215efc1871bc1960921ae,2025-02-24T15:47:13.477000 CVE-2021-34487,0,0,36c9da9b1916b16290217d789ec95077a0d488305cd0e4abf8b665a6e00ca0e3,2024-11-21T06:10:31.087000 CVE-2021-34488,0,0,47c70b3edeebc429b06ced75bc61a245a8be23991924b8ad72a522526ea9092a,2024-11-21T06:10:31.220000 CVE-2021-34489,0,0,e75fb0321c20b47db8f2bcb5bfb42c5b930f73c1a42ae98e680f72c904eef22c,2024-11-21T06:10:31.353000 @@ -183380,7 +183380,7 @@ CVE-2021-41375,0,0,83552232e0c684ec5d122a4f6ac17e0120f4a9605ed45bd062b895f81c804 CVE-2021-41376,0,0,81e84bfde833615dcc05e07eb301575f228e089fc07a5d9b6da4abb8218b78bd,2024-11-21T06:26:09.830000 CVE-2021-41377,0,0,5fa519013c65179c550154c86f1a1e8e37283cc4e766e943f5c05bc4e0417ef7,2024-11-21T06:26:09.953000 CVE-2021-41378,0,0,b2b9daba4bed00f9b6b27e95f1a5078e8b5a5d40fff2a60f4687cea7e34bb17f,2024-11-21T06:26:10.133000 -CVE-2021-41379,0,0,c3a61efe19f5ffd1fc8170b6903499f99ff4f46415ab9d846510b59a6544a2a9,2025-02-04T18:15:29.393000 +CVE-2021-41379,0,1,9d493b1849ad70968963b02d9a8800f1bf12452b20bf0ad6bef92f126b6e932d,2025-02-24T15:45:58.577000 CVE-2021-4138,0,0,4a3174dc5c2d358b84f4686deee4dd9871e8441b22d69c1af512882180e46494,2024-11-21T06:36:59.050000 CVE-2021-41380,0,0,8e2e1ec68070c2e79f504a2598afd0a15edabd696a2d6569d992a0cf8d36b452,2024-11-21T06:26:10.447000 CVE-2021-41381,0,0,974707334af4dc13d31204f87682d84ad5c7b9a4863f2463e8317b0bfa9efcf6,2024-11-21T06:26:10.593000 @@ -184559,8 +184559,8 @@ CVE-2021-43136,0,0,ddbd894c0288f80b2f14e5e2b6995579d70423326eca1b92a6d9d55b95fcb CVE-2021-43137,0,0,75041ac11b45d45d58b8e354e2699633a50e46f4993225f8e0247da220317b64,2024-11-21T06:28:43.250000 CVE-2021-43138,0,0,36c8c665c09a284260f334418a653da63fed0f6cb2985227b7f07d6b40bf5592,2024-11-21T06:28:43.393000 CVE-2021-4314,0,0,8530ddc05575e119978712d90a2b436a5b3b65c13b1a34b33feb66ff0e3dff9f,2024-12-19T17:00:28.533000 -CVE-2021-43140,0,1,8ef41b6ab7df7dab1ea1c90aa430da8e3ebb0505ca0bf3247db7bc59fcf4301c,2025-02-24T14:07:36.703000 -CVE-2021-43141,0,1,29487b9cff585d2985f176103a68af6909ac3e36947f1677f6d7ee8d102f3700,2025-02-24T14:07:36.703000 +CVE-2021-43140,0,0,8ef41b6ab7df7dab1ea1c90aa430da8e3ebb0505ca0bf3247db7bc59fcf4301c,2025-02-24T14:07:36.703000 +CVE-2021-43141,0,0,29487b9cff585d2985f176103a68af6909ac3e36947f1677f6d7ee8d102f3700,2025-02-24T14:07:36.703000 CVE-2021-43142,0,0,f5a1f13cd611732a6ef4cf87b41ea581d01cff8d678281559bab8ff3506fda5e,2024-11-21T06:28:43.860000 CVE-2021-43145,0,0,be43a14f66d53513ca026cc86d1bc016da74fcc127a93ac7f6f045a62176a1d8,2024-11-21T06:28:43.997000 CVE-2021-43149,0,0,62e2e3de403be2da393f54141ac2e7660c7d210a1ac40fcb5d798e9de8176823,2023-11-07T03:39:18.540000 @@ -190494,7 +190494,7 @@ CVE-2022-20698,0,0,8c4e6874f62cd7f7526e1a8c85321cb01e8476ad2c7812f6f1217565c6e0e CVE-2022-20699,0,0,1b3a529c0dab497dd4cc7efc4c559d4db09d35912f16475fbb628ef55222a651,2024-11-21T06:43:21.340000 CVE-2022-2070,0,0,6d3bfc116014826b9681cd8a69f12bb0725ac3caf80c58fedb4b9ef101064308,2024-11-21T07:00:16.297000 CVE-2022-20700,0,0,75647e934b416e5618d2bc6e398cbb3c442fb8c834fdc00ae04ce8c4e4ee5e17,2024-11-21T06:43:21.503000 -CVE-2022-20701,0,0,e602e54f4b8733954b8f954f98c3bc25fb8710b9e93cce350ccc74cdf872ef27,2024-11-21T06:43:21.653000 +CVE-2022-20701,0,1,12ec79366c6d611caf3c8669d5183516871053644b59cc6380f9923e5a3da835,2025-02-24T15:23:58.563000 CVE-2022-20702,0,0,c78e0ea2415026591ccac4ac17ecf407c71501f14b28655e64bfc4e41c7064f2,2024-11-21T06:43:21.797000 CVE-2022-20703,0,0,beb625de1f7f66dd0e6bdd15a3e565edfec508a57a1e7b6b78e9ff8f28fd72df,2024-11-21T06:43:21.950000 CVE-2022-20704,0,0,a8f6f3904cc6591b913d7fb3736798eaf88ff646f6610387c894a92084354835,2024-11-21T06:43:22.110000 @@ -190625,7 +190625,7 @@ CVE-2022-20817,0,0,ebb3f22ee663baaf5b6cfc7bc89436aaafaece79f6b4a8db3fd0c3984a913 CVE-2022-20818,0,0,5e69605fce0d2ad49d589ef45f22549141c8883107cbeaa1c45f335f2533923c,2024-11-21T06:43:36.913000 CVE-2022-20819,0,0,535e5c17b2a71dc935efed00e10b9c1230c66616fba38a624427d509e56bba75,2024-11-21T06:43:37.030000 CVE-2022-20820,0,0,9dd6b303d26fa1f2b5195f8d4d6b12425ce02c1daf23d45f98c9ed359be71e1c,2024-11-21T06:43:37.143000 -CVE-2022-20821,0,0,0233b2ab9d36ef0916672729cc863506922143112af73e7df8c6ea939e3dbd65,2024-11-21T06:43:37.250000 +CVE-2022-20821,0,1,c329d4a8020503aa4227197659c5cc0de7a39478333a85f38ce0764a7b05015e,2025-02-24T15:24:27.177000 CVE-2022-20822,0,0,baeea663e97c1737007aeb76f70345960275c929b3814cafd6914d04acc2d442,2024-11-21T06:43:37.377000 CVE-2022-20823,0,0,0612c16a77b8ad35a967b17723bd01c542fdcad496bd816e773f497f79b1e45c,2024-11-21T06:43:37.493000 CVE-2022-20824,0,0,11e5b1695de6789f3ee3df795b96c12d4dfb5a6e6ef523bb0e7f0de0136fa6ea,2024-11-21T06:43:37.750000 @@ -191634,7 +191634,7 @@ CVE-2022-21915,0,0,733a27ed3adf67102a98fd2bdba0d8a514b13782978b95f2d4982492270d1 CVE-2022-21916,0,0,b69631f15a0fb674fbb7169ae326eee8f8ad0c6cbb3a6307ac111a73dac64051,2024-11-21T06:45:42.160000 CVE-2022-21917,0,0,ddf3280e67f56f4d9836b6f015c4bc848fe82fa418df25d1a39e960bf42de716,2024-11-21T06:45:42.307000 CVE-2022-21918,0,0,f9df3b4062d99eb7404e01469f8a309983328e3726f464f1aad1b85bd20db840,2024-11-21T06:45:42.427000 -CVE-2022-21919,0,0,9c0d41559e05deacea60733fdeac966637e736b991e296f1f7ae86dba60fef19,2025-02-04T18:15:31.033000 +CVE-2022-21919,0,1,d225e5684101d5c9e741436f4e89f392a8f9afafab773ab3f5f0f67d2609b06a,2025-02-24T15:45:53.143000 CVE-2022-2192,0,0,7e254241846c3bed80466cce5467babb10e0f60169a92ec8b6bc99acd73ddb5c,2024-11-21T07:00:30.933000 CVE-2022-21920,0,0,86008a37e7c67f0b199c14cb2bff0f2033fd6656991ef34f2148fc1cf25ae237,2024-11-21T06:45:42.693000 CVE-2022-21921,0,0,6be0041c67597dd3a0e144aa54edc9f29a7b8b836f4030dff3ad630ea0d60d5b,2024-11-21T06:45:42.833000 @@ -191685,7 +191685,7 @@ CVE-2022-21968,0,0,d5062c4319463aa047b586fcc8dd27ce1a1a96281a11f435bc9a5830ddcbb CVE-2022-21969,0,0,8297cf8698ba0ec8523c718667ba103d5f4d9d3cffbac396de7e805bba702625,2024-11-21T06:45:48.127000 CVE-2022-2197,0,0,a1b5748257df97d64a7d425871e6ed4b34d1c581d01bf2c50a03cfae6239d45c,2024-11-21T07:00:31.490000 CVE-2022-21970,0,0,6a09bb1b4395b2cca62a54d49b40bfb57b673996977ef86cd5eccc7b18fa0f21,2024-11-21T06:45:48.240000 -CVE-2022-21971,0,0,c54caf852ace9f409fd99ef477530a67814ed5de90a9196c8e218596eb6d9c0c,2025-01-29T21:15:12.387000 +CVE-2022-21971,0,1,57611ae147e7b815b140c7f2db5ab04041606fc9c9e4691f9e5c88d57618391c,2025-02-24T15:49:16.387000 CVE-2022-21972,0,0,4bf9b004004ff72a3f3b8d7c265daf7f2a0c3c01ed2b55984dfe69b8212107bd,2025-01-02T19:15:24.787000 CVE-2022-21973,0,0,52f60a4bfcbffaae1632fe3aa88ee32ebc87450d459cfb53d7df431926b2fc31,2024-11-21T06:45:48.643000 CVE-2022-21974,0,0,b4e71c0e1517ff1b577ad4adc1c21ecb2a5321f1fea1f0b5b913ec932a3bfe5b,2024-11-21T06:45:48.763000 @@ -191713,7 +191713,7 @@ CVE-2022-21995,0,0,2c4c59cd8aac169045d118ff5db0c39955a9bc7255bfc9de46bab32d09f8d CVE-2022-21996,0,0,5d7a63b7bf1cbaba7f0b89f233a6184a6daef2835cbaf61527a30aa84301d8b6,2024-11-21T06:45:51.373000 CVE-2022-21997,0,0,a189d5bc55d65262879825d963c90c54bca2753492dd039c8d6ee091ca0751fe,2024-11-21T06:45:51.480000 CVE-2022-21998,0,0,10815b2856e4b8c15780f14116da93580b1c7eabe0d8b36e25534a571d9eab26,2024-11-21T06:45:51.623000 -CVE-2022-21999,0,0,94e438358469c8a1e5cb0141e5967ef29e2ac8b0f098bedc3f3d9efa0d2eb460,2025-01-29T21:15:12.597000 +CVE-2022-21999,0,1,69017e7708786e2a4fb194295ebbe290d54f6dd28ffcd0f69dc233c122c138a3,2025-02-24T15:49:00.477000 CVE-2022-2200,0,0,b9fa151622a7a594af7805adb3f9ccd1af99ae4e623fc45fceab9afffbdd3b9d,2024-11-21T07:00:31.873000 CVE-2022-22000,0,0,a9ee2fed0f4fc8aa0deb4c056e5debea4a51fc59bd47d3738c398ae3881ba782,2024-11-21T06:45:51.930000 CVE-2022-22001,0,0,0f47fc6cba98402ee3a0be32a597f27004e9ded5c15c808bd12bbc112dcdf651,2024-11-21T06:45:52.077000 @@ -193998,7 +193998,7 @@ CVE-2022-24517,0,0,976ee993882a7905c82c05f5af5ab1a71a8008f20bf5530d2f6936ce8e48d CVE-2022-24518,0,0,3f656079681678859ef7766766ebbca2a0d289d14d6322178dccd570d82f0351,2024-11-21T06:50:35.303000 CVE-2022-24519,0,0,afba24f646cad3b0321a1dad00d502fd95d8463d4825cf8dd965c5826ae6bd33,2024-11-21T06:50:35.437000 CVE-2022-24520,0,0,4392a22e66ebd8297d143ad67bc5c303a73cfe44177d595cc65da8fb4eaa925a,2024-11-21T06:50:35.553000 -CVE-2022-24521,0,0,e4f04a0ced6e10ab7c5defc94284be518cfbb94be2b7e9ed3bf3a75cb4ad3c5f,2025-02-04T15:15:15.040000 +CVE-2022-24521,0,1,cfa10b375962e7e78d6666fb88922ca729f0d082b86d0caac200195bd33b701f,2025-02-24T15:48:24.020000 CVE-2022-24522,0,0,953edbcb0ded95b09da79479905980eebddf7270b863f7d62fe23afee4ed2573,2024-11-21T06:50:35.827000 CVE-2022-24523,0,0,2026211e64565ecb5aece6760ea77f91c7efb638bee1b889801a283f194a6570,2024-11-21T06:50:35.943000 CVE-2022-24525,0,0,0fa0b071bf9a5e89a3b6d122baca2672bd1f8c8a6e691b1d6d6d1a17c34bd011,2024-11-21T06:50:36.063000 @@ -195476,7 +195476,7 @@ CVE-2022-26279,0,0,5a355f0e5218784c7555e0e37f8a323273b89e8e88d9a3fc99916e56f6868 CVE-2022-2628,0,0,5f95b62bd5e4e6e889b5da28d28a56c9f3b7cf3ca16c7c6cdf4ff62cc3ed92ba,2024-11-21T07:01:23.403000 CVE-2022-26280,0,0,ce1530b11c6bdf1f841bbbe63f863451b6cb8abfa6d87c0f15e1a98d82b65c1b,2024-11-21T06:53:41.423000 CVE-2022-26281,0,0,0fc8652c7de35ff5875af202a1ce8d8c7865b0ee591ccdf2a479ce66904ef41c,2024-11-21T06:53:41.563000 -CVE-2022-26283,0,1,a5160e059d4286ba1c1f3e442a56dd6c84bcfe84622ff4387336700cdeaa40f0,2025-02-24T14:07:36.703000 +CVE-2022-26283,0,0,a5160e059d4286ba1c1f3e442a56dd6c84bcfe84622ff4387336700cdeaa40f0,2025-02-24T14:07:36.703000 CVE-2022-26284,0,0,798f98603dde4c4495d53371f83f10f46c189a72cb653f58efc2faa88d42b94e,2024-11-21T06:53:41.833000 CVE-2022-26285,0,0,2aabd5fdd36ee2669ceac4aca3041c309c01ab0ce1184aecee7d0e8bae6bc4c6,2024-11-21T06:53:41.960000 CVE-2022-26289,0,0,137530270ce43baa296c7e4eb1c24fe192d24be307be02f7f9149c32918a156d,2024-11-21T06:53:42.090000 @@ -196011,7 +196011,7 @@ CVE-2022-2690,0,0,8813a4f0d4977e20113eabc1838ac0b3003f1caf6c51ba9b8d91580b8e5842 CVE-2022-26900,0,0,d880c889625626d3735b4784a462b5c460a9fd9f50c95ef0eff6086cf1b7e08a,2024-11-21T06:54:45.560000 CVE-2022-26901,0,0,9d0e66becbcd26301eed9b1c25f2ca27dce1717e3bf42d1e96ec199cacec5e06,2024-11-21T06:54:45.673000 CVE-2022-26903,0,0,e12b41a9da78b986fdbc4a5ec5dae73e817265ef9e6b2c6c86350ac193933154,2024-11-21T06:54:45.797000 -CVE-2022-26904,0,0,7fb0e227c008933ce60510b6a7729bf8a7a48ced21db8d0cdfe5d9f9a9627b48,2025-02-04T19:15:25.737000 +CVE-2022-26904,0,1,d27c60a6127f680a07b8c29671749fb64d2aa46dc3dce899c7793ee5607b5943,2025-02-24T15:48:46.037000 CVE-2022-26905,0,0,69a4dd48477000d78e135fac8d8376d75e941e147735b7ef075f39a5e9916a61,2025-01-02T19:16:02.740000 CVE-2022-26907,0,0,689c1992b75a581ae3d75db7f5722f9717a352fd1bf0567ba741426018d8f1a4,2024-11-21T06:54:46.207000 CVE-2022-26908,0,0,df4a80aa936d2011d9c2c07e6a76840f01e9b009d58a9da3ef4fc1ed167d3f67,2024-11-21T06:54:46.327000 @@ -196030,9 +196030,9 @@ CVE-2022-26919,0,0,2be6fa85d2f1f820a10e2f8f382ec9aa51e76b0f6c58d833c9e1d6489267d CVE-2022-2692,0,0,cea1f2233bd80b5e90d929904d7a402ffd8d37bc63addea2cb69a7aee1781bd5,2024-11-21T07:01:31.613000 CVE-2022-26920,0,0,f19a1827b2342d4268ac1948c6d01ea2da57501ff06111f56ca13e62f1589347,2024-11-21T06:54:47.973000 CVE-2022-26921,0,0,f7f5e97455309a1d12f9e641384b7efb70e8a194c09972863e5da3e9b9de59a1,2024-11-21T06:54:48.090000 -CVE-2022-26923,0,0,e07043b95dbf031d5e24ddc259fe7808e2d7b94c1e6ca963bf50b0de815f074a,2025-02-04T19:15:25.930000 +CVE-2022-26923,0,1,07a60a767d6acaa5dca74979e8774e47bcc1a3e13fa2c292024a719d14c8b3ad,2025-02-24T15:48:42.047000 CVE-2022-26924,0,0,88a880ef73d10c778e003f2b302cf4b2bbf71c2545921c162b8a20045f08b714,2024-11-21T06:54:48.347000 -CVE-2022-26925,0,0,fc86de3a914927dd428ad0bf51f02e453f0ad38931487d2294f56691aa059db3,2025-02-04T19:15:26.153000 +CVE-2022-26925,0,1,246ca815e82beaa090fcf2c97368b3882e7b10292183f41e808592cc7a56a270,2025-02-24T15:48:37.850000 CVE-2022-26926,0,0,12e459ca497e8e9c1fc9512c8e135fc9eace00b6b68dc32a7687e47916fc5c00,2025-01-02T19:16:05.313000 CVE-2022-26927,0,0,2afeff873aba1802ddfafb1bce4dc5043958167ff653fe98f58dae867bba9294,2025-01-02T19:16:05.490000 CVE-2022-26928,0,0,678ccb6dc79c21bc2d956d0c5c459704bbf3ca96625fb3b98792ae1399c41543,2024-11-21T06:54:48.860000 @@ -197127,7 +197127,7 @@ CVE-2022-28329,0,0,8dd67199cf8e5470e33e762e69db0b9f99b4c9e7154908e638a4dcc68ae6a CVE-2022-2833,0,0,193f5868872238baaa6701877eb950244915da7dfa825a317ed0b2e87d7e3949,2024-11-21T07:01:46.513000 CVE-2022-28330,0,0,720a221408c453658519e124c2081468d291cb226b3e5f4eb9303d03ddf0cf68,2024-11-21T06:57:10.600000 CVE-2022-28331,0,0,d0840e228f60d68274c3bb3d356bbd52f9a100d1e5dbaf3d4dff0134f5fa3eb3,2024-11-21T06:57:10.740000 -CVE-2022-28339,0,1,675eb9e1c4e37b94be1c6b4347ced37bfe4355ca8253859b60d0740b2afd0972,2025-02-24T13:15:09.560000 +CVE-2022-28339,0,0,675eb9e1c4e37b94be1c6b4347ced37bfe4355ca8253859b60d0740b2afd0972,2025-02-24T13:15:09.560000 CVE-2022-2834,0,0,3df7f8adaa0590ce6a82e2d20eab1cb943b1cf590c7ccf90c6a65bdadff741d7,2024-11-21T07:01:46.617000 CVE-2022-28345,0,0,9f6c32c8c04cb15129dacb710db572689285b6df84aeb36f708255746f133894,2024-11-21T06:57:10.860000 CVE-2022-28346,0,0,b18e778a422724f4e788d4c0dceda5a1a5c607916e6571a048ed72bec9c00529,2024-11-21T06:57:11.007000 @@ -198553,7 +198553,7 @@ CVE-2022-30049,0,0,be9a743fa06fcb2cf00839f0af8d82d9d1a445c03ee42edb9047192d3808c CVE-2022-3005,0,0,f41f1c0dc2cbf93e073a28b6e30e62bcb7115aab5be36d141a5a7bd5f49f041f,2024-11-21T07:18:37.487000 CVE-2022-30050,0,0,8991b8f8aa7ee2f60172ad0df00029ccab7bb6f4b8e535deae6f4798c6073b7d,2024-11-21T07:02:07.653000 CVE-2022-30052,0,0,8ec52e640be5857319a42a4df1beb987c3632a36ab41f7b39e51e1c27782be22,2024-11-21T07:02:07.807000 -CVE-2022-30053,0,1,d468ec81bff9ef4491b4830cb076fafd7679f3ea7fae79ce69cacef03344c2d8,2025-02-24T14:07:36.703000 +CVE-2022-30053,0,0,d468ec81bff9ef4491b4830cb076fafd7679f3ea7fae79ce69cacef03344c2d8,2025-02-24T14:07:36.703000 CVE-2022-30054,0,0,8a0a7499dd04b83de9798aef0470a737e6e748af9d1f75b7942e7f98ba739d0d,2024-11-21T07:02:08.097000 CVE-2022-30055,0,0,fd5e0392383a527a533bccb04e59d63c65097749853f583fb979ae881ce92f74,2024-11-21T07:02:08.240000 CVE-2022-30057,0,0,e1353537303a248a9634067463bb1bed4b05fe0e6a27efc72f7ffadab6ddaf1d,2024-11-21T07:02:08.390000 @@ -199218,7 +199218,7 @@ CVE-2022-30833,0,0,b4d8c0443e50ad78a70ce47160a238a167761a17341d31038f7810b189ff5 CVE-2022-30834,0,0,d69ec590aaa47f1892158ef4353e42c5b5fcfca83c0eec4eef4bfd2689c28bcd,2024-11-21T07:03:28.980000 CVE-2022-30835,0,0,a23ea328c90a0bc59cedd153ba0b7832efe825db7765873b75a7067ae9f3311e,2024-11-21T07:03:29.123000 CVE-2022-30836,0,0,cf6810434dd2871fea9689dc7391a28e66325a6e7bb106dab4e48ce2f485012d,2024-11-21T07:03:29.267000 -CVE-2022-30837,0,1,01ea15942e900b2f5df2de1756c4dc74095a61d5746c100815b68b5e5ff9d4a3,2025-02-24T14:07:36.703000 +CVE-2022-30837,0,0,01ea15942e900b2f5df2de1756c4dc74095a61d5746c100815b68b5e5ff9d4a3,2025-02-24T14:07:36.703000 CVE-2022-30838,0,0,b0345e0b444144233ecd78a753f631132a183c95d6e4b8f962c78075d73684da,2024-11-21T07:03:29.577000 CVE-2022-30839,0,0,9d17a3fd8461c8867bf3f6953f830d33308fb3b3ace9268eb0b7f4806a015014,2024-11-21T07:03:29.730000 CVE-2022-3084,0,0,1ff93aad80ec5a71fff1825569a809c725bbb85a3895648b9e3196b561846e38,2024-11-21T07:18:47.383000 @@ -201711,7 +201711,7 @@ CVE-2022-34061,0,0,e9ebb77f94b8f3ae1ce9294c44ac5eb5aeca4329608177b1c848620cac584 CVE-2022-34064,0,0,3aea8b83e4545b5c64a5d584ca4930473c5e86d2006cde49084d62d803f9ac87,2024-11-21T07:08:51.693000 CVE-2022-34065,0,0,af6fd1ad7a71e7c25d840fd736cdc07ba3c582cb8588ecc40430c89da610de7c,2024-11-21T07:08:51.847000 CVE-2022-34066,0,0,875119f91f1337089090f7f3b1a23fbf9194257ca7e61309475ce106872389f8,2024-11-21T07:08:51.997000 -CVE-2022-34067,0,1,09a1449ff6463b91565e57b1a7ac80dfefd2fe1012ef9a4d57ef400954f188a6,2025-02-24T14:07:36.703000 +CVE-2022-34067,0,0,09a1449ff6463b91565e57b1a7ac80dfefd2fe1012ef9a4d57ef400954f188a6,2025-02-24T14:07:36.703000 CVE-2022-3407,0,0,e98f4196ada7f3f4136ef4cfe9e2826fa655ac9911d1bd36d4ee8a625bd18e1a,2024-11-21T07:19:27.357000 CVE-2022-3408,0,0,4816c0b1e14c7ac09634ec9b4572fffecce585b6fbbfdd7173bd555024299b97,2024-11-21T07:19:27.510000 CVE-2022-3409,0,0,bec6829aca72aa15c632121133c77f38822f7fa4561fe1064a443311f8ee26c2,2024-11-21T07:19:27.627000 @@ -207183,7 +207183,7 @@ CVE-2022-41037,0,0,a5207e410031b473199d76f446ea7aff35e792754946afac9d20e1b0f8293 CVE-2022-41038,0,0,5139f0eceb1c1c9e3c7156a1f72ea48e3023a913c5b772fa68fa0237089dc6cc,2025-01-02T22:15:19.540000 CVE-2022-41039,0,0,d301a8df2867f370f24c22b4f7dcb22e58d455c45934b727d390db5faf7449a6,2024-11-21T07:22:30.020000 CVE-2022-4104,0,0,c3f870f41b7e05a558f4ff2f68c6ab2edadddcec1c1e03e5ab7274cded1720e9,2024-11-21T07:34:35.460000 -CVE-2022-41040,0,0,02ccc758ad5f3e82547186b41e81e7077bc83d609aec2fcc4f6542d27250f012,2025-02-04T19:15:26.590000 +CVE-2022-41040,0,1,853896935ae18919cd01b04bd10b30ae51199dc50fc48cbc688bdcf6b0e84e55,2025-02-24T15:48:30.437000 CVE-2022-41042,0,0,8ed51dc60d4bf92596b08ebe51d7e2bf87951e8e15107f41266aba185b392fbb,2025-01-02T22:15:19.810000 CVE-2022-41043,0,0,47dd01e700c1c2263498dc011e32ab62a1d287f7f2170cff13f42ba9c4f6612b,2025-01-02T22:15:19.913000 CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb35f,2024-11-21T07:22:30.543000 @@ -207209,7 +207209,7 @@ CVE-2022-41063,0,0,9435a8e4ef0bd0f50fc908a2dbba3cf01fddc74e86e7c27bcbf629ae50f6c CVE-2022-41064,0,0,f04f6f08373dc8a60423f3ffa6286de803341a47388fd1b659533c8de9b8a34d,2025-01-02T22:15:22.180000 CVE-2022-41066,0,0,ce1a2b1b5b482b1b2b3c54fda71cd53caf8a12b892d2129ed715010d9e9f4ebd,2024-11-21T07:22:33.333000 CVE-2022-4107,0,0,c246852a852714826df52737e54f6a60efe1fcbe46137aab522cc8208332341d,2024-11-21T07:34:35.760000 -CVE-2022-41073,0,0,2d7c9e5e1a3afdb6a63873e04036b8874b5a5be7611b017b877587119b915fda,2025-02-04T15:15:16.030000 +CVE-2022-41073,0,1,86d544485dc20b678df660469cc86079a82e7647799329ecdb20666220df6661,2025-02-24T15:48:06.973000 CVE-2022-41074,0,0,5acedadf8aae837bcd545bf7b350b491a313ea4094c95e5c67cf49e8835a3aa4,2024-11-21T07:22:33.643000 CVE-2022-41076,0,0,78f083f1c56486769c87d0b1bd55077536e9e81ee66ff16a6d0643fe9a1b0c6b,2025-01-02T22:15:22.733000 CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f6b5,2024-11-21T07:22:33.977000 @@ -207218,7 +207218,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 -CVE-2022-41082,0,0,b6b4e5125804eda18b18c5254fdf07d51e04e80e78d97f6677c805c3c481e123,2025-02-04T18:15:32.070000 +CVE-2022-41082,0,1,942e30fea4d0eecc0abe3c211227f03814e3efec7d8323fcfd99cfc64386418d,2025-02-24T15:45:38.267000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000 CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000 @@ -207257,7 +207257,7 @@ CVE-2022-41120,0,0,84857395e75383ab804a670dc49a3d8950fdb1fef0ab47fbd83e5999ee279 CVE-2022-41121,0,0,4e594b1edf648c1fb0fe39657ca551c3229e2ba56f66b60b38dbff70d860305b,2025-01-02T22:15:27.007000 CVE-2022-41122,0,0,133e8735e10ecae83fee6579759d253bb3c7ca5d683d17cc0c179ed130908ba1,2024-11-21T07:22:39.850000 CVE-2022-41123,0,0,c21f7ec46912883651196d10160a60b8e8210f5760e35c9197740e4c6b4104de,2024-11-21T07:22:39.970000 -CVE-2022-41125,0,0,2b607ed9ebccb095bf3bb309c4f06bf4343173b17e87f4aa1396a6a23eb04ff1,2025-02-04T16:15:34.370000 +CVE-2022-41125,0,1,8d8af01c383f5a8f052575c5522ee85b37c5b7b849b33c420f50f1a231868c9b,2025-02-24T15:47:00.947000 CVE-2022-41127,0,0,c5470238c8916101c4c113c61b86334eac0b25796dc9bb1b6c150173f84c4526,2024-11-21T07:22:40.220000 CVE-2022-41128,0,0,06b3b8a1888f0c96f33c0aacf94835ccc39c664e258797f30e5849ce3524ab78,2024-11-21T07:22:40.347000 CVE-2022-41131,0,0,a9b352ec223f536926e75cba1208c8854d94f58ab28fa8a4439b6ee55aa538be,2024-11-21T07:22:40.500000 @@ -207453,7 +207453,7 @@ CVE-2022-41324,0,0,ed875843e60113cb17a1ce679f35ddda62b53568245a746ea86586c33e7f1 CVE-2022-41325,0,0,baa1678c3f007b2d7b88f8e64740ab3751b2557e9b7de1eff53b318bc65c5b4f,2024-11-21T07:23:03.263000 CVE-2022-41326,0,0,31338c9cf1331d33286951c001073bf9a48f88f16c308665ab9ca9fbe21b8e12,2024-11-21T07:23:03.433000 CVE-2022-41327,0,0,dcb7de65540a5f5035a41930d6615f75291414b7c854058707c94a45bef64fb5,2024-11-21T07:23:03.590000 -CVE-2022-41328,0,0,709ab5f14828a2033981b3310c9ed6b05d261b34f810ba656b03d820c589eb8d,2024-11-21T07:23:03.750000 +CVE-2022-41328,0,1,7a04b10cf86922c1d28a494aca63741ad390271903df25c5ebf68f0b665d0df3,2025-02-24T15:45:02.397000 CVE-2022-41329,0,0,1b16c7187db0e7d1a72a4edf56e92688062cfaeada5519fbf5963836dfe109a5,2024-11-21T07:23:03.940000 CVE-2022-4133,0,0,d2373aa49e74a43718776f2d07903e30b107acccdd6edec5f57d5639161f7859,2023-11-07T03:57:01.190000 CVE-2022-41330,0,0,16e9744ca1f10cdf4787cc523180d95d39834745c4bd072d72c3a8e98c5b9b38,2024-11-21T07:23:04.087000 @@ -208081,11 +208081,11 @@ CVE-2022-4206,0,0,1aee08103697abc4d0f788d863453fe3dbed77b861dd38ed5925d1d288e158 CVE-2022-42060,0,0,7b37cc746910e6c0e6f8a568005d22f0226ff8b766e0fffdd75d16d18c92f8bc,2024-11-21T07:24:18.723000 CVE-2022-42064,0,0,bea86809ebe691b63bb1b74ba5dc7262d76357532a01601e96663d3b50365e14,2024-11-21T07:24:18.863000 CVE-2022-42066,0,0,69bedc7a664c9a97dce979d61f9cb9a262653fcdcab729ad8d1fc3ae02992775,2024-11-21T07:24:19.010000 -CVE-2022-42067,0,1,30ed09f7b6f8d283ff2cdbcaf892dd69d1d178082223c5c301a501b565946096,2025-02-24T14:07:36.703000 -CVE-2022-42069,0,1,596837ec562aa9b3013e61841f4d6b8f6c692b4f280c91fd9083d698195939ef,2025-02-24T14:07:36.703000 +CVE-2022-42067,0,0,30ed09f7b6f8d283ff2cdbcaf892dd69d1d178082223c5c301a501b565946096,2025-02-24T14:07:36.703000 +CVE-2022-42069,0,0,596837ec562aa9b3013e61841f4d6b8f6c692b4f280c91fd9083d698195939ef,2025-02-24T14:07:36.703000 CVE-2022-4207,0,0,eecbe6ea3d90213242f76ba0c11fca267e726a9f05c27ae6759c272473e97648,2024-11-21T07:34:47.400000 -CVE-2022-42070,0,1,97c87e4124e3a6c63e0f7f8074768bfd9e21ceba295b0d0ff3b2cc433df8f6d1,2025-02-24T14:07:36.703000 -CVE-2022-42071,0,1,0e4224f4abefe126aa99d721a9931a1b070ce7fbc36069db1742a9987b15cd94,2025-02-24T14:07:36.703000 +CVE-2022-42070,0,0,97c87e4124e3a6c63e0f7f8074768bfd9e21ceba295b0d0ff3b2cc433df8f6d1,2025-02-24T14:07:36.703000 +CVE-2022-42071,0,0,0e4224f4abefe126aa99d721a9931a1b070ce7fbc36069db1742a9987b15cd94,2025-02-24T14:07:36.703000 CVE-2022-42073,0,0,f037277709d8956f850386b37db288426b670b89a2db3b3be5894ecfebb5c1e6,2024-11-21T07:24:19.730000 CVE-2022-42074,0,0,ab64984592e5ae8396a91a71bdcadb587e9a0b291e55cfa660a2306b1c929a14,2024-11-21T07:24:19.863000 CVE-2022-42075,0,0,5717489159ca2a0428aa0a7f44a61b99c114e6b50d92f3d174dce792df834b3a,2024-11-21T07:24:20.003000 @@ -208430,7 +208430,7 @@ CVE-2022-42471,0,0,60b7bf96b09df6ccacb62bc950716a24d5cb080a7b88192876de85dbb17c8 CVE-2022-42472,0,0,1a66230bfbb99d12ba85a37920bd3d9a5216ee44c4f47d93a53d54df7183ba83,2024-11-21T07:25:02.230000 CVE-2022-42473,0,0,4f60c9b8f0167ee1c6e0e8a847bba60c0510adcc1d19b941727f2a1ea0118fe4,2024-11-21T07:25:02.403000 CVE-2022-42474,0,0,023494f1ce00b3ef8ebb55528df2db2632f35454d6178550c01d80daf9929a61,2024-11-21T07:25:02.533000 -CVE-2022-42475,0,0,2042363de6b99aa603e76b9cea3523febad5a86cd87da9aaaddccd0fe593d057,2024-11-21T07:25:02.680000 +CVE-2022-42475,0,1,0b326967d63e6fc9efbe53d76039c8f793737d4e13bb2e46444e2cfe68d3326f,2025-02-24T15:44:21.153000 CVE-2022-42476,0,0,bafb54a6bd4d07c50e7df8e218d79c354592894417b9699ca8ffc720773c9740,2024-11-21T07:25:02.870000 CVE-2022-42477,0,0,53a4256a4d9e314b3cbeeb05dbe1ca82f0ebe8308adba2723e8ca37d24131678,2024-11-21T07:25:03.030000 CVE-2022-42478,0,0,7276482d6f77e2becc2ce1523af6a1701731782f5b28d0fe1297c1e5a2ce8f71,2024-11-21T07:25:03.170000 @@ -212457,8 +212457,8 @@ CVE-2022-48349,0,0,ea8149ba67a972f5c4f4e134a57dcae0690d1644c460de70cd78210afd8b2 CVE-2022-4835,0,0,0342ae1f95dc8d2e957e0430756d0a4236a488c4c4e1a010bf206123dd786fcd,2024-11-21T07:36:02.473000 CVE-2022-48350,0,0,d7112145456b6707d2e501da5ab99e418c55b353c4085160cb54d6ea6b5fa95b,2024-11-21T07:33:13.727000 CVE-2022-48351,0,0,234b7631536e215deb8473c4dff32606d965be955b23ea9e6171b98bef903b38,2024-11-21T07:33:13.850000 -CVE-2022-48352,0,0,20bfc4e97bd7443f0557408ef6bfc7a38fadc007bdb11212680a5e95f0b9d6af,2024-11-21T07:33:13.967000 -CVE-2022-48353,0,0,c312a2aaab35baee9b2f549c3ee31ffbcff26323aeea72dc1bff1852a435ed69,2024-11-21T07:33:14.083000 +CVE-2022-48352,0,1,d86867be797a1b5b2dd8a70bd1cbeb2c21eccf0ad77186550568b0580b01790a,2025-02-24T15:15:10.903000 +CVE-2022-48353,0,1,ba8df961b31ea4a14f5a347cf0d4ef1527afa65a712feabcae9952cd3ddda423,2025-02-24T15:15:11.180000 CVE-2022-48354,0,0,e4e996be4865dc038b5d4156f4bf61c45f363b3efd2e5e5dbfa8445bcc4512a5,2024-11-21T07:33:14.200000 CVE-2022-48355,0,0,5947f5e78bfd478e459967fc0f8786c068e37cb337bff56654c1ecd3321ed808,2024-11-21T07:33:14.317000 CVE-2022-48356,0,0,c78546924e7a16f432c171be5123b771cee8e699659459dd4314e336a6b1c851,2025-02-19T19:15:12.030000 @@ -215225,7 +215225,7 @@ CVE-2023-20105,0,0,55fb4595912c34a16766c1e0160ed5d195e64cb52c61711664dde3b6454d8 CVE-2023-20106,0,0,4427bc04b5ca0368a42e5586ee947e9cdd2b824d04b84fa4f1c2d9efb0ddb843,2024-11-21T07:40:33.787000 CVE-2023-20107,0,0,e62871cfd01f1ce231a5fc7e8a39ecc4be3bee1aa8ccae54ad1054c8fd611b15,2024-11-21T07:40:33.907000 CVE-2023-20108,0,0,8f43645508802f1d375878becc2acfed94a4f3ef81272dfeb4931880fdf574c8,2024-11-21T07:40:34.027000 -CVE-2023-20109,0,0,8f3fcda4eb5a1eefe1958b9e97c280056f7992b40257db280e648b20d8075a8d,2024-11-21T07:40:34.167000 +CVE-2023-20109,0,1,d069d4ac7740b4d2ae2d1d742af6b1663873fd12af0f77be47c13faaaf6b06a6,2025-02-24T15:23:16.197000 CVE-2023-20110,0,0,757144361d7b4d39db3faa08446890644173140e5976eb638754b213f8b359a8,2024-11-21T07:40:34.660000 CVE-2023-20111,0,0,061c9dd1b2564168df994929ed70c8c80ba29e0c678d39e48f30c6cfabb9a246,2024-11-21T07:40:34.787000 CVE-2023-20112,0,0,eaebecb8bdb153b472a9fe62a204f87b94f168f5db1079433871a38d94d8c9ac,2024-11-21T07:40:34.933000 @@ -215395,7 +215395,7 @@ CVE-2023-20265,0,0,99e45a1903dbf4a5042bc49e962ebaaaa0757e98d679648cf78564bcebd5a CVE-2023-20266,0,0,8e92452be45d5801b85de9aea28824f2decf2a0cfcb3bc1fda54e6f1f63de744,2024-11-21T07:41:02.020000 CVE-2023-20267,0,0,9e0f3b04112bfa1ff7b1a3770419c89436c021beb02416b4ff8b2afd1c2154df,2024-11-21T07:41:02.150000 CVE-2023-20268,0,0,e1514fa4a51f79bf6efcdcbe635cfe3bf3423b7089550c43c8e2adc87c2251d1,2024-12-12T18:15:21.377000 -CVE-2023-20269,0,0,efd16e3e27debfdcb9ea761b3fbe6c0e2e4e61ffd386ab38b60c61fce625548d,2024-11-21T07:41:02.433000 +CVE-2023-20269,0,1,7614cfde9f819990bed32ce1b918be7a78a21da9406ec98623e7803f5a162711,2025-02-24T15:08:29.397000 CVE-2023-2027,0,0,9e8d61ec9744421e4fb115f667516dc7b0114432a5d4e9c6762fbf9ed100733f,2024-11-21T07:57:47.270000 CVE-2023-20270,0,0,ed557079befd3422cfb0c1934dcaba9ce56dddfdafe8e32f7e1e843b533120e0,2024-11-21T07:41:02.670000 CVE-2023-20271,0,0,80117310a910ddc84d34d9321b8692e2e5930dd8aae052b4b0d41df1fd3fe7f2,2024-11-21T07:41:02.800000 @@ -215887,7 +215887,7 @@ CVE-2023-2099,0,0,4f7a3b2bd4c87f63026ec4d0057185b8bfea14a62680e6daf76fb0f08bba5b CVE-2023-20990,0,0,7dc5f663a8e47d8392b8fabf70760ac47283b9bf87254e73c733cc039198130d,2024-11-21T07:41:57.553000 CVE-2023-20991,0,0,7b399efa0d5baac366511d6b2a9df9db6a5170b61e311b04002474674af0f912,2024-11-21T07:41:57.663000 CVE-2023-20992,0,0,f6334e0723e45ac0382bd828de5feda2554549a49b7295f6005ed167f3df1d83,2024-11-21T07:41:57.810000 -CVE-2023-20993,0,0,6c389dd4dabd1341bd2f87c9fee45f96b6da36dc487b4b1c4453c1cc165c0550,2024-11-21T07:41:57.913000 +CVE-2023-20993,0,1,a98f2a79f28bd236c2bde2a4292a84e5b417581fc30a3739ef7594478b75d827,2025-02-24T15:15:11.343000 CVE-2023-20994,0,0,dfa8aae430a68b8416c6f7b6784c4af02777a783e28811e344f6423db3f72d51,2024-11-21T07:41:58.020000 CVE-2023-20995,0,0,ff5f724ba335f15f8b1ca32fa772420325307b8d934009306cc51c94a441c762,2024-11-21T07:41:58.143000 CVE-2023-20996,0,0,2282912a58e812d461a844245cf38bc9abf6f733abd9777917f3b4cf0650cd12,2024-11-21T07:41:58.250000 @@ -215909,7 +215909,7 @@ CVE-2023-2101,0,0,1d13aa7445b5bdde06a6eada8a295cc9de4238eae44451582b1cacf60a7415 CVE-2023-21010,0,0,eade32edfcfac3a829498e6a850e60762da75c30c766b1721a0bc2c2de4d701b,2024-11-21T07:41:59.783000 CVE-2023-21011,0,0,cb9e3be72b2f77ff45f7e0a26d9f2d0ec4ef7526740acdb356da0db2a7b1f99f,2024-11-21T07:41:59.893000 CVE-2023-21012,0,0,47d2dad02e92d3dd62afbfe86ce7c6864d5b8679aad699a64b02509759701271,2024-11-21T07:42:00 -CVE-2023-21013,0,0,627a524fd0d881db573f80621f116fe3c4d84f0824d2aaad6caaee6f7702c524,2024-11-21T07:42:00.110000 +CVE-2023-21013,0,1,6202d8fcf40d7c80712bddb18361caa29807716168d225c3c58a6973073cdcc1,2025-02-24T15:15:11.543000 CVE-2023-21014,0,0,8195a93a3f014f4cf458e110487e8c0c3a75319f87c5150ff2f9e6814072af75,2024-11-21T07:42:00.217000 CVE-2023-21015,0,0,cecf1af576c9b801c71b79ae4e9d6df12121b3a243448437871c714827f50e33,2024-11-21T07:42:00.330000 CVE-2023-21016,0,0,458548724cc71cfad5285ef3922c28e822361bef89d73e7163793c200bb4a04b,2024-11-21T07:42:00.437000 @@ -215917,7 +215917,7 @@ CVE-2023-21017,0,0,76b475727b02d7f06ae44a793e4f20c233e0866f4995965de228dd2867dcd CVE-2023-21018,0,0,896cce17934660c28fa90e7f4e5fde23337320157d5aae42031e9ce7f12778c6,2024-11-21T07:42:00.647000 CVE-2023-21019,0,0,723e07444d01b356418ce9c33f37700b504bc432003c95b3f75015926ddf8ca2,2024-11-21T07:42:00.757000 CVE-2023-2102,0,0,1f30776bd7546109d3fea589110ed243a709b5e1f7f74a918b4d566f83ca9c4d,2025-02-06T16:15:36.037000 -CVE-2023-21020,0,0,c23bc0d961e86c839ca649153d3f28b0026be750b4c14bb48c189d94bbd42c71,2024-11-21T07:42:00.867000 +CVE-2023-21020,0,1,d98d21ca140e17a8a5cd6b7ad75c664051a69a331f05c79e40733315f1fcab2c,2025-02-24T15:15:11.720000 CVE-2023-21021,0,0,d55dab5bb1ffd1ff4d3fe3d1856e21c43ecda1745938d739327dc3ccc73c46ac,2024-11-21T07:42:00.983000 CVE-2023-21022,0,0,b2c4db6e8f7e7007a62213bbe182c6f5082d5aed93d43b9c0a7e30c698b58e1a,2024-11-21T07:42:01.107000 CVE-2023-21024,0,0,2614300626e1dc31abc7c30b47c9b48f4b20e07744d102811be293c270d1d1d5,2024-11-21T07:42:01.237000 @@ -215944,7 +215944,7 @@ CVE-2023-21043,0,0,4cf28ca85bcbd27b9227b2573af8a0495fc89cd1fdcf1c2734276d761401f CVE-2023-21044,0,0,f01920dc762e3a152ff7b5a4ca15d0c1356720e7c0f7b82205cab239ea1eb390,2024-11-21T07:42:03.433000 CVE-2023-21045,0,0,a152788a6f62c7091dc78aabc332acb1f5c41a0d65c30484aa75368547d3719c,2024-11-21T07:42:03.543000 CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053229,2024-11-21T07:42:03.653000 -CVE-2023-21047,0,0,0d53e1c7ea17634b7f5bf62aa1faeea80360d32f663c513e9bbb9ff9e722ec18,2024-11-21T07:42:03.770000 +CVE-2023-21047,0,1,a8d476de5c22475a663a6cd0b7905a4e2678b820fc08e9b5926d525d5d6554e1,2025-02-24T15:15:11.890000 CVE-2023-21048,0,0,6eeae311c884bda35e7413de1723b0378d2d91f4bb8846497781364b6654419b,2024-11-21T07:42:03.887000 CVE-2023-21049,0,0,bb73e93fe402a1a1fd3c7954e241829b82101223330bf83d184d14f361624b5f,2025-02-21T21:15:12.563000 CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000 @@ -216626,7 +216626,7 @@ CVE-2023-21710,0,0,46cb73bbae0fde737c406113b547ec1e56542b60dfc41df429c6d6df9a100 CVE-2023-21712,0,0,60e3ef1ca88f29bdb619d8594e0905393083608a7f4615df3f488ed3c5afbfa1,2024-11-21T07:43:29.337000 CVE-2023-21713,0,0,433d7cc04f19f3fb1fcf71108ffcbcc5954fe0261bf7262cf2e93c999bf1ac85,2024-11-21T07:43:29.480000 CVE-2023-21714,0,0,a826bef743d768f3ebd08bf088949ea45f5b963c3a0d06e84b06f187d376b633,2024-11-21T07:43:29.610000 -CVE-2023-21715,0,0,2a58d26ab214d849aed134ba0819c8c47a6f6ea0b619a2d548e03baf716c25bf,2025-02-04T17:15:11.147000 +CVE-2023-21715,0,1,d2e7a81f7d68f0c480379ac2ccdeb9b3ebceea8616532ef965c0a4fa347f3b6a,2025-02-24T15:46:48.727000 CVE-2023-21716,0,0,ad0f14110c9c94a0a58aeed9fd7dd6b2c2c61bbba9c251e02ff545f237448e86,2024-11-21T07:43:29.853000 CVE-2023-21717,0,0,5d705bca19752be9d11d65ce9f294a675e0c7c2df02156816b58f244babbdff8,2024-11-21T07:43:29.993000 CVE-2023-21718,0,0,c9cb58903163963e0ff91d227721f5a6f31d7c877cdb3900ef3f4e255ae68d11,2024-11-21T07:43:30.117000 @@ -219217,7 +219217,7 @@ CVE-2023-24872,0,0,671db372b4fc5cf0a6a0e4e79a322a469f6ee9128071f391172290f9fdc06 CVE-2023-24876,0,0,b6b8afa42ab869a9a2feba8724301da7d4129a5fc5bc8a3dd1f583bca1fdcc07,2024-11-21T07:48:41.827000 CVE-2023-24879,0,0,f72aad5ba8755e42c3f76fe291f888c146ecddaade48a1928011910b5d07e6a0,2024-11-21T07:48:41.960000 CVE-2023-2488,0,0,1ff030b9a9cc358926f2f31f1cebcdc10263b6fd1a8f39d3ff95a9e9e914dd17,2025-01-08T17:15:11.237000 -CVE-2023-24880,0,0,7ee5e3eda17528088f56d378f62707e702c4d2b19daaed51e405b6c21b837da5,2025-02-04T15:15:16.667000 +CVE-2023-24880,0,1,217db8fd5f2bfc27d7bcff73485caede10e60b11d81e00b372ce0612c3406195,2025-02-24T15:48:01.833000 CVE-2023-24881,0,0,6b069e84033388c6b792588edb6dded8ddf1805480c83fada6521fb31796bbfe,2024-11-21T07:48:42.197000 CVE-2023-24882,0,0,aa9fb886dcc5cab48e91df247f90a69aca2b6abd32e6f6bd56dacc0faefe4e9c,2024-11-21T07:48:42.310000 CVE-2023-24883,0,0,f8cd2e3c588975da658157610ea853db7cf61d2aa3e5ce70748358ea9d242e3f,2024-11-21T07:48:42.410000 @@ -222198,7 +222198,7 @@ CVE-2023-28467,0,0,00f2e50435ec08a76fcdfe79697aea51cf3a5fa0a62e71b20272c0e161290 CVE-2023-28468,0,0,96975a0a127d2e1308e38dfacce8610caf2fe1c7c28a726f1dd9bf495a52d4be,2024-11-21T07:55:09.023000 CVE-2023-28469,0,0,0e8e15eaaeef38b9abb6c4c854adc4acb06a0654baf76b4a675b00f934b24a21,2025-01-08T21:15:08.143000 CVE-2023-2847,0,0,171c10115b3eac66e6e79455e19407d7bfce7799ec4038965923726ba3c8a70f,2024-11-21T07:59:24.787000 -CVE-2023-28470,0,0,9d567ab6721f57a3406c965afb5401ac3dae98fb4a09fb7b4db2db7aad561d2f,2024-11-21T07:55:09.477000 +CVE-2023-28470,0,1,3c79809a6f5e1483e7ed833a108f4fb389826dd696d37c8ba4e184d59023d995,2025-02-24T16:15:11.737000 CVE-2023-28471,0,0,4eb547cb79198ffc6118b6b179c9e405943d963db40bf65b9cc1a034f2fdd25d,2025-01-31T17:15:10.780000 CVE-2023-28472,0,0,748d2aa075941aeffb8eef036da9cd860fe83123e8d09bcde15838d2ad2dfbbd,2024-11-21T07:55:09.920000 CVE-2023-28473,0,0,d610ebeb5bdd11f4fa0cb8f23d5769e5c3ab6ac7865909aa86b1011ac286c09d,2024-11-21T07:55:10.097000 @@ -222402,7 +222402,7 @@ CVE-2023-28675,0,0,efa924683fe5a4b46d9e643fce6561603bfa3c6bbae2c1f7b0e0156c162c9 CVE-2023-28676,0,0,71594ca85c6b1d933bce7d820e28998fbbe4432c3e977017eedc390239c1f1ae,2024-11-21T07:55:47.237000 CVE-2023-28677,0,0,cd0127acd6650f87fbaf13c752203c6f48b896584521733c9cac53523f1e53ca,2024-11-21T07:55:47.337000 CVE-2023-28678,0,0,88ed4f4daea3663c1f1954fc976e999a060a07ae33a8944a88481e8a1dab9f04,2024-11-21T07:55:47.440000 -CVE-2023-28679,0,0,800936ef8bfcae718ed8d7969a169995840b391e4c23987651afbbbc4b0b0706,2024-11-21T07:55:47.547000 +CVE-2023-28679,0,1,1e990ed799e0012dc93f756b61af8fb84fe2b1d7fc1843a587db8afae3d06a4b,2025-02-24T15:15:12.050000 CVE-2023-2868,0,0,c98319dc1a3c4180016074dbca3a3d8b7219c5bd111d86a85ef5cf32a083ee87,2024-11-21T07:59:27.373000 CVE-2023-28680,0,0,b1b8739488aafc769a63ef0b051e8ded2b845670faf36f5795e78f5178de34df,2024-11-21T07:55:47.667000 CVE-2023-28681,0,0,95bd95b3371f2d02b2afda85f523faab72dd02ebd211a6ccd1aed342f4c41880,2024-11-21T07:55:47.773000 @@ -227460,7 +227460,7 @@ CVE-2023-35308,0,0,13e4114220fc9c48ff9841670fcd68b6ab86d906703814c29682a4ee5547a CVE-2023-35309,0,0,980d5a35f197dac71c8f2317064604961ef18a89cf386f049614b9e223b1bea3,2024-11-21T08:08:10.077000 CVE-2023-3531,0,0,23ebf6c83ab3df762052ace36aee3bdef61cfbe9a96d0daf5810bff21aa78a6c,2024-11-21T08:17:28.530000 CVE-2023-35310,0,0,47816059f58d263e460d1950c3539680c85dce004167caec9aa6bf48f47c12a8,2024-11-21T08:08:10.237000 -CVE-2023-35311,0,0,312ab6f7ab5dbc348f8d532b9fd6af86f252e8f46171c97e3b667d0557cdbc0b,2025-02-04T18:15:34.150000 +CVE-2023-35311,0,1,09a5cc4622c9414e237615f6606b67f00971f3fc196aaffe57cd3219ea3e346b,2025-02-24T15:45:28.853000 CVE-2023-35312,0,0,07c82402b8ef0f7054174a97ad43862822e2031c303ec10473e2390c19f9ad64,2024-11-21T08:08:10.543000 CVE-2023-35313,0,0,5a5a417bf0edbe8e1fc3e7a26dacb0cc0843993ed808f37b71b47900df20ab18,2024-11-21T08:08:10.727000 CVE-2023-35314,0,0,08de05a29737ac79aa834841f146a600bbf8d4a47889b7d0ebb3827b9679f15e,2024-11-21T08:08:10.897000 @@ -228029,7 +228029,7 @@ CVE-2023-36143,0,0,a58ce5600dd92f8f33e3d14185b3f9a410da2d92599b8764cad7c7a035e4b CVE-2023-36144,0,0,2fa8ed53569b0c9b3855af4093a02cc2e1485cd9cc764d01f92bbfd6cde6f70d,2024-11-21T08:09:21.487000 CVE-2023-36146,0,0,ad443422cda292a6ed4858c51e1ca51937ed52925c5da4f1f7d68413d7fd82d6,2024-11-21T08:09:21.633000 CVE-2023-3615,0,0,4c6bac39eb5b77b85cfbdf12cda3fd66c67fe6709ea19ce8642c33635381b4bc,2024-11-21T08:17:40.540000 -CVE-2023-36158,0,1,7042b3758d60d927090376c8e7825042440826c2235698189732482bb0dc6ec0,2025-02-24T14:07:36.703000 +CVE-2023-36158,0,0,7042b3758d60d927090376c8e7825042440826c2235698189732482bb0dc6ec0,2025-02-24T14:07:36.703000 CVE-2023-36159,0,0,f26d94360c556bd965bb9d1633b0d654d83ee17670bd62482cad0d7bda3a9c71,2024-11-21T08:09:21.970000 CVE-2023-3616,0,0,b94797f4fa39bc15ba9f0d135ef0d28ae903ca2cff59fe8b6ed964197c5c8015,2024-11-21T08:17:40.680000 CVE-2023-36160,0,0,4d6f7f4ad3858d1b7085b964c7d0aff7688aabc8e20572f9ac1afcd677f5b7d5,2024-11-21T08:09:22.137000 @@ -228598,7 +228598,7 @@ CVE-2023-36840,0,0,76c76384ad90d19795c6cf45c9767a6a9180adcc6efd7cf55165f4bd79c45 CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d4170e,2024-11-21T08:10:43.433000 CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000 CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000 -CVE-2023-36844,0,1,bc6d41b439b8f4d601bb9c02d7b26d2be534ed2ee7be257d11b2e8bfddf0fccf,2025-02-24T14:59:31.717000 +CVE-2023-36844,0,0,bc6d41b439b8f4d601bb9c02d7b26d2be534ed2ee7be257d11b2e8bfddf0fccf,2025-02-24T14:59:31.717000 CVE-2023-36845,0,0,4c9c0ba3f4e74883a1dcba2d5029a75aefe60811d3dbfebbbb7078d2457250fc,2025-02-13T17:16:43.583000 CVE-2023-36846,0,0,31e0f5cfc64218783c631dcb6ea01294e0b629b622e66caa6ecd46f40b776415,2025-01-27T21:39:36.497000 CVE-2023-36847,0,0,abf946e66b75d4fe6a8324763c422edcfca5bfa6d043c289b569ca20068fadc7,2025-01-27T21:40:15.840000 @@ -234221,7 +234221,7 @@ CVE-2023-44040,0,0,a2ef4e391b02986cbc791d617652cbf2b49a18bc7adca580daae166c9b56f CVE-2023-44042,0,0,947de793e8d9cb2a4b7f47093a727c28951a5fd6adf1f23fa0140e1204f169e4,2024-11-21T08:25:10.410000 CVE-2023-44043,0,0,9f58f5f49e5a920467dacd505248a768fd467deafe5a4942cc443214abd12199,2024-11-21T08:25:10.553000 CVE-2023-44044,0,0,2302745a8f435ef270ee47f3936bea993bc12172ad2bbbc2d4e71b38c61b788b,2024-11-21T08:25:10.710000 -CVE-2023-44047,0,1,423f6dcebf3b69862955b3e0adabd844593d069d11f858a15981895cb0f4cb1a,2025-02-24T14:07:36.703000 +CVE-2023-44047,0,0,423f6dcebf3b69862955b3e0adabd844593d069d11f858a15981895cb0f4cb1a,2025-02-24T14:07:36.703000 CVE-2023-44048,0,0,c015d2cddf73c07208b40cd3f33ef8faf0cd154bfc80c7c4413a2308cc6ffd02,2024-11-21T08:25:11.020000 CVE-2023-4406,0,0,f0ee9fe45e3fd65d5a61760e63acfda0e9c8c2b35c8d03cfb54c0fdfc61d0cc5,2024-11-21T08:35:04.760000 CVE-2023-44061,0,0,775180093b9e0ddfa76c99f4c2682fa8f3e61d51a315ba5136c34617113b9884,2024-11-21T08:25:11.160000 @@ -244206,7 +244206,7 @@ CVE-2024-10759,0,0,f8bc712fb9410a5ee08f3180d1171d66b15914b48b9a217cb416a2def4d3a CVE-2024-1076,0,0,229c3c3be53023b3f8854e6dfc46fb3635e16fbfbd84ced93f49f0159417c5df,2024-11-21T08:49:44.590000 CVE-2024-10760,0,0,4caeff16d941f4eaea6483471e8bd5b0672f1a62737769a70015e44c6a8cca8f,2024-11-05T19:45:47.893000 CVE-2024-10761,0,0,c6d174b8f4641a03c5bf55f193f6eac898b2be3e32b111450f17980d3bd9ad7a,2025-01-22T08:15:07.060000 -CVE-2024-10763,0,0,9c516ad73a2c8ce3ea86632a23fcf34c60a101b56054affa8414800580dfbece,2025-02-13T05:15:12.943000 +CVE-2024-10763,0,1,c84b0255641931d082631abd1cc7fda92c4e46c5a769f1ed64c15028d182d08e,2025-02-24T16:41:26.690000 CVE-2024-10764,0,0,9403f6bafb5947fdaa7cb8c78451d2ac19b5d12ee73e1a4325fe5cc4119a0428,2024-11-06T14:44:53.410000 CVE-2024-10765,0,0,ed6be3a759d855ad20d58959831792648cd98223f0ea5e3efce60624691a4cd3,2024-11-06T14:45:35.600000 CVE-2024-10766,0,0,97d873f52c572201eba37cf1bcce1c48835952a8e15078f1553c16d85428be93,2024-11-06T14:59:34.303000 @@ -245395,7 +245395,7 @@ CVE-2024-12037,0,0,a5255c9116afe4d4a53b9c568ed836bef1995aac7d6a54fa894f842257c6e CVE-2024-12038,0,0,d05a79344357e9d2639dadd9fa4c7832fe43a82152ed21198fa969942ea15998,2025-02-22T05:15:12.020000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 -CVE-2024-12041,0,0,8515c8b28663eed2614fe641527dc4136160dcbb328d2d8f1d9931556c3e1e12,2025-02-01T06:15:29.527000 +CVE-2024-12041,0,1,c51c944b4ab8d6d44c0744754eaca5881989f4294856b597a5c3096c28461e59,2025-02-24T16:05:18.207000 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 CVE-2024-12043,0,0,0b4fdcede937ae84ff81a2ab905da8f11d94e67d0f40a0aefefaaf9cf7c57c04,2025-02-05T18:52:58.717000 CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 @@ -245517,7 +245517,7 @@ CVE-2024-12180,0,0,25613c8b94aac2cf24513985a7e8ce52f62a7fb91248d4df9e059f6214997 CVE-2024-12181,0,0,2f8ddb76759020891581c20b50823d1952e3d03370eabe8b27bca8702bd25159,2024-12-10T16:29:18.917000 CVE-2024-12182,0,0,99729c3af2a19c744d32ab48ea2f407c48703d1d78f2fc596c4a0dad8235db7f,2024-12-10T16:18:29.027000 CVE-2024-12183,0,0,82e7d00c0d43970561dcde149328e37153ec341d20500330a205d615cf7848af,2024-12-10T16:05:39.010000 -CVE-2024-12184,0,0,3968ef89b1dcff137b3000fdfcf3dd74793ed0550fd33d4bf370b3ef9bd60df3,2025-02-01T04:15:30.443000 +CVE-2024-12184,0,1,7e6ad1d50844ad0b2e38b692f780ceecd0402f1aabbe1f9f623f9d0b37e18639,2025-02-24T16:48:58.427000 CVE-2024-12185,0,0,2794475f4c291bccc75d891cf053c96f74c5bfa44bdb40ae143fb3a0b3833593,2024-12-10T15:57:03.543000 CVE-2024-12186,0,0,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b60d,2024-12-10T15:52:39.487000 CVE-2024-12187,0,0,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000 @@ -245918,7 +245918,7 @@ CVE-2024-12616,0,0,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d44 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 CVE-2024-12618,0,0,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000 CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000 -CVE-2024-12620,0,0,f9caf6581b7ceb0ca0f0dd311812d90d3a9bd26b1462923a1648a78a9563e80b,2025-02-01T04:15:30.583000 +CVE-2024-12620,0,1,e537581ee6f9b9e41db6bae290af071a0bca6c5bd387497ad5b828939e579290,2025-02-24T16:41:10.847000 CVE-2024-12621,0,0,c2adae066a86c184a771a0d948073e2bc06ef58867852e158c90f4e2e54ac114,2025-01-09T11:15:15.417000 CVE-2024-12622,0,0,44dabce1b6e9706e1913dedf06e830c5e84e3b2aacb10e32270b16def1e102ad,2024-12-24T06:15:33.433000 CVE-2024-12624,0,0,5e7ff0728298740b51bc71547c6153c6f49e2311f395bfc0566af7f4601437d1,2025-02-04T17:09:29.943000 @@ -246058,7 +246058,7 @@ CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000 -CVE-2024-12813,0,1,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 +CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000 CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 @@ -246137,6 +246137,9 @@ CVE-2024-12907,0,0,d89f3365314aa5778f704685a334ac72db82727dcecdbb78151d02652b150 CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000 CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0eedf,2025-01-16T15:28:37.230000 CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000 +CVE-2024-12916,1,1,94e088be02ff8e976f89c9436caecd6bd73ce017f21c94cab9401a0dd8410762,2025-02-24T15:15:12.240000 +CVE-2024-12917,1,1,8ed7b59f83a7ff81e7dfcaf53b3f8f74b66378d0cdf2178a10d64c1ba92e32fe,2025-02-24T15:15:12.383000 +CVE-2024-12918,1,1,35c817628cfc527e60bea2837142a9b629b728e7ef8d6210f2903f4c0f77f8f4,2025-02-24T15:15:12.537000 CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000 @@ -246426,7 +246429,7 @@ CVE-2024-13223,0,0,d35088367e0452bb1f581e960a283c324bfcb99ba70072c23d07e48a6c422 CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a842,2025-02-18T19:15:13.330000 CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000 CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000 -CVE-2024-13227,0,0,f396acd62ff517fde269ff6e013e5c0bee9fbdf4ae486ca2fb2f74214892dda6,2025-02-13T05:15:13.727000 +CVE-2024-13227,0,1,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000 CVE-2024-13229,0,0,8005008cc5eaf6f49dbd4877e33b66dc904c20bdee3b20c47739bf10cb4a210c,2025-02-13T05:15:13.930000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000 @@ -246543,7 +246546,7 @@ CVE-2024-13339,0,0,f8de09fdd4f03aeb041339a5015adfee1491817c598e87bb0c02ef66e5dfa CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000 -CVE-2024-13343,0,0,bc527145f8c71b096b9e058e2eb6af0513530e49a2213ad37da3c9d8054436b1,2025-02-01T04:15:30.717000 +CVE-2024-13343,0,1,640200c7757a0fe07b53b1ed98de77b765153c818110e07c8a501ce037c2ed28,2025-02-24T16:21:30.933000 CVE-2024-13345,0,0,6201c4257ed3a1ebbb87baac8176155e7c93515b6dda93cfafdaf22ca9b1cc80,2025-02-13T07:15:08.177000 CVE-2024-13346,0,0,66f93cf3bfe9465a49d11c88fea5d478d98cfe45b424ebdbe43b702973f58f32,2025-02-13T07:15:09.760000 CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f0474b,2025-02-03T16:15:32.580000 @@ -246570,7 +246573,7 @@ CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0 CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000 CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 -CVE-2024-13374,0,0,27ad55dfbaecf19f5383dba0dfa1e5687077e4f4d072c627b9b0d19e085af069,2025-02-12T06:15:19.303000 +CVE-2024-13374,0,1,3fc707056196afc6ff18dfb5640666c2f82725f50c06780da5f362e975810d58,2025-02-24T15:55:44.733000 CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000 CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000 CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000 @@ -246645,7 +246648,7 @@ CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a282 CVE-2024-13461,0,0,7310b23419daedb24e559d3e84e89095cccd323ffb73d8e4bc88880b2b6bd17b,2025-02-21T10:15:10.767000 CVE-2024-13462,0,0,b89ee07e6c68c54def9d53a689616be7c4a17f1086d371e48eecb6e4e912d1b6,2025-02-19T08:15:15.620000 CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000 -CVE-2024-13464,0,1,4f49e45a791590c3cdbed43a0f637c21b0e8f08974fe6563b200115a1075bad1,2025-02-24T14:25:04.513000 +CVE-2024-13464,0,0,4f49e45a791590c3cdbed43a0f637c21b0e8f08974fe6563b200115a1075bad1,2025-02-24T14:25:04.513000 CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb522053829572311149c1,2025-02-21T15:35:58.387000 CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000 CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000 @@ -246679,7 +246682,7 @@ CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4 CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 CVE-2024-13500,0,0,1d9733764e3484aa60c36eea5a3cc1dd4fa8ffd0ae1e33244025d55da4de9296,2025-02-24T12:33:48.790000 -CVE-2024-13501,0,1,2bef78d5c066dfe5b9daf55631581ff3c3e9475ce8f3476dc6e7f018e10aa06b,2025-02-24T14:27:50.777000 +CVE-2024-13501,0,0,2bef78d5c066dfe5b9daf55631581ff3c3e9475ce8f3476dc6e7f018e10aa06b,2025-02-24T14:27:50.777000 CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000 CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000 @@ -246700,7 +246703,7 @@ CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c45 CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000 CVE-2024-13520,0,0,656f36a2be31d04b22bac9a54ebe157436703fa55ca148b403e5446f69404e02,2025-02-20T10:15:10.167000 CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000 -CVE-2024-13522,0,1,00c085e855bb7c9f3026d445957f1adf7577732941d53fc12a5ce3f291cdce05,2025-02-24T14:28:46.687000 +CVE-2024-13522,0,0,00c085e855bb7c9f3026d445957f1adf7577732941d53fc12a5ce3f291cdce05,2025-02-24T14:28:46.687000 CVE-2024-13523,0,0,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000 CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 CVE-2024-13525,0,0,37719f965e9ed70bd613e5973870bf4639825595b6eebe5cf54af826ddefe4ea,2025-02-15T09:15:08.833000 @@ -246713,40 +246716,40 @@ CVE-2024-13531,0,0,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365 CVE-2024-13532,0,0,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000 CVE-2024-13533,0,0,26d906ce9b077202193e301525e7edca6e0a1833eaabe6191c0b46190cccf198,2025-02-19T12:15:31.333000 CVE-2024-13534,0,0,e2405866402f0c1fa20db5f97fb08d502b9ec5d9fbb9cfbdbb7046d6ed9d664d,2025-02-19T12:15:31.480000 -CVE-2024-13535,0,1,f312a2bb8866000885804fe09106271e91a903052a365acb79d145ab1894d1bb,2025-02-24T14:45:46.473000 +CVE-2024-13535,0,0,f312a2bb8866000885804fe09106271e91a903052a365acb79d145ab1894d1bb,2025-02-24T14:45:46.473000 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 CVE-2024-13537,0,0,9b4773b817d55c47ab692786fa73c9a47df13981824e511c415997a4bf10ab73,2025-02-21T04:15:09.513000 -CVE-2024-13538,0,1,5230295100117c9813047242cddbc6188cc45463a1af87abc8d6697778d88c10,2025-02-24T14:49:46.413000 +CVE-2024-13538,0,0,5230295100117c9813047242cddbc6188cc45463a1af87abc8d6697778d88c10,2025-02-24T14:49:46.413000 CVE-2024-13539,0,0,4b7e0c70558e34f6819b9b46d3f48cda096658439289d18effcd3cdff1bec624,2025-02-12T04:15:09.197000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 -CVE-2024-13540,0,1,782980a52715006d2ddb713eaf01de1d5dba4da92c97f123382399be147adf3c,2025-02-24T14:52:53.740000 +CVE-2024-13540,0,0,782980a52715006d2ddb713eaf01de1d5dba4da92c97f123382399be147adf3c,2025-02-24T14:52:53.740000 CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 CVE-2024-13543,0,0,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 CVE-2024-13544,0,0,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000 CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 -CVE-2024-13547,0,0,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000 +CVE-2024-13547,0,1,1e79ecfe46a254b42d924ae276e55ad400567d9e48a334180905a7986300687f,2025-02-24T16:16:56.543000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 CVE-2024-13549,0,0,bcedd6d4c0f25a57faa8365d40ac3a95b68e2d0adaafc3f3f6fa713e56e46afc,2025-01-31T18:10:28.800000 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-13554,0,0,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000 -CVE-2024-13555,0,1,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 +CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13563,0,0,3031ac214bd3ea53346a6d71bfbed70d308745391dfcd1e2839ca77975e01983,2025-02-15T09:15:09.897000 CVE-2024-13564,0,0,670dfa6497a58babcc45a1c7badc23fa2b82edd696d1f35f2fde4c33fed62d21,2025-02-22T09:15:23.687000 -CVE-2024-13565,0,1,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000 +CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 -CVE-2024-13573,0,0,9938bb46208a95e8eecd18f3b547be8eb958f0db68d59e63636d47dae824abae,2025-02-18T05:15:14.007000 +CVE-2024-13573,0,1,47f56a6be89a4bb63ceadbae078e78a73033980ecb24e71f52f10b691c304d4b,2025-02-24T15:40:57.757000 CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000 -CVE-2024-13576,0,0,d6c0ece85828787746eb09fa1325b1c29bd2bf4baa03b418ec7448f30a15f6dd,2025-02-18T05:15:14.157000 +CVE-2024-13576,0,1,48cc32358acb541ca620ae43d659608cb24956f0ab7ef76dd6f13e11fb588a30,2025-02-24T15:42:32.780000 CVE-2024-13577,0,0,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000 CVE-2024-13578,0,0,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000 CVE-2024-13579,0,0,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000 @@ -246770,7 +246773,7 @@ CVE-2024-13595,0,0,0af37cc42779bfca530d3961d770211d9305aca9c7ecdc98a5bd6399b4365 CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 -CVE-2024-13600,0,0,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000 +CVE-2024-13600,0,1,484c9129acb282fae32ab7c653ddfde69cea1c6dd837845606bbf7ace7ea91d5,2025-02-24T15:56:30.290000 CVE-2024-13601,0,0,ce9d6d51221b1f7bfe13b94be0c882b344de68bb5f35f70de286ecadc3834f44,2025-02-18T21:31:43.250000 CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000 CVE-2024-13605,0,0,0cb40ad83147abc3c2a42739a50d21364e197b4bc52080fa832b868df4fb5fc2,2025-02-24T12:15:11.047000 @@ -246801,10 +246804,10 @@ CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92 CVE-2024-13651,0,0,3106185ed2d2390fe0c7db6d51838d5c676d3b37bd6958033551790a08b59a48,2025-02-21T15:55:18.263000 CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f04d,2025-01-31T18:21:53.167000 CVE-2024-13653,0,0,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000 -CVE-2024-13654,0,0,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000 -CVE-2024-13656,0,0,0b9d444c7c97e411e4ea27cc87641e7cb92ad285f00faceee8008c4cb10f50a1,2025-02-12T05:15:12.143000 +CVE-2024-13654,0,1,1bd7a6bf31b6e5d47be1e880a1923554a172b4c0811ddda5ffc7fb6f9e80e3f5,2025-02-24T15:45:29.457000 +CVE-2024-13656,0,1,d6f8ca0e0d7e54cdcde32736edcc32bb2151a1e084ebf48656423743557ac83c,2025-02-24T15:46:39.887000 CVE-2024-13657,0,0,1b9bba2a66ea20d4df64ceb8790e01924057bf2e92e24e8fc6b6faba8806cdad,2025-02-19T08:15:17.620000 -CVE-2024-13658,0,0,d03a5dca2864c8417f9018e7bf90bf0489d89a07c14724289f58406d6fa3a508,2025-02-12T05:15:12.320000 +CVE-2024-13658,0,1,700e2252ecc43f9aded9330a9dde74f19de1f15d01de5af473326f50cf25bcc0,2025-02-24T15:49:58.910000 CVE-2024-13659,0,0,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000 CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000 CVE-2024-13660,0,0,d2cdf5d8cf8e31e4e8454a9f3311cb92335589e4523ce599ef87ea75bd1a0b06,2025-02-19T08:15:18.013000 @@ -246812,7 +246815,7 @@ CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020 CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee14c,2025-02-18T19:15:14.220000 CVE-2024-13663,0,0,4d35c2aa6bb22f4acbf057554f2f8d44f446a1c9a791ed355d4b3cde1b61509f,2025-02-19T08:15:18.433000 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 -CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000 +CVE-2024-13665,0,1,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000 CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 @@ -246880,7 +246883,7 @@ CVE-2024-13753,0,0,3f4fc9627c0f2aa321755f232e314cce0cf82a32011b9e970cb2df4995dc6 CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 -CVE-2024-13769,0,0,26bbc21522452466dab58f2b2fa970f1902e5186563a0e8366a2567b1804b1d3,2025-02-12T05:15:12.637000 +CVE-2024-13769,0,1,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc27c,2025-02-13T05:15:14.177000 CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000 @@ -246896,7 +246899,7 @@ CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0 CVE-2024-13798,0,0,b7519f3897d26f2d9d8f21bc61cafa9077a8c17dfa0e7a4b29a801ec94d2e592,2025-02-22T05:15:12.590000 CVE-2024-13799,0,0,e8bf3eec61ee5004ffe816bc3d1e1d3f4c7c5fc01f5e38b638ff3d46b6679801,2025-02-19T06:15:21.283000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 -CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 +CVE-2024-13800,0,1,db269d664e8ffceb549584ac138b0b3d8532020dce3ad8c5501401929c306f63,2025-02-24T15:55:09.120000 CVE-2024-13802,0,0,799adf2c5a2e8a6674a965e84c09b9fbf5a704bec620d344f92121a6b0bfb91f,2025-02-20T10:15:11.100000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 @@ -255284,7 +255287,7 @@ CVE-2024-30037,0,0,f2d401000dd9549b2f095203aa37be55cc4c90841f711ed62b7216ea20cd6 CVE-2024-30038,0,0,27a4c29b38257f8bcafe88f8509a9aba246c05aefab003cf829c6073e1b87d25,2025-01-16T19:13:10.340000 CVE-2024-30039,0,0,a9047a1ee3770867bedf8729bda5c6e979affd5cf6d07e8365e2142e85ac3926,2025-01-28T17:15:23.990000 CVE-2024-3004,0,0,7b5c0efa46554cf756c25d89671f8e557ac0ad0390e6be1e9dadb631b56ff7e5,2024-11-21T09:28:39.437000 -CVE-2024-30040,0,0,03261c3b99c116e922e110c27bbaf5fe4d48138c1ab76778f292a2df9de80da6,2025-01-28T17:15:24.213000 +CVE-2024-30040,0,1,0232720eb813240f57e5570e979939c07517f0db0e7772853aceeee8dbf63044,2025-02-24T15:50:23.420000 CVE-2024-30041,0,0,f9c10cbe19f35b717577bc6764f2546acc1215ed22680df6006f57d9c2099fde,2025-01-08T19:13:10.127000 CVE-2024-30042,0,0,9544f834a0b92a843308b4d5510959960649fdfd12e3981ba713ba27b676a4c4,2025-01-08T18:59:45.373000 CVE-2024-30043,0,0,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000 @@ -263731,7 +263734,7 @@ CVE-2024-40979,0,0,7b7eadaad0b11e7772fa9dbf6dd44e5855a188bcf0e7619b1d5c153b2410b CVE-2024-4098,0,0,e784e6064bba0b72ebceb461ef8d384b71a12f0e53caa57f587ff2540deaf781,2024-11-21T09:42:11.470000 CVE-2024-40980,0,0,de3031711db513dcb148f704b93b2dd78d8a01c6b42c8e20d4a48c56f1176dd3,2024-11-21T09:31:59.823000 CVE-2024-40981,0,0,37c3f0cff46cff282ec46d2f86b939aa2408325f560b29ec75fca4a796526834,2024-11-21T09:31:59.973000 -CVE-2024-40982,0,1,bcacd4044a55751834c2f177b012689b5a04e030964cc42170ae5439258936b0,2025-02-24T13:15:10.790000 +CVE-2024-40982,0,0,bcacd4044a55751834c2f177b012689b5a04e030964cc42170ae5439258936b0,2025-02-24T13:15:10.790000 CVE-2024-40983,0,0,4f1e7e94a10f77a2a960c5963137825b1a7d9ac1338f04d0af0e9fa582272b5b,2024-11-21T09:32:00.260000 CVE-2024-40984,0,0,e95cd3ff46d9e41af19057b63b2688778373534b4e6df1da864d3a2066d4646d,2024-11-21T09:32:00.383000 CVE-2024-40985,0,0,53f2aaafe6f291a7057a7769a5566edb3215c6fde96a4df2ae27d2aacc836123,2024-11-21T09:32:00.513000 @@ -271562,7 +271565,7 @@ CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90 CVE-2024-51737,0,0,a16cdd75ed8512dd9f47e45db68b3bcc88cb4779dc9f9cf6c8a39bd2ca429f58,2025-01-08T16:15:35.170000 CVE-2024-51738,0,0,1634b095292e3bcfa8d2e2c96737e684f54ac06e515564eba40c0925db89bf66,2025-01-20T16:15:27.667000 CVE-2024-51739,0,0,4a842171b608b06417875a07ea66bc940b2544517c02b0c89638130ff781c875,2024-11-08T15:56:18.753000 -CVE-2024-5174,1,1,e39b7dc50b44d274bbd4f77a33b5c651107437d055d6abde261dcf2366dd3396,2025-02-24T14:15:10.327000 +CVE-2024-5174,0,0,e39b7dc50b44d274bbd4f77a33b5c651107437d055d6abde261dcf2366dd3396,2025-02-24T14:15:10.327000 CVE-2024-51740,0,0,aa733ae0827e15b33ac1bc93d1e5306d2cfe3763dcbc15868bfbaab35851c4a6,2024-11-08T21:09:45.387000 CVE-2024-51741,0,0,17fbc7acb9beb290488d36c45d7f5c599398962726841e9375f3f88a162a4a93,2025-01-06T22:15:09.827000 CVE-2024-51743,0,0,8f26056859b26212781070301c305145a316ade0a5df0043c74f190cbc4f712d,2024-11-19T21:57:32.967000 @@ -272385,7 +272388,7 @@ CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000 CVE-2024-52937,0,0,4e2e200c911871605d656a523330fd8515bef881c87955645314df4efb4a35e8,2025-01-13T16:15:18.093000 CVE-2024-52938,0,0,25ccbcee31d517a9492c1820a88aa96739f339ebff7e4c4e42b2b7d66f53baa0,2025-01-13T15:15:09.300000 -CVE-2024-52939,0,1,6c5d4842ef8b5fb3d37d62348f6cc3eb3c575934928b6fc7e3e3a76fa226e971,2025-02-24T13:15:33.387000 +CVE-2024-52939,0,0,6c5d4842ef8b5fb3d37d62348f6cc3eb3c575934928b6fc7e3e3a76fa226e971,2025-02-24T13:15:33.387000 CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa253,2024-11-21T09:47:22.597000 CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000 CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000 @@ -273634,7 +273637,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231 CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000 -CVE-2024-54772,0,0,797ee5bb9c2306ea02eb560cc919f540f274a171c19996dbc7d95acf5ef4ca0d,2025-02-12T22:15:40.110000 +CVE-2024-54772,0,1,c196bb5b85ccc5a07d16018bcde19512ef9723feb0e8cf9731bca2c0d5af102b,2025-02-24T16:15:12.213000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -274717,6 +274720,7 @@ CVE-2024-56882,0,0,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49 CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000 CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 +CVE-2024-56897,1,1,4645b367934267fae7a4a481ff9c2b13139de8d0d630dfe2d242cf96b61515f5,2025-02-24T16:15:12.463000 CVE-2024-56898,0,0,707f540df9bad40fd6a0dffff09717bab11cd135fff5e7588c850ba08978f0f0,2025-02-04T16:15:38.523000 CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000 CVE-2024-56901,0,0,f89b3b91c31270f42932d03916257d6a9b393ed803f4768bf5d8a01bfb9f30c0,2025-02-18T19:15:19.887000 @@ -274730,10 +274734,10 @@ CVE-2024-56921,0,0,ba82c86335d04bad9edbac3e379f7d35c5fbb760088d7e84284ac0abfbc51 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 -CVE-2024-56938,0,0,458cb21752e464244cd938c0904393a9bc59f4b112b798d05bcbf7146d8f6258,2025-02-14T20:15:33.927000 -CVE-2024-56939,0,0,3aaf8d1c81ff10733ea4dc30fb57b13e83d36de1fb847c3911bd8e3224342bb8,2025-02-14T20:15:34.140000 +CVE-2024-56938,0,1,5c9375b6af4b1a81b6e0aaeaac635cc830f9078a857dd2f622f15fc3186dfb1f,2025-02-24T16:33:42.337000 +CVE-2024-56939,0,1,ec6291c63ef112a2796d7c65a02055253df8c0ddd93ff937f69292dbb45c0647,2025-02-24T16:34:05.060000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56940,0,0,b7ab75abe53a9e2d9d92963a73a70e626faac2e220196d40b7fbffb55eea7b93,2025-02-18T18:15:27.463000 +CVE-2024-56940,0,1,8705d8f4ba51697221d67523f35c3f9ef53dadf66e97358af9703d346d5129df,2025-02-24T16:34:30.233000 CVE-2024-56946,0,0,af9e881d063c5daf5a15e5df8041bc60d2da62760d3b549c99ac43411158444d,2025-02-03T20:15:33.743000 CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 @@ -275000,7 +275004,7 @@ CVE-2024-57598,0,0,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-57601,0,0,53bfe5248e0c55062379b5772a0e365478a7cc4522b7eb09c12bbfc53a9014ac,2025-02-18T18:15:27.663000 -CVE-2024-57602,0,0,30a807cf755b082304a2db55922b034781821e0a335455c3ab2e69496b686678,2025-02-12T22:15:40.867000 +CVE-2024-57602,0,1,6fe666c0f6af4cfac4d7da5cef43b98ce0d8efe96257780d13ef483c2c9af379,2025-02-24T16:40:27.567000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 CVE-2024-57604,0,0,543c5b4910b41c72e908210bd3581236fe15916a3051d75b0cb98013a23bf9f9,2025-02-18T18:15:27.827000 CVE-2024-57605,0,0,7963b6f1477133cb94cbd1a3b1ada130c7fa95a02e2999810ff3a185f251a2ce,2025-02-18T18:15:27.983000 @@ -275550,7 +275554,7 @@ CVE-2024-6093,0,0,6dbc67443e4b04e1510a9f434106f20f0d4b21fa7954dab14d70346cb63c7a CVE-2024-6094,0,0,c0063848c5678cbe8875c1cd2d611558ef1b2bedd1d3f0daf0312a05b3c23485,2024-11-21T09:48:56.847000 CVE-2024-6095,0,0,72a84856c6dc84e022fee2d83bf212c06138ba071d956716ea4585f1eb431808,2024-11-21T09:48:57.030000 CVE-2024-6096,0,0,30c8a6f3f48a49dc00c2209e174c85d15aa3ca6b541dfd14b186d9c5e032413b,2024-11-21T09:48:57.163000 -CVE-2024-6097,0,0,114308e2b0b634c2df93a17b77e08a324fb25aa49c1a509924c652b21c2ba817,2025-02-12T18:15:21.977000 +CVE-2024-6097,0,1,a721bbade332b4c67033be41977865a5c4f45d48470b80722368de30c8262c57,2025-02-24T16:31:32.893000 CVE-2024-6098,0,0,d4c7adc44731702753d0124808854f5b98a81b60c6056d91c26330342372c46a,2024-08-19T13:00:23.117000 CVE-2024-6099,0,0,cc17f7e0786c81cc119e330d3b84e782c19ad0a2a5948fa53f7dc08469c5b91e,2024-11-21T09:48:57.357000 CVE-2024-6100,0,0,a8d8275ad94c76a149682c08fbe2bb7dcf585addf21c98ff178e4f2a3ac8b9a4,2024-11-21T09:48:57.493000 @@ -279090,8 +279094,8 @@ CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c915868 CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 CVE-2025-0364,0,0,2423f698b570bf74da97e05ed992c1dc720ce0cd77b54afdd0e3b50ba4f8a276,2025-02-04T18:15:35.067000 -CVE-2025-0365,0,0,68c9fa607d9af008f74f0910ed30a33940a0fb9c7f83018a7eca1ddc882dffeb,2025-02-01T06:15:31.213000 -CVE-2025-0366,0,0,4f36c784a2e700d5ea30070d1404adcc6cf22626684fa097fd0339fa63ca490c,2025-02-01T06:15:31.367000 +CVE-2025-0365,0,1,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000 +CVE-2025-0366,0,1,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000 CVE-2025-0367,0,0,ab3acf71ca0537fe4a7d80088a2aafb5561d6238415269bf152b7ed9b1300383,2025-01-30T17:15:18.097000 CVE-2025-0368,0,0,a3cd88f6c2e32d5753c4cc60666c98ec19ead45f71b261b7ea54f7fb575f967d,2025-02-04T19:15:32.070000 CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000 @@ -279221,7 +279225,7 @@ CVE-2025-0540,0,0,4df88905a96b8b4cb78de73746446aceffb96c461677802362e17d3281aba7 CVE-2025-0541,0,0,eebcca736351c790b33d073ffb15589f95564ecb6d690adbf6855680ac0d891d,2025-01-17T22:15:29.337000 CVE-2025-0542,0,0,20d694a09804286361feeafaf90a4c3710af9ee4f076a4817f46453b45a4bf83,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,97c8d3fe60003fabb6ebf6a84fa27757230cb958341ec2b8d0886e83538320e0,2025-01-25T17:15:21.720000 -CVE-2025-0545,1,1,dd9da2c1154250ff1b47982b7019b7f5323a3f2fd8209a19e7ede9710d2719ff,2025-02-24T14:15:10.910000 +CVE-2025-0545,0,0,dd9da2c1154250ff1b47982b7019b7f5323a3f2fd8209a19e7ede9710d2719ff,2025-02-24T14:15:10.910000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 CVE-2025-0556,0,0,2e939f9c46df46e943acd27c5231aa3ec1bc692b51067d4f0d8c17d23ee23f89,2025-02-20T20:41:40.723000 CVE-2025-0557,0,0,e808bac35fe14e1bd365beea3de65d9f8e7338d7448163ead06636689058d369,2025-01-18T09:15:07.710000 @@ -279589,7 +279593,7 @@ CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc3 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,b9506d643a21ea855d005ee72e5735db262862843667216a45836e6dedc7ba45,2025-02-20T20:37:54.487000 CVE-2025-1196,0,0,95c1e31ef90a550a862949d3771de7036e2dc6a2ff04ba572597899517481c3f,2025-02-20T20:38:49.990000 -CVE-2025-1197,0,0,3f73439f317bbb7f90aa8413320a66537018b5852d35e70b266744be94a8e5cd,2025-02-18T18:15:33.303000 +CVE-2025-1197,0,1,8509b7b04241bf14cfe7887319ccc85f5064d96d83d6f02b862ef67740ce9da2,2025-02-24T16:15:20.820000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 CVE-2025-1199,0,0,53991dbea06a5b0800e8d25e504a12a841d823a239457fc0e48265a3904ab288,2025-02-18T18:06:10.360000 CVE-2025-1200,0,0,96b433ad7e26edb6f2f9acbb0eb46fcf07f61e221c5bf356eca3408db2bb3def,2025-02-12T14:15:32.090000 @@ -279704,7 +279708,7 @@ CVE-2025-1544,0,0,6dfefee8c1beb9250313ea7950237ab90994f9ae50b689b8e2c00c600bd952 CVE-2025-1546,0,0,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb3d,2025-02-21T18:15:21.523000 CVE-2025-1548,0,0,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000 CVE-2025-1553,0,0,b76c346b19ed32adbb90097d30125f53b18d6b15a685f1353673e4fcdc636324,2025-02-22T10:15:09.853000 -CVE-2025-1555,0,0,1c7a4c27ed9d1502d0e15c0e5a57e371d72228c620058c2537224f8b85248601,2025-02-21T21:15:13.703000 +CVE-2025-1555,0,1,b87953fc659c2e74abd428dd8b83c4d989fea69643d0c4eecfbab0e6ac242e9a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000 CVE-2025-1575,0,0,4f36554ed6482f45b74d35521d78ee1f8257f79829174fda75a5bd3bf6296f94,2025-02-23T04:15:24.980000 @@ -279746,7 +279750,7 @@ CVE-2025-1616,0,0,a672a15b9b40669806189d018535f8df7c6825128b1537d1516dac47f1781a CVE-2025-1617,0,0,f8b5d497942700d9485e4f9475a52f7ce71fe3f54483032059a95f27d690d0e0,2025-02-24T04:15:09.277000 CVE-2025-1618,0,0,5653f37c834d7e927ebdf4835f8b4b2db1c30742d0495922546989d808169e24,2025-02-24T05:15:10.980000 CVE-2025-1629,0,0,60983f0ba0e5f0b685c866a67c52df667d2bfe57a6c3421095271a3cf3a2da01,2025-02-24T05:15:11.280000 -CVE-2025-1632,1,1,91c8c147567778f1cb06c4b2042e0a90d710115c43ff18948c9e66adcb6100d1,2025-02-24T14:15:11.590000 +CVE-2025-1632,0,1,e4d830f0038f1d0ec1a385180555c2b78df11cbe25ede30530c1c285ee3eb6b4,2025-02-24T15:15:13.217000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -280744,6 +280748,7 @@ CVE-2025-23012,0,0,80e79d2dca58dc0de4053922ddf003d61df0dcf631e49251d47ea13fe8bf6 CVE-2025-23013,0,0,41312d3c40b04a23352f5579b00dccd945ae6a58acc9182af7bda141c59bc5af,2025-02-03T10:15:09.250000 CVE-2025-23015,0,0,45b302f2cec3cbe0c8e5d07505c76b93a083cf4972c8927214f2b54e92bdd0d6,2025-02-15T01:15:10.833000 CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000 +CVE-2025-23017,1,1,55e51b9d3dcd105d9ffe990bd314b89aa6149244343f2c9bb35cd00d5e9cdd2a,2025-02-24T16:15:14.420000 CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000 CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e82d,2025-01-29T18:02:06.240000 CVE-2025-23020,0,0,25923bb14a1c6995cb5e401bf55760ebf3529321cd6b5a181b1b763453c28634,2025-02-20T03:15:12.630000 @@ -281471,7 +281476,7 @@ CVE-2025-24505,0,0,3d0ca06af09a5483d550a0e929e2fcea1308dd23124a4d4656e3524e006df CVE-2025-24506,0,0,7eb281d29812daac58c1b6b5c09fc60293cc6e4339b38533084b317647251167,2025-02-05T06:15:31.737000 CVE-2025-24507,0,0,9309c21556922b2fdc9563d6d18cb15340eb8061f841411e12ba390f54d65f2b,2025-02-05T06:15:31.860000 CVE-2025-24526,0,0,0292f768610cd0a8152436766272d01bd12fb7b2004255bb624e52e39126492f,2025-02-24T08:15:10.427000 -CVE-2025-24527,0,0,c24cc3419025a9e62f1231b139bbd3545754b2e98e75afe153338170e207c3c0,2025-02-06T08:15:30.500000 +CVE-2025-24527,0,1,64c5f15d3a36426dd086cf6753a3bcfcae0a9e70014bff12440c7ea401e9bd26,2025-02-24T16:15:14.683000 CVE-2025-24529,0,0,bc0b161a595e000cd783abe643c1f26152f3142c15687c9c73e18c43346dadb9,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,3811bbd67cbab8ca9968b0768c7eca6cb2811300b6d619aac191afa45bc7a556,2025-01-23T06:15:27.893000 CVE-2025-24532,0,0,9a58da3aa376c31d618205a09419e1a54e6d6262728972d98819c5e148008fa5,2025-02-11T11:15:16.740000 @@ -281766,7 +281771,7 @@ CVE-2025-24976,0,0,edf3d8769237d54851dd3a3135d0c605355b9e2500561e211400c75569bec CVE-2025-24980,0,0,93f5736ad811fe47d31660fba8d04da062656820cb9c23ad70329bc04caee348,2025-02-07T22:15:14.617000 CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 -CVE-2025-24989,0,1,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000 +CVE-2025-24989,0,0,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000 CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 CVE-2025-25054,0,0,92050273f447af73a302e1c2e41578fcff583f602e60b32d132c1e59b798098d,2025-02-19T06:15:22.010000 CVE-2025-25055,0,0,9d90653ce228a6e46a26077640760e39af20615ccae0de614370c12a6f659dd8,2025-02-18T00:15:21.277000 @@ -281870,7 +281875,7 @@ CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-25279,0,0,9e0c629969ac380e42b01d412f4ad6f8f27f9cde992cd6012fbeab441326d796,2025-02-24T08:15:10.607000 CVE-2025-25281,0,0,167d81b42fb33b6f42e7962fec83a5221902600725fdaf7aff6080b6098df223,2025-02-13T22:15:13.263000 -CVE-2025-25282,0,0,4d1d19a98dcf02f062514d6cca59ad758ba4251801137428ad197e29af6e63b1,2025-02-21T21:15:23.590000 +CVE-2025-25282,0,1,5fa8904b4acc160cf93c4b4209a374f8897e879c850bebef83325dc372cf154d,2025-02-24T15:15:13.620000 CVE-2025-25283,0,0,d1ae07356b8742828976d536d141109b35ac143686ab7de25f652850c0ca2fe0,2025-02-12T19:15:21.863000 CVE-2025-25284,0,0,b6dc2c9304cbf3d8546cf62f371b4f3d1de52c82a721128425226c837be02c5d,2025-02-18T19:15:28.797000 CVE-2025-25285,0,0,6196d3dad9871c57aff4895f5bc8f8c3acdc2172dba477baec761f1640f705af,2025-02-14T20:15:34.487000 @@ -281897,6 +281902,7 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3 CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 +CVE-2025-25460,1,1,c8ecff1b8650255a741acc7d51f79927fad46767482d12616543d42657d562cb,2025-02-24T16:15:14.873000 CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000 CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000 CVE-2025-25469,0,0,741fdd6513e01efbd7a9bf5df4924bb989fc1989e61032b7cef4423372c52af7,2025-02-19T21:15:15.750000 @@ -281935,7 +281941,7 @@ CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10 CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cdf04,2025-02-19T19:02:47.650000 CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000 CVE-2025-25745,0,0,406fa6a59b9bdf024e304acfed3b72076652d04111e85cc18e48015ad28192dc,2025-02-14T16:15:37.010000 -CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 +CVE-2025-25746,0,1,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 CVE-2025-25765,0,0,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fde7a,2025-02-21T18:16:12.420000 CVE-2025-25766,0,0,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000 CVE-2025-25767,0,0,65da93516558bfe81b43fcd0adbd639aa009f9a52ab8537bd361623a21370b60,2025-02-21T19:15:14.253000 @@ -282125,8 +282131,10 @@ CVE-2025-26789,0,0,ca7d12f2abb1c99361932e960f77e482442b11d4e054c4c52afe3c09d090d CVE-2025-26791,0,0,14f0d0b897ce6b3b47f78e719fad727635dc1654f1791907b55fa0b08f85a137,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,1c2f37976f337f02c25ffb2333b0ebfdbc30592f3f2e435c6890e1a417ba9356,2025-02-15T15:15:23.587000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 +CVE-2025-26803,1,1,7a255b740667bada4fca34455e40a59365b611b064e171d9a400283919805118,2025-02-24T16:15:15.020000 CVE-2025-26819,0,0,0ede991b4b81e17fa4f92afd2308026e6f3d0368afffc246b266200c177a850a,2025-02-15T00:15:28.510000 CVE-2025-26856,0,0,c84a7c72a0341166a47640053a8e7f11274d1f45c4694e798eb68fbe3bfe8515,2025-02-20T06:15:21.673000 +CVE-2025-26883,1,1,032931e2986e6fd47c419f54aa0f28ff932d2110f4669f25e27ede4c11fedef6,2025-02-24T15:15:14.007000 CVE-2025-26973,0,0,610ca521f6df23787468cbd6d7246985670b9cbd38aeda403a910446401c6120,2025-02-22T16:15:32.347000 CVE-2025-27012,0,0,7363d114ae429e53b3d9610c9cb193ed78cd11421be4a33a19fcf6bd0f11da65,2025-02-22T16:15:32.497000 CVE-2025-27013,0,0,5da49234db7e8d732a635aee7726c50524766c42564dc53ab30d5668c258b6b4,2025-02-18T20:15:33.880000 @@ -282147,3 +282155,53 @@ CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7 CVE-2025-27109,0,0,2aad45f7ceaec8c99923923cc63daf5c71560a762e95714d9599cb9bc274547c,2025-02-21T22:15:14.303000 CVE-2025-27113,0,0,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000 CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000 +CVE-2025-27265,1,1,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000 +CVE-2025-27266,1,1,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000 +CVE-2025-27272,1,1,1b548748a819eab579753a9bd6d5dc9bd2db6114d3746caa5fa440bb9f069bf7,2025-02-24T15:15:14.587000 +CVE-2025-27276,1,1,b7a6b4c4bc3d0bb5c01a96bd3a455d4b2708a9aebdc98b381748962c896ba221,2025-02-24T15:15:14.730000 +CVE-2025-27277,1,1,c795e46e75a4afaa1cba298812f78409dc6198a1d2b487a6553df7b0a2bc0820,2025-02-24T15:15:14.867000 +CVE-2025-27280,1,1,8faeb6bf311c92eb7b5caac0efd99bbe65e5b21ac6b3b7742633f4399d7faa9e,2025-02-24T15:15:15.007000 +CVE-2025-27290,1,1,caed74caf791d7ca7abfa5439d8cc5b6de653c29932aa42622fd5164fc63a75e,2025-02-24T15:15:15.153000 +CVE-2025-27294,1,1,13d9192d1b27464b97410ce2fff68eec6674a9b99413e0996d5376c59e71b828,2025-02-24T15:15:15.287000 +CVE-2025-27296,1,1,7d58484d8f5ea159a2d357fa113a32fa7d5567f7288f1f9b8854ee47e9382c63,2025-02-24T15:15:15.423000 +CVE-2025-27297,1,1,cbacece8cfe572de63dfb210a6f587d2e2537fc3b6295d787301d4659991d099,2025-02-24T15:15:15.567000 +CVE-2025-27298,1,1,6664acd2aef96bac795cd6cc40e2638436480f11a40a07a91d4baba1236863d1,2025-02-24T15:15:15.703000 +CVE-2025-27300,1,1,16f4cb1e577fa4dfe6438e9d65dac0a14d67c8277eab96e63d0b9e0dba21a053,2025-02-24T15:15:15.853000 +CVE-2025-27301,1,1,20cd75887c28fd6cc09511aea058e1599cce6d4895f8d185dcbb292def2902f9,2025-02-24T15:15:15.983000 +CVE-2025-27303,1,1,ac29fd92984dcebb67279e5026a4e499fe889c2dd556483ff560b7295c8848af,2025-02-24T15:15:16.123000 +CVE-2025-27304,1,1,49eab6814f9b20a03d6d427878e6ff9bf153bbb586690ad673b103677f99bf64,2025-02-24T15:15:16.260000 +CVE-2025-27305,1,1,bc7a1d001dd24cd514198a56f51601f85890bebd72c988003769dcf040c75a3c,2025-02-24T15:15:16.387000 +CVE-2025-27306,1,1,beef722ce62d7b38736e3cc91597cde3572cec5f805ddffa3b8870eee9a4f0ac,2025-02-24T15:15:16.523000 +CVE-2025-27307,1,1,4f496ae5afd8a4ae4a43b88a91597644af80de369fea4f5da0b2d159f00809b2,2025-02-24T15:15:16.653000 +CVE-2025-27311,1,1,7454455a8a067afcb3e1c15cfb4859668f744428f40693acbb965e95b964148e,2025-02-24T15:15:16.783000 +CVE-2025-27312,1,1,3d090be5f35cb7e3c084d32fa6626adff54a3bb1ace4d052fbbfa42d60255e35,2025-02-24T15:15:16.917000 +CVE-2025-27315,1,1,d47b3a06b52e48b0095ca7c7ce79be01e94fe0b25e3f39ebc75868793ef92b67,2025-02-24T15:15:17.047000 +CVE-2025-27316,1,1,f82ca7ba69aabd12d96f74497617c151726df66b9261e0dfd617bc5059d338a8,2025-02-24T15:15:17.193000 +CVE-2025-27317,1,1,dfbecfc73be115d083caf22a5fbb429a1c36d9f3e0cc09293948ca5f93c6703a,2025-02-24T15:15:17.353000 +CVE-2025-27318,1,1,096a9b624531b4ebfb9efab2b8197d0725be68ebe057535c4c10deb3fa27deed,2025-02-24T15:15:17.487000 +CVE-2025-27320,1,1,b29a54d0c7890c83f2324dd3283e5add9b5c55016f0039f8d8ec50df88e2c0c5,2025-02-24T15:15:17.620000 +CVE-2025-27321,1,1,fc465fa559123abfc7d25400c6b779b24f5b7da26bd015f4ef1756a64b78eed8,2025-02-24T15:15:17.753000 +CVE-2025-27323,1,1,e8a9d776fb7dde5d8ff104ed2590fa1eea9c8526a2bd86b46bbf11d45f80f72a,2025-02-24T15:15:17.887000 +CVE-2025-27325,1,1,b067af1235932cbeb70aa221d2ffbfd48eaa5f4f59dc5428765c1aab7079ab4a,2025-02-24T15:15:18.033000 +CVE-2025-27327,1,1,5c9580580341e25fee55c3dacd305dbfcc43b56121b7d0ba94ebce1c030fb594,2025-02-24T15:15:18.180000 +CVE-2025-27328,1,1,e41c08c8987980942d46071869b7fc381018beee1b582cc419fbb57f44ee023b,2025-02-24T15:15:18.337000 +CVE-2025-27329,1,1,aa7c3280f8e94866f2ad88bcc95abf06c7a8e44ef8c49ddec6d561fea8c1836d,2025-02-24T15:15:18.493000 +CVE-2025-27330,1,1,a94e6bf7c87e5925defe207479f73f1b9982d0af6388b67d010d0c5dd0bc4d0d,2025-02-24T15:15:18.660000 +CVE-2025-27331,1,1,5b6af71e69fa59abe650f18371259d10fb6577a543f510f4ab615e4f970409c1,2025-02-24T15:15:18.827000 +CVE-2025-27332,1,1,62b9fca9254a8bc891d31017545aa2d88bb2ed2cc797e2c825199a41d0aafede,2025-02-24T15:15:18.997000 +CVE-2025-27335,1,1,b096f95a5edd8e712a6b6bb47878eef991b6543cd224b347f1839178705e742b,2025-02-24T15:15:19.137000 +CVE-2025-27336,1,1,855b77a3665ac50a91f647617e53d7abc11e23fa1654af7837a7a3c04dcb3fb0,2025-02-24T15:15:19.283000 +CVE-2025-27339,1,1,1bc6295bfe6949bd1fe4a2927bc46511c8afdbe845c3f057400518412a566040,2025-02-24T15:15:19.430000 +CVE-2025-27340,1,1,92ce1c68f522c738c709dc62a859a10e2211bbda41e2e270556fe5fca9b77335,2025-02-24T15:15:19.567000 +CVE-2025-27341,1,1,b7baa5698adf255a91f3a2c82dad0f32c6bb74578cec4c5366307c126f87c868,2025-02-24T15:15:19.703000 +CVE-2025-27342,1,1,a01fd1007eae747596cc6e377bc4e713ad71852a3528a8e82a217f06d95b634c,2025-02-24T15:15:19.833000 +CVE-2025-27344,1,1,005157a9fc7155bdb932e738faf90e7574aefa78faffd415aaa8cfee6cd60093,2025-02-24T15:15:19.963000 +CVE-2025-27347,1,1,a6ed4cd6c477085f6b673be5ae8ffd2b7347acf4eb3e3c537df35c4d00a46fbb,2025-02-24T15:15:20.097000 +CVE-2025-27348,1,1,942a87ac5b6ea5d5ac4504d0c1e1ed63f50f5d0bcdcc04813028f467540fd78d,2025-02-24T15:15:20.230000 +CVE-2025-27349,1,1,b5b8398dbe20a20efcc637946215bd643c2c2e98019134ccac148f14228c327f,2025-02-24T15:15:20.363000 +CVE-2025-27351,1,1,d48e2e85fd38e51bf7a89dbccd723e314aa9c5d548f83b3feac5e640f59c8274,2025-02-24T15:15:20.503000 +CVE-2025-27352,1,1,2dbd011fbc4275bb813c22ad445f4f99be0e3a38517d81936d330c7b3183c739,2025-02-24T15:15:20.643000 +CVE-2025-27353,1,1,e9330e465bd2b224e768917457bf183dd9e6e3a03d6a86b1c73c647172eb9a1d,2025-02-24T15:15:20.780000 +CVE-2025-27355,1,1,66e7c6f2a2b25e7dd96aabb373de405f0d7238e697b5f6eca301307be69d4dd5,2025-02-24T15:15:20.917000 +CVE-2025-27356,1,1,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d5028c9,2025-02-24T15:15:21.077000 +CVE-2025-27357,1,1,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000