diff --git a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000814.json b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000814.json index 658ffe10872..d41cbf16bee 100644 --- a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000814.json +++ b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000814.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000814", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-20T15:29:00.487", - "lastModified": "2024-11-21T03:40:24.830", + "lastModified": "2025-03-14T14:09:33.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:aiohttp-session_project:aiohttp-session:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:aio-libs:aiohttp_session:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.6.0", - "matchCriteriaId": "DAA6F858-2068-4EF0-8443-8950A201CC76" + "matchCriteriaId": "B2A82886-92F6-4FF8-A71C-4405D2AB5127" } ] } diff --git a/CVE-2019/CVE-2019-115xx/CVE-2019-11580.json b/CVE-2019/CVE-2019-115xx/CVE-2019-11580.json index b5bbf913997..982e5797fa5 100644 --- a/CVE-2019/CVE-2019-115xx/CVE-2019-11580.json +++ b/CVE-2019/CVE-2019-115xx/CVE-2019-11580.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11580", "sourceIdentifier": "security@atlassian.com", "published": "2019-06-03T14:29:00.217", - "lastModified": "2025-02-07T13:15:25.597", - "vulnStatus": "Modified", + "lastModified": "2025-03-14T14:54:03.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45842.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45842.json index c4209822a11..32d452b951c 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45842.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45842.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45842", "sourceIdentifier": "audit@patchstack.com", "published": "2022-11-30T13:15:11.080", - "lastModified": "2024-11-21T07:29:49.153", + "lastModified": "2025-03-14T14:54:47.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.6.4", - "matchCriteriaId": "2A7DFB17-9C73-4559-9621-7BCC9BCB3C34" + "matchCriteriaId": "A718499E-7D08-49B8-9C06-86BAA56173AD" } ] } diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4784.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4784.json index 5729c61c873..b88ec83c106 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4784.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4784.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4784", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-21T09:15:11.533", - "lastModified": "2024-11-21T07:35:56.170", + "lastModified": "2025-03-14T14:15:12.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4791.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4791.json index 94463484ffa..056174d85f1 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4791.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4791.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4791", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-21T09:15:11.750", - "lastModified": "2024-11-21T07:35:56.977", + "lastModified": "2025-03-14T14:15:12.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4897.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4897.json index 967e60d3008..d298b2c2001 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4897.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4897.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4897", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-21T09:15:11.827", - "lastModified": "2024-11-21T07:36:12.110", + "lastModified": "2025-03-14T14:15:13.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2408.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2408.json index a0eca0144a1..3bcff2505ab 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2408.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2408.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2408", "sourceIdentifier": "security@php.net", "published": "2024-06-09T20:15:09.270", - "lastModified": "2024-11-21T09:09:41.450", + "lastModified": "2025-03-14T14:15:15.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27367.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27367.json index 162a7cc5cb2..7c86711bd7f 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27367.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27367.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27367", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:04.257", - "lastModified": "2024-09-11T15:26:42.500", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-14T14:15:14.030", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json index 2f674c6187c..33b70dbe2c3 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27856", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.483", - "lastModified": "2025-01-16T15:15:13.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:42:15.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,34 +81,130 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "D80D1AA1-D37A-4ABD-87A0-2C3B12EDA955" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.8", + "matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.5", + "matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.8", + "matchCriteriaId": "0EDF6AF0-A238-47E5-9A9D-F6FDB832DD8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.5", + "matchCriteriaId": "DEC0ACF3-F486-4536-8415-A176C68CE183" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.5", + "matchCriteriaId": "018F7001-D2CD-4A28-853F-749408A7D1AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5", + "matchCriteriaId": "CC4B1E01-BE73-48F8-9BD5-32F7C57EB45A" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120896", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120898", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120901", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120902", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120903", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120905", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120906", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json index 904ec161d48..f95fd79a172 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28077", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:07.733", - "lastModified": "2024-09-05T18:29:31.127", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-14T14:15:14.653", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json index 79c475ade73..ae0735b1fe1 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36730", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:57.840", - "lastModified": "2024-11-21T09:22:33.890", + "lastModified": "2025-03-14T14:15:15.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37079.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37079.json index 97884b06ffe..e414717a39b 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37079.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37079", "sourceIdentifier": "security@vmware.com", "published": "2024-06-18T06:15:11.350", - "lastModified": "2024-11-21T09:23:09.090", + "lastModified": "2025-03-14T14:15:16.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json index 5a323d69e32..09023b3c742 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40605", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.770", - "lastModified": "2024-11-21T09:31:22.320", + "lastModified": "2025-03-14T14:15:16.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json index a644507fca2..fe191b5ead7 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40771", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.597", - "lastModified": "2025-01-16T17:15:11.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:43:48.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,147 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.8", + "matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.5", + "matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.8", + "matchCriteriaId": "0EDF6AF0-A238-47E5-9A9D-F6FDB832DD8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.5", + "matchCriteriaId": "DEC0ACF3-F486-4536-8415-A176C68CE183" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.6.7", + "matchCriteriaId": "C456020E-3025-4728-9F77-C1E44E6B0EA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.5", + "matchCriteriaId": "03438F98-D6C4-4CA6-840D-2633E8A88F68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.7", + "matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.5", + "matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120898", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120899", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120900", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120901", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120902", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120903", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120905", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/120906", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json index 1568d832f95..7ad008cf38f 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40839", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.700", - "lastModified": "2025-01-16T17:15:12.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:44:22.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.5", + "matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120905", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json index 0702f647f96..7493dcad9df 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40854", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.797", - "lastModified": "2025-01-16T17:15:12.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:46:57.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json index f72dc0b0c04..ac4af48fde7 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44192", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-10T19:15:38.080", - "lastModified": "2025-03-11T14:15:22.503", - "vulnStatus": "Received", + "lastModified": "2025-03-14T13:52:46.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0", + "matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.0", + "matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121240", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121241", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121248", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121249", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46276.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46276.json index fe22a4b4680..6d4974e3d27 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46276.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46276", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T14:15:06.260", - "lastModified": "2024-10-04T16:36:49.997", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-14T14:15:16.497", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48938.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48938.json index 7ac2b6d7e23..e49dca6866f 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48938.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48938", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T21:15:07.387", - "lastModified": "2024-10-17T19:49:56.327", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-14T14:15:16.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json index a1c1519578a..c0f99270df0 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54470", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.520", - "lastModified": "2025-01-16T17:15:12.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:48:19.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.7.1", + "matchCriteriaId": "F6724AFC-F8BD-4ECA-9FFA-914AFADC58FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json index 8b100d77466..252bab7fcf9 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54499", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.680", - "lastModified": "2025-01-28T16:15:39.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:49:41.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,26 +81,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2", + "matchCriteriaId": "16F83EAF-2879-4515-BC44-6AE5006D35EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121845", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json index b6aa0e46a7c..1fd341027c7 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54518", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.260", - "lastModified": "2025-01-28T15:15:11.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-14T13:52:08.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/121844", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2000.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2000.json new file mode 100644 index 00000000000..d9b9f49ee85 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2000.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2000", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-14T13:15:40.907", + "lastModified": "2025-03-14T13:15:40.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185949", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2263.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2263.json index 95ecf8ec143..bb6f1964228 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2263.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2263.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2263", "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-03-13T17:15:38.617", - "lastModified": "2025-03-13T17:15:38.617", + "lastModified": "2025-03-14T14:15:19.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During login to the web server in \"Sante PACS Server.exe\", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker." + }, + { + "lang": "es", + "value": "Al iniciar sesi\u00f3n en el servidor web en \"Sante PACS Server.exe\", se llama a la funci\u00f3n OpenSSL EVP_DecryptUpdate para descifrar el nombre de usuario y la contrase\u00f1a. Se pasa a la funci\u00f3n un b\u00fafer fijo de pila de 0x80 bytes como b\u00fafer de salida. Se produce un desbordamiento de b\u00fafer de pila si un atacante remoto no autenticado proporciona un nombre de usuario o una contrase\u00f1a cifrados largos." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://www.tenable.com/security/research/tra-2025-08", "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2025-08", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2264.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2264.json index 68e39d8528c..17a7bf0967c 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2264.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2264.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2264", "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-03-13T17:15:38.787", - "lastModified": "2025-03-13T17:15:38.787", + "lastModified": "2025-03-14T14:15:19.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Path Traversal Information Disclosure vulnerability exists in \"Sante PACS Server.exe\". An unauthenticated remote attacker can exploit it to download arbitrary files on the disk drive where the application is installed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Path Traversal en \"Sante PACS Server.exe\". Un atacante remoto no autenticado puede explotarla para descargar archivos arbitrarios en la unidad de disco donde est\u00e1 instalada la aplicaci\u00f3n." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://www.tenable.com/security/research/tra-2025-08", "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2025-08", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2268.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2268.json new file mode 100644 index 00000000000..996d2e242aa --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2268.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2268", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2025-03-14T14:15:20.270", + "lastModified": "2025-03-14T14:15:20.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HP LaserJet MFP M232-M237 Printer Series may be vulnerable to a denial of service attack when a specially crafted request message is sent via Internet Printing Protocol (IPP)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-241" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_12114154-12114176-16/hpsbpi04013", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2304.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2304.json new file mode 100644 index 00000000000..5cb0cc1527c --- /dev/null +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2304.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-2304", + "sourceIdentifier": "vulnreport@tenable.com", + "published": "2025-03-14T13:15:41.160", + "lastModified": "2025-03-14T13:15:41.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Privilege Escalation through a Mass Assignment exists in Camaleon CMS\n\nWhen a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit!\u00a0method, which allows all parameters to pass through without any filtering." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-915" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/owen2345/camaleon-cms", + "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2025-09", + "source": "vulnreport@tenable.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json index f75c72e44e6..e38600da9ac 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json @@ -2,13 +2,24 @@ "id": "CVE-2025-25748", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-11T18:15:32.810", - "lastModified": "2025-03-11T18:15:32.810", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2025-03-14T13:15:39.780", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens." + "value": "A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token." + }, + { + "lang": "es", + "value": "Una vulnerabilidad CSRF en el endpoint gestione_utenti.php de HotelDruid 3.0.7 permite a los atacantes realizar acciones no autorizadas (por ejemplo, modificar las contrase\u00f1as de los usuarios) en nombre de usuarios autenticados explotando la falta de validaci\u00f3n del origen o del referente y la ausencia de tokens CSRF." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26626.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26626.json new file mode 100644 index 00000000000..e284f608721 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26626.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26626", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-14T13:15:40.077", + "lastModified": "2025-03-14T13:15:40.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The GLPI Inventory Plugin handles various types of tasks for GLPI agents for the GLPI asset and IT management software package. Versions prior to 1.5.0 are vulnerable to reflective cross-site scripting, which may lead to executing javascript code. Version 1.5.0 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi-inventory-plugin/blob/1.5.0/CHANGELOG.md#150---2025-02-25", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-8p38-r7vf-j6jx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json index de4a53d4e49..07e0eed510e 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27363.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27363", "sourceIdentifier": "cve-assign@fb.com", "published": "2025-03-11T14:15:25.427", - "lastModified": "2025-03-14T05:15:42.377", + "lastModified": "2025-03-14T13:15:40.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -83,6 +83,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/14/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/03/14/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27593.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27593.json new file mode 100644 index 00000000000..16a2cab0213 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27593.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-27593", + "sourceIdentifier": "psirt@sick.de", + "published": "2025-03-14T13:15:40.437", + "lastModified": "2025-03-14T13:15:40.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF", + "source": "psirt@sick.de" + }, + { + "url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", + "source": "psirt@sick.de" + }, + { + "url": "https://sick.com/psirt", + "source": "psirt@sick.de" + }, + { + "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", + "source": "psirt@sick.de" + }, + { + "url": "https://www.first.org/cvss/calculator/3.1", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf", + "source": "psirt@sick.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27594.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27594.json new file mode 100644 index 00000000000..5c6f5902ca0 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27594.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-27594", + "sourceIdentifier": "psirt@sick.de", + "published": "2025-03-14T13:15:40.623", + "lastModified": "2025-03-14T13:15:40.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby intercept the authentication hash and use it to log into the device using a pass-the-hash attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF", + "source": "psirt@sick.de" + }, + { + "url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", + "source": "psirt@sick.de" + }, + { + "url": "https://sick.com/psirt", + "source": "psirt@sick.de" + }, + { + "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", + "source": "psirt@sick.de" + }, + { + "url": "https://www.first.org/cvss/calculator/3.1", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf", + "source": "psirt@sick.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27595.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27595.json new file mode 100644 index 00000000000..947fbdc674d --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27595.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-27595", + "sourceIdentifier": "psirt@sick.de", + "published": "2025-03-14T13:15:40.763", + "lastModified": "2025-03-14T13:15:40.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-328" + } + ] + } + ], + "references": [ + { + "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF", + "source": "psirt@sick.de" + }, + { + "url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", + "source": "psirt@sick.de" + }, + { + "url": "https://sick.com/psirt", + "source": "psirt@sick.de" + }, + { + "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", + "source": "psirt@sick.de" + }, + { + "url": "https://www.first.org/cvss/calculator/3.1", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf", + "source": "psirt@sick.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29029.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29029.json new file mode 100644 index 00000000000..323ded27e4c --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29029.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29029", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-14T14:15:17.977", + "lastModified": "2025-03-14T14:15:17.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formSetSpeedWan function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WhereisDoujo/CVE/issues/2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json new file mode 100644 index 00000000000..9eb8fc343d2 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29030.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29030", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-14T14:15:18.200", + "lastModified": "2025-03-14T14:15:18.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WhereisDoujo/CVE/issues/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json new file mode 100644 index 00000000000..d2320fd2ef6 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29031.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29031", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-14T14:15:18.430", + "lastModified": "2025-03-14T14:15:18.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WhereisDoujo/CVE/issues/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json new file mode 100644 index 00000000000..55e99d4f730 --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29032.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29032", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-14T14:15:18.623", + "lastModified": "2025-03-14T14:15:18.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WhereisDoujo/CVE/issues/6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29776.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29776.json new file mode 100644 index 00000000000..1beb525925a --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29776.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-29776", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-14T14:15:18.847", + "lastModified": "2025-03-14T14:15:18.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azle is a WebAssembly runtime for TypeScript and JavaScript on ICP. Calling `setTimer` in Azle versions `0.27.0`, `0.28.0`, and `0.29.0` causes an immediate infinite loop of timers to be executed on the canister, each timer attempting to clean up the global state of the previous timer. The infinite loop will occur with any valid invocation of `setTimer`. The problem has been fixed as of Azle version `0.30.0`. As a workaround, if a canister is caught in this infinite loop after calling `setTimer`, the canister can be upgraded and the timers will all be cleared, thus ending the loop." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/demergent-labs/azle/releases/tag/0.30.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/demergent-labs/azle/security/advisories/GHSA-xc76-5pf9-mx8m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 924940b37ff..fe324ef4adc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-14T13:00:19.765616+00:00 +2025-03-14T15:00:20.376870+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-14T12:15:14.887000+00:00 +2025-03-14T14:54:47.220000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285226 +285238 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `12` -- [CVE-2024-12810](CVE-2024/CVE-2024-128xx/CVE-2024-12810.json) (`2025-03-14T12:15:13.483`) -- [CVE-2024-13771](CVE-2024/CVE-2024-137xx/CVE-2024-13771.json) (`2025-03-14T12:15:13.693`) -- [CVE-2024-13772](CVE-2024/CVE-2024-137xx/CVE-2024-13772.json) (`2025-03-14T12:15:13.907`) -- [CVE-2024-13773](CVE-2024/CVE-2024-137xx/CVE-2024-13773.json) (`2025-03-14T12:15:14.100`) -- [CVE-2025-2232](CVE-2025/CVE-2025-22xx/CVE-2025-2232.json) (`2025-03-14T12:15:14.887`) +- [CVE-2025-2000](CVE-2025/CVE-2025-20xx/CVE-2025-2000.json) (`2025-03-14T13:15:40.907`) +- [CVE-2025-2268](CVE-2025/CVE-2025-22xx/CVE-2025-2268.json) (`2025-03-14T14:15:20.270`) +- [CVE-2025-2304](CVE-2025/CVE-2025-23xx/CVE-2025-2304.json) (`2025-03-14T13:15:41.160`) +- [CVE-2025-26626](CVE-2025/CVE-2025-266xx/CVE-2025-26626.json) (`2025-03-14T13:15:40.077`) +- [CVE-2025-27593](CVE-2025/CVE-2025-275xx/CVE-2025-27593.json) (`2025-03-14T13:15:40.437`) +- [CVE-2025-27594](CVE-2025/CVE-2025-275xx/CVE-2025-27594.json) (`2025-03-14T13:15:40.623`) +- [CVE-2025-27595](CVE-2025/CVE-2025-275xx/CVE-2025-27595.json) (`2025-03-14T13:15:40.763`) +- [CVE-2025-29029](CVE-2025/CVE-2025-290xx/CVE-2025-29029.json) (`2025-03-14T14:15:17.977`) +- [CVE-2025-29030](CVE-2025/CVE-2025-290xx/CVE-2025-29030.json) (`2025-03-14T14:15:18.200`) +- [CVE-2025-29031](CVE-2025/CVE-2025-290xx/CVE-2025-29031.json) (`2025-03-14T14:15:18.430`) +- [CVE-2025-29032](CVE-2025/CVE-2025-290xx/CVE-2025-29032.json) (`2025-03-14T14:15:18.623`) +- [CVE-2025-29776](CVE-2025/CVE-2025-297xx/CVE-2025-29776.json) (`2025-03-14T14:15:18.847`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `26` -- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-14T12:01:21.157`) -- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-14T12:00:22.240`) -- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-14T11:59:19.543`) -- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-14T11:56:31.210`) -- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-14T11:55:11.573`) -- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-14T11:54:22.363`) -- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-14T11:53:55.893`) +- [CVE-2019-11580](CVE-2019/CVE-2019-115xx/CVE-2019-11580.json) (`2025-03-14T14:54:03.240`) +- [CVE-2022-45842](CVE-2022/CVE-2022-458xx/CVE-2022-45842.json) (`2025-03-14T14:54:47.220`) +- [CVE-2022-4784](CVE-2022/CVE-2022-47xx/CVE-2022-4784.json) (`2025-03-14T14:15:12.687`) +- [CVE-2022-4791](CVE-2022/CVE-2022-47xx/CVE-2022-4791.json) (`2025-03-14T14:15:12.910`) +- [CVE-2022-4897](CVE-2022/CVE-2022-48xx/CVE-2022-4897.json) (`2025-03-14T14:15:13.110`) +- [CVE-2024-2408](CVE-2024/CVE-2024-24xx/CVE-2024-2408.json) (`2025-03-14T14:15:15.033`) +- [CVE-2024-27367](CVE-2024/CVE-2024-273xx/CVE-2024-27367.json) (`2025-03-14T14:15:14.030`) +- [CVE-2024-27856](CVE-2024/CVE-2024-278xx/CVE-2024-27856.json) (`2025-03-14T13:42:15.337`) +- [CVE-2024-28077](CVE-2024/CVE-2024-280xx/CVE-2024-28077.json) (`2025-03-14T14:15:14.653`) +- [CVE-2024-36730](CVE-2024/CVE-2024-367xx/CVE-2024-36730.json) (`2025-03-14T14:15:15.717`) +- [CVE-2024-37079](CVE-2024/CVE-2024-370xx/CVE-2024-37079.json) (`2025-03-14T14:15:16.010`) +- [CVE-2024-40605](CVE-2024/CVE-2024-406xx/CVE-2024-40605.json) (`2025-03-14T14:15:16.200`) +- [CVE-2024-40771](CVE-2024/CVE-2024-407xx/CVE-2024-40771.json) (`2025-03-14T13:43:48.847`) +- [CVE-2024-40839](CVE-2024/CVE-2024-408xx/CVE-2024-40839.json) (`2025-03-14T13:44:22.267`) +- [CVE-2024-40854](CVE-2024/CVE-2024-408xx/CVE-2024-40854.json) (`2025-03-14T13:46:57.020`) +- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-14T13:52:46.090`) +- [CVE-2024-46276](CVE-2024/CVE-2024-462xx/CVE-2024-46276.json) (`2025-03-14T14:15:16.497`) +- [CVE-2024-48938](CVE-2024/CVE-2024-489xx/CVE-2024-48938.json) (`2025-03-14T14:15:16.790`) +- [CVE-2024-54470](CVE-2024/CVE-2024-544xx/CVE-2024-54470.json) (`2025-03-14T13:48:19.380`) +- [CVE-2024-54499](CVE-2024/CVE-2024-544xx/CVE-2024-54499.json) (`2025-03-14T13:49:41.167`) +- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-03-14T13:52:08.567`) +- [CVE-2025-2263](CVE-2025/CVE-2025-22xx/CVE-2025-2263.json) (`2025-03-14T14:15:19.660`) +- [CVE-2025-2264](CVE-2025/CVE-2025-22xx/CVE-2025-2264.json) (`2025-03-14T14:15:19.937`) +- [CVE-2025-25748](CVE-2025/CVE-2025-257xx/CVE-2025-25748.json) (`2025-03-14T13:15:39.780`) +- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-14T13:15:40.250`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c91d8dcf157..e230f5a83d4 100644 --- a/_state.csv +++ b/_state.csv @@ -111127,7 +111127,7 @@ CVE-2018-1000810,0,0,1561a39ec1c3af108d3d547beda1e077fd14815bd148789b9e254a77027 CVE-2018-1000811,0,0,71003252a63fdb2e3f591d8ba8d661849f48eb522524f091b4296395d2b5320a,2024-11-21T03:40:24.397000 CVE-2018-1000812,0,0,aad290d3af05491fb986052986a97ead26ea53c36c831f597be45535b0f69a58,2024-11-21T03:40:24.540000 CVE-2018-1000813,0,0,674f8f52ad46e2224828712c4e09d83b88648a7138460e3941d61f10424c21f9,2024-11-21T03:40:24.687000 -CVE-2018-1000814,0,0,f60227908d35ec8c78114f676aa6f64844e7d91cf7d27b4ae027f55e20f1fa9e,2024-11-21T03:40:24.830000 +CVE-2018-1000814,0,1,7edee2252928bb8471151b757eb120b2c305b823335846a56bb900defc5d1036,2025-03-14T14:09:33.920000 CVE-2018-1000815,0,0,9db063d9ff8f14965f69ce82e4eba2540fb04501e0ba66835da18b553f10bd28,2024-11-21T03:40:24.970000 CVE-2018-1000816,0,0,f44ec7ef06abab517891c543730e99b0664d621eacea18c6f1801779834eda4e,2024-11-21T03:40:25.107000 CVE-2018-1000817,0,0,6b982f554375b896611e680c21b341ce21a478fb1104500f05a910b7b7458cdc,2024-11-21T03:40:25.240000 @@ -129911,7 +129911,7 @@ CVE-2019-11577,0,0,dbb685d8f922c68e8547ddf9f5dce339b3efd8b9dee72da3661cd1bf18ed6 CVE-2019-11578,0,0,0a75bc8151e818ec28cae7a6f538ec494bfce33c3ab0e6e11f591e17f0989a62,2024-11-21T04:21:22.557000 CVE-2019-11579,0,0,33075687fd6734a6ff5d11c0803ac30599facf79016f7db45596a2372faa141c,2024-11-21T04:21:22.717000 CVE-2019-1158,0,0,c3288b3c3067898f6d6006b543465fedb42d0d28bee888d1500c5b22c2744104,2024-11-21T04:36:08.610000 -CVE-2019-11580,0,0,ed9b3477b885002f5c47116a7de008bfe3d818702ac2d0404b911698b8099067,2025-02-07T13:15:25.597000 +CVE-2019-11580,0,1,15204b7f70a973e26b51c1d507de77bfb7f386e6d39871c557e1b12e1f3a8f1c,2025-03-14T14:54:03.240000 CVE-2019-11581,0,0,fbb63fc575ffe8cb6b5e0d897aa8c8722e62d427706e072c883fb05ebc8bbfde,2025-02-07T13:15:25.787000 CVE-2019-11582,0,0,77284a3f2517a4292175b24f8c83e645d56569d0331d0c57d78e8a319af73c14,2024-11-21T04:21:23.097000 CVE-2019-11583,0,0,c7ce56caba0b1dfec1d2b23f306031f78022e4173a321beeb3e8a3a1ff77327d,2024-11-21T04:21:23.207000 @@ -210830,7 +210830,7 @@ CVE-2022-45839,0,0,46dd0fbbf9d33fee043ddb9f285f269c5c63c1bbc8e26cb4ab76aa00d7976 CVE-2022-4584,0,0,2d76b8fefb623252355fa876fafa69317df9ed31f1c5f8ac5434ee5f45314d75,2024-11-21T07:35:32.467000 CVE-2022-45840,0,0,eba7fb67898b5e781a4f29b887dadf16dcd3c1f909803e4c621a9e93b8c62770,2024-12-13T15:15:08.447000 CVE-2022-45841,0,0,2ee89cafc712957a2af9331a83f3b25ba4f41a5772b96bbbc391b45c1ef6abbd,2024-12-13T15:15:08.620000 -CVE-2022-45842,0,0,332458f38615c702e47544c91b4b065a6cfbfa7bc3e9620ce89a57a06739ebe9,2024-11-21T07:29:49.153000 +CVE-2022-45842,0,1,8097e616128de4d8a8ca77bdbea1c78c3397096a1aaacd1d72c0d8f29d2d6dac,2025-03-14T14:54:47.220000 CVE-2022-45843,0,0,2cb89896f8f3c5270729415dc61fda6447d9a1727d04a0f7c4405056bd1573bf,2024-11-21T07:29:49.287000 CVE-2022-45845,0,0,56fc9ef41f9d8e47cfa8423f747c550182326e401ee07f66d1fe1d5e61f03f9b,2024-11-21T07:29:49.413000 CVE-2022-45846,0,0,ac719a1fcee4199d98cb859a4026b148fcfed4a5bff33daed2dea1bd3644ef6a,2024-11-21T07:29:49.540000 @@ -212179,7 +212179,7 @@ CVE-2022-4780,0,0,bed8d708be2ffb03beca68d4775c7199631650ec8f0a6625bf571cd99ea3e7 CVE-2022-4781,0,0,efb017d1b3dc6ea17e2dc1a077185cb0e06bc920cc2d8a36435a226df5ddb164,2024-11-21T07:35:55.837000 CVE-2022-4782,0,0,d86e170eabe03386a135c89e7275e0a127c322e6ba07c3e30f2f6123bbe19f76,2024-11-21T07:35:55.940000 CVE-2022-4783,0,0,0c3287070cfa467531f3e63e450e1c60247ee7b1148d1c1526c6700e19bf36e9,2024-11-21T07:35:56.060000 -CVE-2022-4784,0,0,394fae29374e0bcb0f865c8a3b612c1a2757821b7710cb72a1654ea406fa230e,2024-11-21T07:35:56.170000 +CVE-2022-4784,0,1,71b057faaeeae94ceb446adbeeed78f94c564a1dace10f0747ffb6cc5bd193d5,2025-03-14T14:15:12.687000 CVE-2022-47848,0,0,37d91542a280217dc4dae0e99433b2fe5ff92e7a9bd5344829bebfce3526c7ed,2024-11-21T07:32:24.743000 CVE-2022-4785,0,0,0a756f44e89d54a16d92a6dfcd81338dfb6f117d0b917bce0ac6f639315e1aed,2024-11-21T07:35:56.280000 CVE-2022-47853,0,0,a5adce8f8f4bcc6956d04550b4f1086084ba68e50eb6284325311b80fcf47f43,2024-11-21T07:32:24.897000 @@ -212215,7 +212215,7 @@ CVE-2022-47896,0,0,0962dff4a1558f617e8a450129033216694d634bb163178a870d841b6a4ab CVE-2022-4790,0,0,6e71affec51e6410983c2ee92588f220b274fd269cfaf5c39b50da77b3da0f47,2024-11-21T07:35:56.863000 CVE-2022-47908,0,0,af2d1021d43666295e563d722c79fafafac45c67901e19a610e7df5a60fa2794,2024-11-21T07:32:30.883000 CVE-2022-47909,0,0,62b228b53821463d9a8ba3f951b088e938993df2e739e56acbd55f6db39798e7,2024-11-21T07:32:31.063000 -CVE-2022-4791,0,0,77d6e6ae5066b2b9e6489e9e05cfc3e16b34d02a9636e0a2accd271ec35d0793,2024-11-21T07:35:56.977000 +CVE-2022-4791,0,1,88b9947b01451fd3199741332dd29f64d60311438560ac69ed2ca7cc399201a8,2025-03-14T14:15:12.910000 CVE-2022-47911,0,0,5a5c6b2be806b95cc36a7c96c07829d5157384b8f475ad1624f858bb54bf06f2,2024-11-21T07:32:31.320000 CVE-2022-47915,0,0,a5f9213bbcf2bb98ed3dfe4d8654563d17cbaa172bedda24b64a3b730184be14,2024-11-21T07:32:31.490000 CVE-2022-47917,0,0,f2ceac1005866817845123385e6cff4a40de626e8a479202d8911ed95836d056,2024-11-21T07:32:31.657000 @@ -213086,7 +213086,7 @@ CVE-2022-48966,0,0,a55046fc510a2667674a549f2c8ca198a860c6a600c36d18d0719dc2f1f81 CVE-2022-48967,0,0,868e48e70cb82d6daf4b94f232b4d85ccadc3352ce74c9d2abfad614383a08c3,2024-10-25T21:27:46.017000 CVE-2022-48968,0,0,1ec8726ffc62911818c7891ca4d8e758c2d3067df57f5952aba847318cd24338,2024-10-25T21:26:01.523000 CVE-2022-48969,0,0,910346d7621597f6bb6fe6fcea28dabaf6a52085b9e63e83acb1c76a45c6db19,2024-10-25T21:22:10.087000 -CVE-2022-4897,0,0,425da488deddc8222988522af4337edfa63cde567e932f9694105521c9a8d120,2024-11-21T07:36:12.110000 +CVE-2022-4897,0,1,a91bd3c037b39995fc112ca971e1473f803132355ab78c97278290203f1865c9,2025-03-14T14:15:13.110000 CVE-2022-48970,0,0,11f8a61146592ef5ee3cd5b7c75f0f8ff32cd9bd9ceb482c39017de346065945,2024-10-25T15:24:22.060000 CVE-2022-48971,0,0,80f97ff999e7b7879b29e227daebb7895f5ef3d5dba477cd326bffb787338212,2024-10-25T15:23:38.807000 CVE-2022-48972,0,0,31c25bbaadba1ca8a8d70b70cef209b7007de45ef8b59f044533ed4fb0d75801,2024-10-25T15:22:33.897000 @@ -246864,7 +246864,7 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000 CVE-2024-12809,0,0,314a9a253eaae4362d4a78cca74afbfdb258ff23c3edc47ccba96245196d2d9c,2025-03-07T07:15:21.380000 -CVE-2024-12810,1,1,3ddb2540f9d4b384560866e66c8f0d1696ffca947782b320a7cc3c4568aa2afd,2025-03-14T12:15:13.483000 +CVE-2024-12810,0,0,3ddb2540f9d4b384560866e66c8f0d1696ffca947782b320a7cc3c4568aa2afd,2025-03-14T12:15:13.483000 CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000 CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 @@ -247773,9 +247773,9 @@ CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15de CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 -CVE-2024-13771,1,1,0329be1eb23ed6a4a01effac73839e1b4cd70516d30c97ddc850d119d63c1cb1,2025-03-14T12:15:13.693000 -CVE-2024-13772,1,1,8aa1d58d8df083611965325d4056997a1a74e3b5c7ec55d91eca1ff1d36213b6,2025-03-14T12:15:13.907000 -CVE-2024-13773,1,1,d7022ad9ff4786c11c3ccedfd649addbd228e68d9f171a83917d5cbcd5741b6a,2025-03-14T12:15:14.100000 +CVE-2024-13771,0,0,0329be1eb23ed6a4a01effac73839e1b4cd70516d30c97ddc850d119d63c1cb1,2025-03-14T12:15:13.693000 +CVE-2024-13772,0,0,8aa1d58d8df083611965325d4056997a1a74e3b5c7ec55d91eca1ff1d36213b6,2025-03-14T12:15:13.907000 +CVE-2024-13773,0,0,d7022ad9ff4786c11c3ccedfd649addbd228e68d9f171a83917d5cbcd5741b6a,2025-03-14T12:15:14.100000 CVE-2024-13774,0,0,79f4d1a7ea114db5ba731a9177efda59b5bdf0f997e09eca02aae430d9de0e14,2025-03-12T17:01:06.413000 CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000 CVE-2024-13777,0,0,b33d8c64d6edba912fc043a3b3033deac93a29824073f84ccb4027b47d8f33ea,2025-03-05T10:15:15.367000 @@ -251840,7 +251840,7 @@ CVE-2024-2406,0,0,c9b679e86de726ed280bae6f96533f4aea7f8098b4506ff442be791301afa2 CVE-2024-24060,0,0,76420c08875743804b95d33c1b8e327e25e9a56c748b2569fe6e9e74860b3f4b,2024-11-21T08:58:53.127000 CVE-2024-24061,0,0,b44f4520c297437d45fb26f88d26245a5b6e5157f6d3a6fede608839ca3e86f0,2024-11-21T08:58:53.283000 CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d0681eb,2024-11-21T08:58:53.443000 -CVE-2024-2408,0,0,a9a44685e12fb751abb365dcea513da0e8982589d7eaa294b433e4d0136753aa,2024-11-21T09:09:41.450000 +CVE-2024-2408,0,1,cbbe9dcbe0868e1c9bf8912d7a6c3e914b1567e378ed42481c9fc943be2160f8,2025-03-14T14:15:15.033000 CVE-2024-2409,0,0,77d5c2883cdd5dbd6edc65df7d11494763b07409c810ab6debf5b40e86f36c09,2025-02-13T17:00:33.790000 CVE-2024-24091,0,0,ab544d8586eff97d50440c6aee00588f4dadfd440f573585f5d79c9b1b92e18e,2024-11-21T08:58:53.610000 CVE-2024-24092,0,0,42612e9d4b67369b95e4f784bad7b4f3ce9b376ecaf3980484ef440bfbfb510d,2024-11-21T08:58:53.847000 @@ -254379,7 +254379,7 @@ CVE-2024-27363,0,0,000816135a5e0d34cea85b831dc31727f98550e96055ef57f0a1c37b792f2 CVE-2024-27364,0,0,2b38d7b61761eb8fae8574705214eff11f6fa32157870ade9ec7bb3c14e790a7,2024-09-11T15:27:12.647000 CVE-2024-27365,0,0,0aa36bbf9560a6ce3119769b43a38169e12136e167f318d9e696a92d74b03e2a,2024-09-20T13:09:31.330000 CVE-2024-27366,0,0,ef4066a391748c88dd2216d490b3c5320549be309784c64e177a3f247a3df45d,2024-09-11T15:26:58.437000 -CVE-2024-27367,0,0,738ef53203f8a3a6335d17e4a9b28c46934bfa0ba0afe1bbb4331789ec90668a,2024-09-11T15:26:42.500000 +CVE-2024-27367,0,1,ae0b0e72a707b362deaa42e018646312dd2f08c4028de63f448182d571d3fd72,2025-03-14T14:15:14.030000 CVE-2024-27368,0,0,928f1a854962ee09bc633561fd87e7f327f3d44aa8093cd055d60b1208b73696,2024-09-11T15:25:46.313000 CVE-2024-27370,0,0,104839b7ea71df41ce964ae5ea348695a6885be53f474b2b7689d1985d85623f,2024-11-21T09:04:27.190000 CVE-2024-27371,0,0,68cc0a73a21ff87eaa835039b271e039611470f87c19580d744665b4c4de5e5f,2024-11-21T09:04:27.380000 @@ -254703,7 +254703,7 @@ CVE-2024-27851,0,0,c3b97ee6b26dfbc0c56d39614137e38659ab1609757d63181c34ff60a311c CVE-2024-27852,0,0,21baed505dd28c7a0b77d3ba061072e5a4859b987a8b1d420f9b79d60ef54041,2024-12-09T19:40:07.710000 CVE-2024-27853,0,0,72a1ed6ec4d0895fb804921668bc2bff946add21527d9bb528b8f3dbbcdca964,2024-11-21T09:05:17.167000 CVE-2024-27855,0,0,9498904c1aaf88554f96d0182eda5cb5f555562d50e2e20fa99548d2f5e715fc,2025-03-13T14:15:24.497000 -CVE-2024-27856,0,0,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000 +CVE-2024-27856,0,1,b680ab5b88acd7c43ef11744d6b525d37df824faeef9c5b709df98aed5688604,2025-03-14T13:42:15.337000 CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000 CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000 CVE-2024-27859,0,0,a7656a9ee29e09d9d6dd0ed0138e7403302c55b95156638f98095c6c05798bbf,2025-03-03T16:52:20.953000 @@ -254917,7 +254917,7 @@ CVE-2024-28073,0,0,9e93116ea0a1164669b0a89f103bcb752560d58559173a183331a8d5e18ea CVE-2024-28074,0,0,9feb0c642dc45516453e6ef213c4c3411bb4332780935cb6eb8ecb254629299d,2024-11-21T09:05:45.503000 CVE-2024-28075,0,0,e758609c069f3752455c5ed3d122f3925b13bc8518a96806272df66059449b5a,2025-02-10T22:49:58.503000 CVE-2024-28076,0,0,cfa1f0c82188c22591c50be0e4f56f06870ab63b1f692b73d84f61059635b51e,2025-02-10T22:41:22 -CVE-2024-28077,0,0,11861d52f1181341bb4975b159315043797eeb1a5228fdf7968084b7f30c6ead,2024-09-05T18:29:31.127000 +CVE-2024-28077,0,1,ab6e8f4dc04fc1973b120a7e710381163bb4c8657a409fb2b83070ea1d7ab3ff,2025-03-14T14:15:14.653000 CVE-2024-2808,0,0,929e834e70a4305880128a178e107c6fe817020c4a8d1b390bde853ff35341d0,2024-11-21T09:10:34.280000 CVE-2024-28084,0,0,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000 CVE-2024-28085,0,0,e4974c1a5de240996c5adfec977f7c96492d57c62385b43f7fc4461a6ced18fa,2024-11-21T09:05:46.257000 @@ -261441,7 +261441,7 @@ CVE-2024-3672,0,0,1f2bc8d9980c77a412c99b81b7443d8ae5ee623a7dabac082ebd0f43059e4c CVE-2024-36728,0,0,380cfb4273b29250de899eba6de48f37da47c855c2b4aebfc9b64ee7a97eed97,2024-11-21T09:22:33.490000 CVE-2024-36729,0,0,7b56f01fd706c94393e3ef52cabd707db6eb18ad122d9830e54f744b2ce4cf4d,2024-11-21T09:22:33.740000 CVE-2024-3673,0,0,e164828477a784c9fdcdc0e4d6c19b0eec129743b7b338aea79ec63aceab21b6,2024-08-30T19:35:06.567000 -CVE-2024-36730,0,0,4b69860b87e48c4fd0c09c8ad8f2d1fdd9b566df9d29e1075de1335a326d536f,2024-11-21T09:22:33.890000 +CVE-2024-36730,0,1,410c6adcef120338ff5aeddb17dd6610145f63760639617fa266b0b9033b6d59,2025-03-14T14:15:15.717000 CVE-2024-36732,0,0,81ba85fc69d74cc192832ab6f674d87a86f9d3396e165e082d8d918ae0ce6a1a,2024-11-21T09:22:34.047000 CVE-2024-36734,0,0,2eb1d87ac32d1977c1f0b28392038961db03e840d3a5a3b5105eabed99ec9617,2024-11-21T09:22:34.267000 CVE-2024-36735,0,0,56396efacf07dfd6a0ebd5c425ab8343ec5ae3c614843b93884e23ab45d1db24,2024-11-21T09:22:34.490000 @@ -261702,7 +261702,7 @@ CVE-2024-37070,0,0,c022bbfd510d9dfa3803db541238e2871b96a3963a669fa0a3bab8924a1c6 CVE-2024-37071,0,0,a67e9eb57bb911747e859e4f8acbe6d9597b1ffb725d99346231b7b26bb39319,2024-12-07T13:15:04.047000 CVE-2024-37077,0,0,a61753e8a7bc9b974748648e270addba7b9a945731807708a3fa2aad01161089,2024-11-21T09:23:08.803000 CVE-2024-37078,0,0,bd89123a0c458e38196f44b5c84293b821a2198e363b4989eb386f33a6b35386,2024-11-21T09:23:08.943000 -CVE-2024-37079,0,0,0396eb38fa665ef124c0fb54a6022c6d480c394d7bac49ea6f82824c93d63f52,2024-11-21T09:23:09.090000 +CVE-2024-37079,0,1,454c56f1d8b19fcefc03455b77a1e2f219146e569591e4dab0b63586cd5dc651,2025-03-14T14:15:16.010000 CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c50,2024-07-09T15:15:11.623000 CVE-2024-37080,0,0,27109dc64b6442f165a95168ed5bab30b86b8780d9e362bf70ae65c965cecd5f,2025-03-13T15:15:45.353000 CVE-2024-37081,0,0,5f3b3ea879aeb2af37255c2c906f01b45b1cdb7f35a5125d3d7fa22d1134f005,2024-11-21T09:23:09.430000 @@ -264381,7 +264381,7 @@ CVE-2024-40601,0,0,0aa50b76ad7f2dcb34c436272c0e3e3d55010312a8dc26be4224bc6521d6a CVE-2024-40602,0,0,e022549feee86fbc89f8fbf8ce3dfbde01d7ce40ae2524a08d7a96713545e379,2024-11-21T09:31:21.880000 CVE-2024-40603,0,0,a81c494a6cb5759d400143b1949358b6b12494350ee3f34b52eb2bcf3e3c43ce,2024-11-21T09:31:22.047000 CVE-2024-40604,0,0,89973d6255f60ea9c04c5a8c9cf7c9fe4181a5a9a407ba6376432e7802c0d164,2024-11-21T09:31:22.187000 -CVE-2024-40605,0,0,668af7ac19fbaa23c1dd3d26b36943f2f535ffc1f18b0f93a71fc914a662befc,2024-11-21T09:31:22.320000 +CVE-2024-40605,0,1,ec0691a64f01599ac002394a6d8c51c45d9aaf6fc0e3b45509572cac28871ac4,2025-03-14T14:15:16.200000 CVE-2024-4061,0,0,4506e00c38fc7fcea3bfd4a74c8b0712c1883e34e528f694845a597cf23ba99b,2024-11-21T09:42:06.793000 CVE-2024-40614,0,0,7b470bc2eae0c988a1ba65e093b9ba66a6230d3405f5a4a45e19fcc08e4ff159,2024-11-21T17:15:14.190000 CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000 @@ -264515,7 +264515,7 @@ CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde5f0,2024-09-24T14:55:38.737000 -CVE-2024-40771,0,0,81b2ead0067167d8532f832ed90232b1edb8a7d971b8334b76f2b3a7f78f361c,2025-01-16T17:15:11.850000 +CVE-2024-40771,0,1,0232e0d22d195c868e166630b9a5f9c341aaadc94cf92814c65cdf4404457b15,2025-03-14T13:43:48.847000 CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000 CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000 CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000 @@ -264584,7 +264584,7 @@ CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e7 CVE-2024-40836,0,0,f547bde23b2f283281ff845ac25e2bcd425617d92a5f6cef3ab7dfbc5d800bdd,2025-03-13T20:15:21.770000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 -CVE-2024-40839,0,0,f287398273177798e7ccdf3956adcbca35beefd91280639fd10d6bb88b022750,2025-01-16T17:15:12.017000 +CVE-2024-40839,0,1,609233dfc15b706126c9bdee275db0bae9e0311dffcf12f1522f3b8df29014d2,2025-03-14T13:44:22.267000 CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000 CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 @@ -264600,7 +264600,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 -CVE-2024-40854,0,0,e102a7946cb0c2b74cd997e9d5f133a278dc3bd2a82b1b0f442f13402c7a7ade,2025-01-16T17:15:12.163000 +CVE-2024-40854,0,1,e98dab3f3cdbcfc8e79448e579c2cd0ac129ec15112de4872eb183095b123a3a,2025-03-14T13:46:57.020000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000 @@ -267359,7 +267359,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 -CVE-2024-44192,0,0,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000 +CVE-2024-44192,0,1,75b6f810803038485a8963aa8a2da5d201c114054ba6e38dd596e86b7f4c45cb,2025-03-14T13:52:46.090000 CVE-2024-44193,0,0,8c85a5b1d1e4b95c546e1cb6528a307b8abbbd3125eeeb473d768fe58c08684e,2025-03-13T16:15:22.330000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000 @@ -267389,7 +267389,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 -CVE-2024-44227,0,1,3a41cc55db7f8739ca7ae6482d4e8d77329e53e12a98543a68a06a962386c42b,2025-03-14T12:01:21.157000 +CVE-2024-44227,0,0,3a41cc55db7f8739ca7ae6482d4e8d77329e53e12a98543a68a06a962386c42b,2025-03-14T12:01:21.157000 CVE-2024-44228,0,0,7138c1073103562ce3a6d5a1318fa06c6cb2546a4ab71dfe53dca23017a72963,2025-03-13T18:15:43.927000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 @@ -268604,7 +268604,7 @@ CVE-2024-46264,0,0,be06e296b4e59e09e64dbaeda765f7618a669d78bb93ff90d843b411140f4 CVE-2024-46267,0,0,aeae934bd4bbfbeed8faaf8bea421e6ed5b96de7ff47d363e97fe3a805aef3bb,2024-10-04T16:38:16.390000 CVE-2024-4627,0,0,f7b2668735eda41b9d9726bb9fb33ae297df80142bbb24fc9138372b67a25cad,2024-11-21T09:43:14.720000 CVE-2024-46274,0,0,e8c90b6947c4da1392f83bfebd900cbdfed8c637485ec4663a2d105644845394,2024-10-04T16:37:30.007000 -CVE-2024-46276,0,0,5c8b43007df0585eb933909da61b8f47de16d68e8615bc06f0a4e02b0d57d1f0,2024-10-04T16:36:49.997000 +CVE-2024-46276,0,1,7d55d5b3c78e7b1cb07d93cf904b6cdffa90be9a2c801450cf936d1eb8f873b5,2025-03-14T14:15:16.497000 CVE-2024-46278,0,0,4acb28cd7ebc7add3a20d70095d3ee01ce1590ae1dbea75cd2bdc6a0c3af99da,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,ab3566e0063e53ac2e5b5f7c85459fe370bba081cd349a76be524da46e7b1f30,2024-10-04T13:51:25.567000 CVE-2024-4629,0,0,5a5e61d31c256268719f1bf927e70336c70971918c932b03b7c80bdb03a47e35,2024-11-21T09:43:14.917000 @@ -270472,7 +270472,7 @@ CVE-2024-48932,0,0,4707baddab88420938ef2bb0cd3eb05cc529ff733a269664f0fe207cdf5e1 CVE-2024-48933,0,0,28cef5942360039f5257daed5315a8995c76c18244b8ab06d11132f94baae519,2024-10-15T18:56:52.363000 CVE-2024-48936,0,0,0044c13f4bbb6fca81cf2997b573ada4b5726c8f0d5dd13f8b6e3603fd25e0ac,2024-10-30T21:35:10.387000 CVE-2024-48937,0,0,f62cc867d1a0b40545c51955cd1de95d8fcb12c75e3d3bf16a375f9ad464f3a7,2025-03-13T14:15:32.693000 -CVE-2024-48938,0,0,8e7107bb62222319da6c1ecc86d1cd45e021074975112ab549e27240b729f748,2024-10-17T19:49:56.327000 +CVE-2024-48938,0,1,fe8d8cef60ef600de9c1306b034489b0b5a667dccc891a50a189898f3ac6310a,2025-03-14T14:15:16.790000 CVE-2024-48939,0,0,9fd45fdd854de6d1351e4a7a16841cdd4a8b12ab5f31c3c4dfb7ab36c4bdbbeb,2024-11-21T09:41:13.860000 CVE-2024-4894,0,0,08da41b1eb3b39a5ce145f87a7f03263d958bbcc39f79a29e392f05f23c08d28,2024-11-21T09:43:48.647000 CVE-2024-48941,0,0,ac5a4122835fc378fb46e450704764b8fe26775e4f072c0574729413dfa4910e,2024-10-11T21:36:46.327000 @@ -274676,16 +274676,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000 CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000 -CVE-2024-54463,0,1,7dcaa6701c5be296c448f7f2a1f3e839e626326b781459d1a611b1eb21d93eca,2025-03-14T12:00:22.240000 +CVE-2024-54463,0,0,7dcaa6701c5be296c448f7f2a1f3e839e626326b781459d1a611b1eb21d93eca,2025-03-14T12:00:22.240000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 -CVE-2024-54467,0,1,3088c8327c74eab499dab80addd957c5e1231a9995b4c278b1eb041dcd0bd0a1,2025-03-14T11:59:19.543000 +CVE-2024-54467,0,0,3088c8327c74eab499dab80addd957c5e1231a9995b4c278b1eb041dcd0bd0a1,2025-03-14T11:59:19.543000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 -CVE-2024-54469,0,1,4ee093483a2ffd68c6c487da924bbbe74049fc67b5f7b010a17783a060f60e2d,2025-03-14T11:56:31.210000 +CVE-2024-54469,0,0,4ee093483a2ffd68c6c487da924bbbe74049fc67b5f7b010a17783a060f60e2d,2025-03-14T11:56:31.210000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 -CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 +CVE-2024-54470,0,1,a4cdbf5ab0c647b7e4a0c8883037efe16e8b4a75edd339c796e374bc4cab967e,2025-03-14T13:48:19.380000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 -CVE-2024-54473,0,1,7db41089a060e78f0966f38232c142a849ee9a7b8166906275d6c9ea82f3bc3e,2025-03-14T11:55:11.573000 +CVE-2024-54473,0,0,7db41089a060e78f0966f38232c142a849ee9a7b8166906275d6c9ea82f3bc3e,2025-03-14T11:55:11.573000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54475,0,0,0cd7a97f6a5bdf6c5f1dc2dac1b33d81bed5b2cba36df8e6c42e07dbd4eaeb23,2025-03-13T14:15:33.343000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -274707,7 +274707,7 @@ CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d05623 CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000 CVE-2024-54497,0,0,16bfbfe0aec1d7351a65f723e6cd691aeb69b26c677f8ec28ee6cca5def2a89d,2025-02-04T22:15:40.787000 CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 -CVE-2024-54499,0,0,c133d3f15988c5ac34c810762fe5ec20ea83eda4ebf16dbab8404963c417b3f8,2025-01-28T16:15:39.303000 +CVE-2024-54499,0,1,21d10607beec83138f9b430ac88cb93ee8051ee2fbd8c2d0474b7e498630e68c,2025-03-14T13:49:41.167000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000 CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 @@ -274727,7 +274727,7 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000 CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000 -CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 +CVE-2024-54518,0,1,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000 CVE-2024-54519,0,0,ac20715adcd677814b78acbfc807a40b03ca00709ed2017ed1dee8e9d24e2ba5,2025-03-03T22:45:38.540000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54520,0,0,7c9de11c44fff1c811e179df844df8d513ee8b6c64588ba95a8090a4b113d6eb,2025-03-03T22:45:38.540000 @@ -274751,7 +274751,7 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 -CVE-2024-54546,0,1,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000 +CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000 CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 @@ -274759,7 +274759,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 -CVE-2024-54560,0,1,9511cfdaacf00672eafd77240d00bd440f12a816c756aa2ba7e9974225003b17,2025-03-14T11:53:55.893000 +CVE-2024-54560,0,0,9511cfdaacf00672eafd77240d00bd440f12a816c756aa2ba7e9974225003b17,2025-03-14T11:53:55.893000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 @@ -281482,6 +281482,7 @@ CVE-2025-1967,0,0,37ef6ee5daab67cef78e39409d5a4af89028c0c027dc29d14f4d4c29694f8c CVE-2025-1969,0,0,1328a17fcef13e3f7c739c1a0ee8c221ba5eb1bbd63c3ffa42284acc83661832,2025-03-04T19:15:38.290000 CVE-2025-1979,0,0,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000 CVE-2025-1984,0,0,9373bf794f44d23fe13d12c9137d4c6bd91223bb2ee6c64568e72c7410875aee,2025-03-12T16:15:20.963000 +CVE-2025-2000,1,1,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000 CVE-2025-20002,0,0,83af4d7c8d248743227569634040cdf61d921b36110cc72523762157833f7339,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,02e748d5ab9b04e037fb7d7fc747247640974b2f8f897d97b664a1d3813bbc00,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 @@ -282497,7 +282498,7 @@ CVE-2025-22316,0,0,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347 CVE-2025-22317,0,0,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000 CVE-2025-22318,0,0,5368a1418cfba2423af73277ae3342fb96667eca67d105e8830cafc6ce9b8c3c,2025-01-21T14:15:10.110000 CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000 -CVE-2025-2232,1,1,28d143097b05eceb04453a42dc51ca3e3dc579aa7c4bcf7cabe4049e54b21fb3,2025-03-14T12:15:14.887000 +CVE-2025-2232,0,0,28d143097b05eceb04453a42dc51ca3e3dc579aa7c4bcf7cabe4049e54b21fb3,2025-03-14T12:15:14.887000 CVE-2025-22320,0,0,4a18a096a3e3278530b059a94ed0df6bda5c51f5655f0d9ec304e5a12141712d,2025-01-07T11:15:15.910000 CVE-2025-22321,0,0,c3ec78a4d8f363a8d35d3ed77c77053a584db7552a50bacc2a189071deec2efa,2025-01-07T11:15:16.073000 CVE-2025-22322,0,0,5711464cd01fb205e940f0d33538503f520fad7d3447a10a22ef500677509847,2025-01-21T14:15:10.280000 @@ -282696,14 +282697,14 @@ CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff CVE-2025-22622,0,0,0a67f003bf728be4e0886c35c47488ba14ce354a6aa44e3a32da5ad98803d9bf,2025-02-19T04:15:10.550000 CVE-2025-22623,0,0,ceb26a9f660e1cb7e36f5d2a604531760532e5dcac2e29e4972c1239b5f11c97,2025-03-06T05:15:21.790000 CVE-2025-22624,0,0,3150de4f7a54951c23cb3cffadbaece2b77c163f8f3e2c796c2351f5c75a26cc,2025-02-27T19:15:50.940000 -CVE-2025-2263,0,0,50bfcf0570082b4fe0ca6dbbfd573102df5feba6d42bf5ae7866012dac75badf,2025-03-13T17:15:38.617000 +CVE-2025-2263,0,1,74cbe7833bbd1ea9988e049093e8e0d6a238b2303a3f8beaefddbc1301d1af8c,2025-03-14T14:15:19.660000 CVE-2025-22630,0,0,593d04dbe4592bbbd0e67cbe1d1c9339c2fd794f2c49ac1ded1166dba2e072b6,2025-02-14T07:15:32.750000 CVE-2025-22631,0,0,698f5af7c231ca612ef49b5c9557ed0a6275cc603aec3b288e67c713c264419b,2025-02-23T23:15:10.290000 CVE-2025-22632,0,0,a00ccfb79a24fc13a5dc854108dab7b330a127a143f3348ecdc06f096bf01241,2025-02-23T23:15:10.440000 CVE-2025-22633,0,0,02df1f9c4167b5004d9e46deb61bcc6f164b0d8af25621032bfff352c06f6449,2025-02-23T23:15:10.573000 CVE-2025-22635,0,0,09e419c8f16726a5ee91c4fc6dc7331c581a4170004efdf2c30917789f693c93,2025-02-23T23:15:10.720000 CVE-2025-22639,0,0,be7302f0496784c815dda454f246bcda7231f0fd624159bb2f829ea5a8a5cc86,2025-02-18T20:15:26.010000 -CVE-2025-2264,0,0,d39047f56fd0f830c0a19b6a0849067f514e689174b143fccf281df12e10f43e,2025-03-13T17:15:38.787000 +CVE-2025-2264,0,1,72fbd8d0325a5748d5f1950322bdd77f07b6978ffec11868c4ee910b7ad27762,2025-03-14T14:15:19.937000 CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000 CVE-2025-22642,0,0,11c66884fcc0c5b60dea8fd453f90eae4e8d1cdd88bcbd39e4c0551736d3dc74,2025-02-18T19:15:25.350000 CVE-2025-22643,0,0,65c625211e7e886c19d6b17e08b20683447546e65838c862a04bf47449cfe4ca,2025-02-18T19:15:25.483000 @@ -282723,6 +282724,7 @@ CVE-2025-22675,0,0,976876d8bada85ddb7f9b01306108b5dc8490f124ee847cc17386ccf66414 CVE-2025-22676,0,0,f4c77d445e330cc96300170b283a943375cafd2a56102f55d30d95490870d22d,2025-02-16T23:15:10.037000 CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000 CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000 +CVE-2025-2268,1,1,a6a2c356e1b4e8aabc54738554addc2f8396321f1bd4eb229019027042fd44cd,2025-03-14T14:15:20.270000 CVE-2025-22680,0,0,ed52e8da467480ea2ad8b21b38383d42b7fac5c20f0fc461d0c4b7083891f417,2025-02-16T23:15:10.183000 CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000 CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000 @@ -282937,6 +282939,7 @@ CVE-2025-23036,0,0,bed3f9c28ffbd5440bab4c6a23a0f082cff10a365d21d2f24a58721a579c0 CVE-2025-23037,0,0,8ad6abc3c45922b3e5f4b3211d5b3c2d6af0a80fa2d34129cbdbd7b356338082,2025-01-14T01:15:18.717000 CVE-2025-23038,0,0,65d2c74c51e7582cde1953d5316f19cbfa4ea3931a18c9a8aae1940dbd15df48,2025-02-13T19:02:34.650000 CVE-2025-23039,0,0,7fc8622f059047fac19c0c3260e144f1d60b8ffa056e264de94704d62b5a89b4,2025-01-17T21:15:11.560000 +CVE-2025-2304,1,1,7e599424e18d35c2d19606f19037fa0224a10d6c05aa2592c8e3cd655893640e,2025-03-14T13:15:41.160000 CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8c5d,2025-01-15T18:15:24.797000 CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000 CVE-2025-23042,0,0,afc715b4dd34097c6adef37f4433f6aa2747936efa0df044baa0bbe2e7f26ee0,2025-01-14T19:15:44.863000 @@ -284448,7 +284451,7 @@ CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a5 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 CVE-2025-25747,0,0,28e457a2ced1f61595bff7cdc4d6597aa5b94f6478c075d60e5cbe9fcc34164d,2025-03-12T16:15:23.153000 -CVE-2025-25748,0,0,97d86b07efd43cb77c646f6b6a4f2a09dc14c74443bef5bb7225d191b7f2bf21,2025-03-11T18:15:32.810000 +CVE-2025-25748,0,1,3ab336efbc13974bc989a84c6cf6f6e1505ec7aedb8b875635d96e7d8deb8239,2025-03-14T13:15:39.780000 CVE-2025-25749,0,0,2ee440ae003eb53b628305f09af3163dbc7c742efb8a1778db0e910c737ffb6d,2025-03-11T18:15:32.933000 CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 @@ -284699,6 +284702,7 @@ CVE-2025-26620,0,0,67bb16c31832fa279abf82fbaaa24277d7470c8a03c406771fcdd9b2a5168 CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0aa0,2025-02-22T16:15:31.033000 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 +CVE-2025-26626,1,1,9b176d401b56fe835c0cca0d65c7c61ba39504d07fab426189a9fdec5c254a5d,2025-03-14T13:15:40.077000 CVE-2025-26627,0,0,213363a255cf8a5be4e2d9d01c58ab051704c76d0d2fef8faca8fb14c705a0c4,2025-03-11T17:16:38.930000 CVE-2025-26629,0,0,e91c3157209e703be4dd88a0bde2a4dac53e9ad6c98d58e09e22fb296066be2e,2025-03-11T17:16:39.537000 CVE-2025-26630,0,0,4810410c2500666ef354db229b00042787dbf2395a709ae921cb4d057fabeaa1,2025-03-11T17:16:42.820000 @@ -284980,7 +284984,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000 CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000 CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000 -CVE-2025-27363,0,0,5d7226be659cf0a5d75c9183710cee7e9d31f4aae92e2da6b82d7565ed062834,2025-03-14T05:15:42.377000 +CVE-2025-27363,0,1,08072e56ee9e597011ac32560b054cc92417d789a55f2614e2d4d150fd9382ae,2025-03-14T13:15:40.250000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 @@ -285050,6 +285054,9 @@ CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99ba6,2025-03-03T04:15:09.020000 CVE-2025-27591,0,0,f842d266050a347d4ac9c4ea009a6d231e770fabc1767ac93d0528aedc541ea9,2025-03-12T14:15:16.667000 +CVE-2025-27593,1,1,4877932812206a61e9b22a42c4636877513964045a19d35b689f8c32cb8784df,2025-03-14T13:15:40.437000 +CVE-2025-27594,1,1,13aeb4beeef0aa3ac1b1f8c564e332272f73c16bdf19f9a1f3013d893ceeb6a3,2025-03-14T13:15:40.623000 +CVE-2025-27595,1,1,49ee9c5a75167a7bb47ac67cbbbcf85de7d17be528ebb7a12316859d9abb0643,2025-03-14T13:15:40.763000 CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000 CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000 CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000 @@ -285207,6 +285214,10 @@ CVE-2025-28938,0,0,bb686e628ef6e312b49ba678a23c3f02f95c9e58d0a5c6fece2faf8008763 CVE-2025-28940,0,0,ed38f8aafffe9d8e8d4c21ff98f3184dd535cea4b6a7d90b331442eb1950eaa4,2025-03-11T21:15:51.887000 CVE-2025-28941,0,0,bd0484d7ee3fba23d6ad7c462ccd1272ed6f158777e89bea27cfd8fce685afa6,2025-03-11T21:15:52.030000 CVE-2025-28943,0,0,39cd6f2d3f6ecc50e22f0deb639a3eb11e659d07b3ac031ed88186bae7521525,2025-03-11T21:15:52.187000 +CVE-2025-29029,1,1,c4ec6d479a100337c805f809f26e59e285041fae7b057556dedf7be3347e2822,2025-03-14T14:15:17.977000 +CVE-2025-29030,1,1,9e8b8899034d6533111de5661200c826db1b054b71bf6c56fb77dff490edbbd1,2025-03-14T14:15:18.200000 +CVE-2025-29031,1,1,31a124a9d9cfe471be8a68d0aa3f1ef1bec5875babdf32c278c21dec703063f3,2025-03-14T14:15:18.430000 +CVE-2025-29032,1,1,0b6eab7e8f78d0b67802c042eb5a6a44e3fd4c503122d47536d1c3e4c08abc2b,2025-03-14T14:15:18.623000 CVE-2025-29357,0,0,eec581bc6280e760c1fd44b58b6967abd649a1816aebddc11dae361aa11d2d86,2025-03-13T14:15:36.253000 CVE-2025-29358,0,0,c0293e9e568c1618e8022d34fa155184307ba8f56bd1302dd926613aeaad2997,2025-03-13T14:15:36.407000 CVE-2025-29359,0,0,53bd19f51944212438069c3b5cd4d6b4befa8766e9858957731a201787508d1e,2025-03-13T14:15:36.547000 @@ -285216,6 +285227,7 @@ CVE-2025-29362,0,0,900105b323def7a1f6c0afff29b0a54b9fb7571d27e52f7feb5cdc022de2b CVE-2025-29363,0,0,70ea3491d00f7d7dbb9db17a284fac4bf5f0d3786813896c37f4c8a950f7b2af,2025-03-13T14:15:37.103000 CVE-2025-29768,0,0,ef3df5099700449e95b09ddc0e8b15c97f7a8c26be5af35058db2bc386982533,2025-03-13T17:15:37.623000 CVE-2025-29773,0,0,cff55e3cc6a4e7b74369ef072704b1f80dad554a0771c5c1a337d2ebb1763afc,2025-03-13T19:15:52.257000 +CVE-2025-29776,1,1,2bcf19cfe229ac44c33a42ac99a787c07bb1a792d9e30568e2fdaf86395b3131,2025-03-14T14:15:18.847000 CVE-2025-29891,0,0,a78b892f5bcda6cc523f37c0f7c0a917e608075d8e379fc19029783e37a5c34c,2025-03-13T09:15:14.860000 CVE-2025-29903,0,0,5eeb753d6207a33dadf8a1431c4fdae237eb7a54c906717f9d4c165d0dbfdb0c,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,9820bd6a0dd982ed5f05f4335993011de4f806af08b3ad85485f678d69ae0889,2025-03-12T13:15:38.050000