Auto-Update: 2025-03-14T15:00:20.376870+00:00

This commit is contained in:
cad-safe-bot 2025-03-14 15:03:49 +00:00
parent 9228dc0af9
commit 9379836d49
40 changed files with 1919 additions and 138 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-1000814",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-12-20T15:29:00.487",
"lastModified": "2024-11-21T03:40:24.830",
"lastModified": "2025-03-14T14:09:33.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aiohttp-session_project:aiohttp-session:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:aio-libs:aiohttp_session:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.0",
"matchCriteriaId": "DAA6F858-2068-4EF0-8443-8950A201CC76"
"matchCriteriaId": "B2A82886-92F6-4FF8-A71C-4405D2AB5127"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11580",
"sourceIdentifier": "security@atlassian.com",
"published": "2019-06-03T14:29:00.217",
"lastModified": "2025-02-07T13:15:25.597",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T14:54:03.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45842",
"sourceIdentifier": "audit@patchstack.com",
"published": "2022-11-30T13:15:11.080",
"lastModified": "2024-11-21T07:29:49.153",
"lastModified": "2025-03-14T14:54:47.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.6.4",
"matchCriteriaId": "2A7DFB17-9C73-4559-9621-7BCC9BCB3C34"
"matchCriteriaId": "A718499E-7D08-49B8-9C06-86BAA56173AD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4784",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:11.533",
"lastModified": "2024-11-21T07:35:56.170",
"lastModified": "2025-03-14T14:15:12.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4791",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:11.750",
"lastModified": "2024-11-21T07:35:56.977",
"lastModified": "2025-03-14T14:15:12.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4897",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:11.827",
"lastModified": "2024-11-21T07:36:12.110",
"lastModified": "2025-03-14T14:15:13.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2408",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T20:15:09.270",
"lastModified": "2024-11-21T09:09:41.450",
"lastModified": "2025-03-14T14:15:15.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-09T20:15:04.257",
"lastModified": "2024-09-11T15:26:42.500",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T14:15:14.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27856",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:27.483",
"lastModified": "2025-01-16T15:15:13.100",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:42:15.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,34 +81,130 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "D80D1AA1-D37A-4ABD-87A0-2C3B12EDA955"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.8",
"matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.5",
"matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.8",
"matchCriteriaId": "0EDF6AF0-A238-47E5-9A9D-F6FDB832DD8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.5",
"matchCriteriaId": "DEC0ACF3-F486-4536-8415-A176C68CE183"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.5",
"matchCriteriaId": "018F7001-D2CD-4A28-853F-749408A7D1AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.5",
"matchCriteriaId": "CC4B1E01-BE73-48F8-9BD5-32F7C57EB45A"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120896",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120898",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120901",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120902",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120903",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120905",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120906",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28077",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-26T20:15:07.733",
"lastModified": "2024-09-05T18:29:31.127",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T14:15:14.653",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36730",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-06T19:15:57.840",
"lastModified": "2024-11-21T09:22:33.890",
"lastModified": "2025-03-14T14:15:15.717",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-755"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37079",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-18T06:15:11.350",
"lastModified": "2024-11-21T09:23:09.090",
"lastModified": "2025-03-14T14:15:16.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40605",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-07T00:15:10.770",
"lastModified": "2024-11-21T09:31:22.320",
"lastModified": "2025-03-14T14:15:16.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40771",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:27.597",
"lastModified": "2025-01-16T17:15:11.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:43:48.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,38 +81,147 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.8",
"matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.5",
"matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.8",
"matchCriteriaId": "0EDF6AF0-A238-47E5-9A9D-F6FDB832DD8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.5",
"matchCriteriaId": "DEC0ACF3-F486-4536-8415-A176C68CE183"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.6.7",
"matchCriteriaId": "C456020E-3025-4728-9F77-C1E44E6B0EA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7.5",
"matchCriteriaId": "03438F98-D6C4-4CA6-840D-2633E8A88F68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.7",
"matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120898",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120899",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120900",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120901",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120902",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120903",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120905",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/120906",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40839",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:27.700",
"lastModified": "2025-01-16T17:15:12.017",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:44:22.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120905",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40854",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:27.797",
"lastModified": "2025-01-16T17:15:12.163",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:46:57.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,22 +59,101 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.1",
"matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.1",
"matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.1",
"matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.1",
"matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.1",
"matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.1",
"matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121563",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121567",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121568",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121570",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44192",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.080",
"lastModified": "2025-03-11T14:15:22.503",
"vulnStatus": "Received",
"lastModified": "2025-03-14T13:52:46.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,30 +81,102 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.0",
"matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121240",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121241",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121248",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121249",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121250",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46276",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-01T14:15:06.260",
"lastModified": "2024-10-04T16:36:49.997",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T14:15:16.497",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48938",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.387",
"lastModified": "2024-10-17T19:49:56.327",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T14:15:16.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-1333"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54470",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:28.520",
"lastModified": "2025-01-16T17:15:12.433",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:48:19.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.1",
"matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.7.1",
"matchCriteriaId": "F6724AFC-F8BD-4ECA-9FFA-914AFADC58FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121563",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121567",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54499",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:12.680",
"lastModified": "2025-01-28T16:15:39.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:49:41.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,26 +81,93 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2",
"matchCriteriaId": "16F83EAF-2879-4515-BC44-6AE5006D35EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2",
"matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121837",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121839",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121843",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121844",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121845",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54518",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:13.260",
"lastModified": "2025-01-28T15:15:11.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T13:52:08.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +81,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2",
"matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121837",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121839",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121843",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/121844",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory",
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2000",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-14T13:15:40.907",
"lastModified": "2025-03-14T13:15:40.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185949",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2263",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-03-13T17:15:38.617",
"lastModified": "2025-03-13T17:15:38.617",
"lastModified": "2025-03-14T14:15:19.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "During login to the web server in \"Sante PACS Server.exe\", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker."
},
{
"lang": "es",
"value": "Al iniciar sesi\u00f3n en el servidor web en \"Sante PACS Server.exe\", se llama a la funci\u00f3n OpenSSL EVP_DecryptUpdate para descifrar el nombre de usuario y la contrase\u00f1a. Se pasa a la funci\u00f3n un b\u00fafer fijo de pila de 0x80 bytes como b\u00fafer de salida. Se produce un desbordamiento de b\u00fafer de pila si un atacante remoto no autenticado proporciona un nombre de usuario o una contrase\u00f1a cifrados largos."
}
],
"metrics": {
@ -51,6 +55,10 @@
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "vulnreport@tenable.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2264",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-03-13T17:15:38.787",
"lastModified": "2025-03-13T17:15:38.787",
"lastModified": "2025-03-14T14:15:19.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Path Traversal Information Disclosure vulnerability exists in \"Sante PACS Server.exe\". An unauthenticated remote attacker can exploit it to download arbitrary files on the disk drive where the application is installed."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Path Traversal en \"Sante PACS Server.exe\". Un atacante remoto no autenticado puede explotarla para descargar archivos arbitrarios en la unidad de disco donde est\u00e1 instalada la aplicaci\u00f3n."
}
],
"metrics": {
@ -51,6 +55,10 @@
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "vulnreport@tenable.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-2268",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2025-03-14T14:15:20.270",
"lastModified": "2025-03-14T14:15:20.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HP LaserJet MFP M232-M237 Printer Series may be vulnerable to a denial of service attack when a specially crafted request message is sent via Internet Printing Protocol (IPP)."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "hp-security-alert@hp.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "hp-security-alert@hp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-241"
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12114154-12114176-16/hpsbpi04013",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-2304",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-03-14T13:15:41.160",
"lastModified": "2025-03-14T13:15:41.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Privilege Escalation through a Mass Assignment exists in Camaleon CMS\n\nWhen a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit!\u00a0method, which allows all parameters to pass through without any filtering."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-915"
}
]
}
],
"references": [
{
"url": "https://github.com/owen2345/camaleon-cms",
"source": "vulnreport@tenable.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2025-09",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -2,13 +2,24 @@
"id": "CVE-2025-25748",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T18:15:32.810",
"lastModified": "2025-03-11T18:15:32.810",
"vulnStatus": "Received",
"cveTags": [],
"lastModified": "2025-03-14T13:15:39.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens."
"value": "A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token."
},
{
"lang": "es",
"value": "Una vulnerabilidad CSRF en el endpoint gestione_utenti.php de HotelDruid 3.0.7 permite a los atacantes realizar acciones no autorizadas (por ejemplo, modificar las contrase\u00f1as de los usuarios) en nombre de usuarios autenticados explotando la falta de validaci\u00f3n del origen o del referente y la ausencia de tokens CSRF."
}
],
"metrics": {},

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-26626",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-14T13:15:40.077",
"lastModified": "2025-03-14T13:15:40.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GLPI Inventory Plugin handles various types of tasks for GLPI agents for the GLPI asset and IT management software package. Versions prior to 1.5.0 are vulnerable to reflective cross-site scripting, which may lead to executing javascript code. Version 1.5.0 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi-inventory-plugin/blob/1.5.0/CHANGELOG.md#150---2025-02-25",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-8p38-r7vf-j6jx",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27363",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2025-03-11T14:15:25.427",
"lastModified": "2025-03-14T05:15:42.377",
"lastModified": "2025-03-14T13:15:40.250",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -83,6 +83,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/14/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/14/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-27593",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-03-14T13:15:40.437",
"lastModified": "2025-03-14T13:15:40.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"references": [
{
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
"source": "psirt@sick.de"
},
{
"url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html",
"source": "psirt@sick.de"
},
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de"
},
{
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
"source": "psirt@sick.de"
},
{
"url": "https://www.first.org/cvss/calculator/3.1",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf",
"source": "psirt@sick.de"
}
]
}

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-27594",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-03-14T13:15:40.623",
"lastModified": "2025-03-14T13:15:40.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby intercept the authentication hash and use it to log into the device using a pass-the-hash attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
"source": "psirt@sick.de"
},
{
"url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html",
"source": "psirt@sick.de"
},
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de"
},
{
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
"source": "psirt@sick.de"
},
{
"url": "https://www.first.org/cvss/calculator/3.1",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf",
"source": "psirt@sick.de"
}
]
}

View File

@ -0,0 +1,80 @@
{
"id": "CVE-2025-27595",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-03-14T13:15:40.763",
"lastModified": "2025-03-14T13:15:40.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-328"
}
]
}
],
"references": [
{
"url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
"source": "psirt@sick.de"
},
{
"url": "https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html",
"source": "psirt@sick.de"
},
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de"
},
{
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
"source": "psirt@sick.de"
},
{
"url": "https://www.first.org/cvss/calculator/3.1",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json",
"source": "psirt@sick.de"
},
{
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf",
"source": "psirt@sick.de"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29029",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-14T14:15:17.977",
"lastModified": "2025-03-14T14:15:17.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formSetSpeedWan function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WhereisDoujo/CVE/issues/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29030",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-14T14:15:18.200",
"lastModified": "2025-03-14T14:15:18.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WhereisDoujo/CVE/issues/3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29031",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-14T14:15:18.430",
"lastModified": "2025-03-14T14:15:18.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WhereisDoujo/CVE/issues/5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29032",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-14T14:15:18.623",
"lastModified": "2025-03-14T14:15:18.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WhereisDoujo/CVE/issues/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-29776",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-14T14:15:18.847",
"lastModified": "2025-03-14T14:15:18.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azle is a WebAssembly runtime for TypeScript and JavaScript on ICP. Calling `setTimer` in Azle versions `0.27.0`, `0.28.0`, and `0.29.0` causes an immediate infinite loop of timers to be executed on the canister, each timer attempting to clean up the global state of the previous timer. The infinite loop will occur with any valid invocation of `setTimer`. The problem has been fixed as of Azle version `0.30.0`. As a workaround, if a canister is caught in this infinite loop after calling `setTimer`, the canister can be upgraded and the timers will all be cleared, thus ending the loop."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://github.com/demergent-labs/azle/releases/tag/0.30.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/demergent-labs/azle/security/advisories/GHSA-xc76-5pf9-mx8m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-14T13:00:19.765616+00:00
2025-03-14T15:00:20.376870+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-14T12:15:14.887000+00:00
2025-03-14T14:54:47.220000+00:00
```
### Last Data Feed Release
@ -33,31 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
285226
285238
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `12`
- [CVE-2024-12810](CVE-2024/CVE-2024-128xx/CVE-2024-12810.json) (`2025-03-14T12:15:13.483`)
- [CVE-2024-13771](CVE-2024/CVE-2024-137xx/CVE-2024-13771.json) (`2025-03-14T12:15:13.693`)
- [CVE-2024-13772](CVE-2024/CVE-2024-137xx/CVE-2024-13772.json) (`2025-03-14T12:15:13.907`)
- [CVE-2024-13773](CVE-2024/CVE-2024-137xx/CVE-2024-13773.json) (`2025-03-14T12:15:14.100`)
- [CVE-2025-2232](CVE-2025/CVE-2025-22xx/CVE-2025-2232.json) (`2025-03-14T12:15:14.887`)
- [CVE-2025-2000](CVE-2025/CVE-2025-20xx/CVE-2025-2000.json) (`2025-03-14T13:15:40.907`)
- [CVE-2025-2268](CVE-2025/CVE-2025-22xx/CVE-2025-2268.json) (`2025-03-14T14:15:20.270`)
- [CVE-2025-2304](CVE-2025/CVE-2025-23xx/CVE-2025-2304.json) (`2025-03-14T13:15:41.160`)
- [CVE-2025-26626](CVE-2025/CVE-2025-266xx/CVE-2025-26626.json) (`2025-03-14T13:15:40.077`)
- [CVE-2025-27593](CVE-2025/CVE-2025-275xx/CVE-2025-27593.json) (`2025-03-14T13:15:40.437`)
- [CVE-2025-27594](CVE-2025/CVE-2025-275xx/CVE-2025-27594.json) (`2025-03-14T13:15:40.623`)
- [CVE-2025-27595](CVE-2025/CVE-2025-275xx/CVE-2025-27595.json) (`2025-03-14T13:15:40.763`)
- [CVE-2025-29029](CVE-2025/CVE-2025-290xx/CVE-2025-29029.json) (`2025-03-14T14:15:17.977`)
- [CVE-2025-29030](CVE-2025/CVE-2025-290xx/CVE-2025-29030.json) (`2025-03-14T14:15:18.200`)
- [CVE-2025-29031](CVE-2025/CVE-2025-290xx/CVE-2025-29031.json) (`2025-03-14T14:15:18.430`)
- [CVE-2025-29032](CVE-2025/CVE-2025-290xx/CVE-2025-29032.json) (`2025-03-14T14:15:18.623`)
- [CVE-2025-29776](CVE-2025/CVE-2025-297xx/CVE-2025-29776.json) (`2025-03-14T14:15:18.847`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `26`
- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-14T12:01:21.157`)
- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-14T12:00:22.240`)
- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-14T11:59:19.543`)
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-14T11:56:31.210`)
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-14T11:55:11.573`)
- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-14T11:54:22.363`)
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-14T11:53:55.893`)
- [CVE-2019-11580](CVE-2019/CVE-2019-115xx/CVE-2019-11580.json) (`2025-03-14T14:54:03.240`)
- [CVE-2022-45842](CVE-2022/CVE-2022-458xx/CVE-2022-45842.json) (`2025-03-14T14:54:47.220`)
- [CVE-2022-4784](CVE-2022/CVE-2022-47xx/CVE-2022-4784.json) (`2025-03-14T14:15:12.687`)
- [CVE-2022-4791](CVE-2022/CVE-2022-47xx/CVE-2022-4791.json) (`2025-03-14T14:15:12.910`)
- [CVE-2022-4897](CVE-2022/CVE-2022-48xx/CVE-2022-4897.json) (`2025-03-14T14:15:13.110`)
- [CVE-2024-2408](CVE-2024/CVE-2024-24xx/CVE-2024-2408.json) (`2025-03-14T14:15:15.033`)
- [CVE-2024-27367](CVE-2024/CVE-2024-273xx/CVE-2024-27367.json) (`2025-03-14T14:15:14.030`)
- [CVE-2024-27856](CVE-2024/CVE-2024-278xx/CVE-2024-27856.json) (`2025-03-14T13:42:15.337`)
- [CVE-2024-28077](CVE-2024/CVE-2024-280xx/CVE-2024-28077.json) (`2025-03-14T14:15:14.653`)
- [CVE-2024-36730](CVE-2024/CVE-2024-367xx/CVE-2024-36730.json) (`2025-03-14T14:15:15.717`)
- [CVE-2024-37079](CVE-2024/CVE-2024-370xx/CVE-2024-37079.json) (`2025-03-14T14:15:16.010`)
- [CVE-2024-40605](CVE-2024/CVE-2024-406xx/CVE-2024-40605.json) (`2025-03-14T14:15:16.200`)
- [CVE-2024-40771](CVE-2024/CVE-2024-407xx/CVE-2024-40771.json) (`2025-03-14T13:43:48.847`)
- [CVE-2024-40839](CVE-2024/CVE-2024-408xx/CVE-2024-40839.json) (`2025-03-14T13:44:22.267`)
- [CVE-2024-40854](CVE-2024/CVE-2024-408xx/CVE-2024-40854.json) (`2025-03-14T13:46:57.020`)
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-14T13:52:46.090`)
- [CVE-2024-46276](CVE-2024/CVE-2024-462xx/CVE-2024-46276.json) (`2025-03-14T14:15:16.497`)
- [CVE-2024-48938](CVE-2024/CVE-2024-489xx/CVE-2024-48938.json) (`2025-03-14T14:15:16.790`)
- [CVE-2024-54470](CVE-2024/CVE-2024-544xx/CVE-2024-54470.json) (`2025-03-14T13:48:19.380`)
- [CVE-2024-54499](CVE-2024/CVE-2024-544xx/CVE-2024-54499.json) (`2025-03-14T13:49:41.167`)
- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-03-14T13:52:08.567`)
- [CVE-2025-2263](CVE-2025/CVE-2025-22xx/CVE-2025-2263.json) (`2025-03-14T14:15:19.660`)
- [CVE-2025-2264](CVE-2025/CVE-2025-22xx/CVE-2025-2264.json) (`2025-03-14T14:15:19.937`)
- [CVE-2025-25748](CVE-2025/CVE-2025-257xx/CVE-2025-25748.json) (`2025-03-14T13:15:39.780`)
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-14T13:15:40.250`)
## Download and Usage

View File

@ -111127,7 +111127,7 @@ CVE-2018-1000810,0,0,1561a39ec1c3af108d3d547beda1e077fd14815bd148789b9e254a77027
CVE-2018-1000811,0,0,71003252a63fdb2e3f591d8ba8d661849f48eb522524f091b4296395d2b5320a,2024-11-21T03:40:24.397000
CVE-2018-1000812,0,0,aad290d3af05491fb986052986a97ead26ea53c36c831f597be45535b0f69a58,2024-11-21T03:40:24.540000
CVE-2018-1000813,0,0,674f8f52ad46e2224828712c4e09d83b88648a7138460e3941d61f10424c21f9,2024-11-21T03:40:24.687000
CVE-2018-1000814,0,0,f60227908d35ec8c78114f676aa6f64844e7d91cf7d27b4ae027f55e20f1fa9e,2024-11-21T03:40:24.830000
CVE-2018-1000814,0,1,7edee2252928bb8471151b757eb120b2c305b823335846a56bb900defc5d1036,2025-03-14T14:09:33.920000
CVE-2018-1000815,0,0,9db063d9ff8f14965f69ce82e4eba2540fb04501e0ba66835da18b553f10bd28,2024-11-21T03:40:24.970000
CVE-2018-1000816,0,0,f44ec7ef06abab517891c543730e99b0664d621eacea18c6f1801779834eda4e,2024-11-21T03:40:25.107000
CVE-2018-1000817,0,0,6b982f554375b896611e680c21b341ce21a478fb1104500f05a910b7b7458cdc,2024-11-21T03:40:25.240000
@ -129911,7 +129911,7 @@ CVE-2019-11577,0,0,dbb685d8f922c68e8547ddf9f5dce339b3efd8b9dee72da3661cd1bf18ed6
CVE-2019-11578,0,0,0a75bc8151e818ec28cae7a6f538ec494bfce33c3ab0e6e11f591e17f0989a62,2024-11-21T04:21:22.557000
CVE-2019-11579,0,0,33075687fd6734a6ff5d11c0803ac30599facf79016f7db45596a2372faa141c,2024-11-21T04:21:22.717000
CVE-2019-1158,0,0,c3288b3c3067898f6d6006b543465fedb42d0d28bee888d1500c5b22c2744104,2024-11-21T04:36:08.610000
CVE-2019-11580,0,0,ed9b3477b885002f5c47116a7de008bfe3d818702ac2d0404b911698b8099067,2025-02-07T13:15:25.597000
CVE-2019-11580,0,1,15204b7f70a973e26b51c1d507de77bfb7f386e6d39871c557e1b12e1f3a8f1c,2025-03-14T14:54:03.240000
CVE-2019-11581,0,0,fbb63fc575ffe8cb6b5e0d897aa8c8722e62d427706e072c883fb05ebc8bbfde,2025-02-07T13:15:25.787000
CVE-2019-11582,0,0,77284a3f2517a4292175b24f8c83e645d56569d0331d0c57d78e8a319af73c14,2024-11-21T04:21:23.097000
CVE-2019-11583,0,0,c7ce56caba0b1dfec1d2b23f306031f78022e4173a321beeb3e8a3a1ff77327d,2024-11-21T04:21:23.207000
@ -210830,7 +210830,7 @@ CVE-2022-45839,0,0,46dd0fbbf9d33fee043ddb9f285f269c5c63c1bbc8e26cb4ab76aa00d7976
CVE-2022-4584,0,0,2d76b8fefb623252355fa876fafa69317df9ed31f1c5f8ac5434ee5f45314d75,2024-11-21T07:35:32.467000
CVE-2022-45840,0,0,eba7fb67898b5e781a4f29b887dadf16dcd3c1f909803e4c621a9e93b8c62770,2024-12-13T15:15:08.447000
CVE-2022-45841,0,0,2ee89cafc712957a2af9331a83f3b25ba4f41a5772b96bbbc391b45c1ef6abbd,2024-12-13T15:15:08.620000
CVE-2022-45842,0,0,332458f38615c702e47544c91b4b065a6cfbfa7bc3e9620ce89a57a06739ebe9,2024-11-21T07:29:49.153000
CVE-2022-45842,0,1,8097e616128de4d8a8ca77bdbea1c78c3397096a1aaacd1d72c0d8f29d2d6dac,2025-03-14T14:54:47.220000
CVE-2022-45843,0,0,2cb89896f8f3c5270729415dc61fda6447d9a1727d04a0f7c4405056bd1573bf,2024-11-21T07:29:49.287000
CVE-2022-45845,0,0,56fc9ef41f9d8e47cfa8423f747c550182326e401ee07f66d1fe1d5e61f03f9b,2024-11-21T07:29:49.413000
CVE-2022-45846,0,0,ac719a1fcee4199d98cb859a4026b148fcfed4a5bff33daed2dea1bd3644ef6a,2024-11-21T07:29:49.540000
@ -212179,7 +212179,7 @@ CVE-2022-4780,0,0,bed8d708be2ffb03beca68d4775c7199631650ec8f0a6625bf571cd99ea3e7
CVE-2022-4781,0,0,efb017d1b3dc6ea17e2dc1a077185cb0e06bc920cc2d8a36435a226df5ddb164,2024-11-21T07:35:55.837000
CVE-2022-4782,0,0,d86e170eabe03386a135c89e7275e0a127c322e6ba07c3e30f2f6123bbe19f76,2024-11-21T07:35:55.940000
CVE-2022-4783,0,0,0c3287070cfa467531f3e63e450e1c60247ee7b1148d1c1526c6700e19bf36e9,2024-11-21T07:35:56.060000
CVE-2022-4784,0,0,394fae29374e0bcb0f865c8a3b612c1a2757821b7710cb72a1654ea406fa230e,2024-11-21T07:35:56.170000
CVE-2022-4784,0,1,71b057faaeeae94ceb446adbeeed78f94c564a1dace10f0747ffb6cc5bd193d5,2025-03-14T14:15:12.687000
CVE-2022-47848,0,0,37d91542a280217dc4dae0e99433b2fe5ff92e7a9bd5344829bebfce3526c7ed,2024-11-21T07:32:24.743000
CVE-2022-4785,0,0,0a756f44e89d54a16d92a6dfcd81338dfb6f117d0b917bce0ac6f639315e1aed,2024-11-21T07:35:56.280000
CVE-2022-47853,0,0,a5adce8f8f4bcc6956d04550b4f1086084ba68e50eb6284325311b80fcf47f43,2024-11-21T07:32:24.897000
@ -212215,7 +212215,7 @@ CVE-2022-47896,0,0,0962dff4a1558f617e8a450129033216694d634bb163178a870d841b6a4ab
CVE-2022-4790,0,0,6e71affec51e6410983c2ee92588f220b274fd269cfaf5c39b50da77b3da0f47,2024-11-21T07:35:56.863000
CVE-2022-47908,0,0,af2d1021d43666295e563d722c79fafafac45c67901e19a610e7df5a60fa2794,2024-11-21T07:32:30.883000
CVE-2022-47909,0,0,62b228b53821463d9a8ba3f951b088e938993df2e739e56acbd55f6db39798e7,2024-11-21T07:32:31.063000
CVE-2022-4791,0,0,77d6e6ae5066b2b9e6489e9e05cfc3e16b34d02a9636e0a2accd271ec35d0793,2024-11-21T07:35:56.977000
CVE-2022-4791,0,1,88b9947b01451fd3199741332dd29f64d60311438560ac69ed2ca7cc399201a8,2025-03-14T14:15:12.910000
CVE-2022-47911,0,0,5a5c6b2be806b95cc36a7c96c07829d5157384b8f475ad1624f858bb54bf06f2,2024-11-21T07:32:31.320000
CVE-2022-47915,0,0,a5f9213bbcf2bb98ed3dfe4d8654563d17cbaa172bedda24b64a3b730184be14,2024-11-21T07:32:31.490000
CVE-2022-47917,0,0,f2ceac1005866817845123385e6cff4a40de626e8a479202d8911ed95836d056,2024-11-21T07:32:31.657000
@ -213086,7 +213086,7 @@ CVE-2022-48966,0,0,a55046fc510a2667674a549f2c8ca198a860c6a600c36d18d0719dc2f1f81
CVE-2022-48967,0,0,868e48e70cb82d6daf4b94f232b4d85ccadc3352ce74c9d2abfad614383a08c3,2024-10-25T21:27:46.017000
CVE-2022-48968,0,0,1ec8726ffc62911818c7891ca4d8e758c2d3067df57f5952aba847318cd24338,2024-10-25T21:26:01.523000
CVE-2022-48969,0,0,910346d7621597f6bb6fe6fcea28dabaf6a52085b9e63e83acb1c76a45c6db19,2024-10-25T21:22:10.087000
CVE-2022-4897,0,0,425da488deddc8222988522af4337edfa63cde567e932f9694105521c9a8d120,2024-11-21T07:36:12.110000
CVE-2022-4897,0,1,a91bd3c037b39995fc112ca971e1473f803132355ab78c97278290203f1865c9,2025-03-14T14:15:13.110000
CVE-2022-48970,0,0,11f8a61146592ef5ee3cd5b7c75f0f8ff32cd9bd9ceb482c39017de346065945,2024-10-25T15:24:22.060000
CVE-2022-48971,0,0,80f97ff999e7b7879b29e227daebb7895f5ef3d5dba477cd326bffb787338212,2024-10-25T15:23:38.807000
CVE-2022-48972,0,0,31c25bbaadba1ca8a8d70b70cef209b7007de45ef8b59f044533ed4fb0d75801,2024-10-25T15:22:33.897000
@ -246864,7 +246864,7 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000
CVE-2024-12809,0,0,314a9a253eaae4362d4a78cca74afbfdb258ff23c3edc47ccba96245196d2d9c,2025-03-07T07:15:21.380000
CVE-2024-12810,1,1,3ddb2540f9d4b384560866e66c8f0d1696ffca947782b320a7cc3c4568aa2afd,2025-03-14T12:15:13.483000
CVE-2024-12810,0,0,3ddb2540f9d4b384560866e66c8f0d1696ffca947782b320a7cc3c4568aa2afd,2025-03-14T12:15:13.483000
CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
@ -247773,9 +247773,9 @@ CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15de
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
CVE-2024-13771,1,1,0329be1eb23ed6a4a01effac73839e1b4cd70516d30c97ddc850d119d63c1cb1,2025-03-14T12:15:13.693000
CVE-2024-13772,1,1,8aa1d58d8df083611965325d4056997a1a74e3b5c7ec55d91eca1ff1d36213b6,2025-03-14T12:15:13.907000
CVE-2024-13773,1,1,d7022ad9ff4786c11c3ccedfd649addbd228e68d9f171a83917d5cbcd5741b6a,2025-03-14T12:15:14.100000
CVE-2024-13771,0,0,0329be1eb23ed6a4a01effac73839e1b4cd70516d30c97ddc850d119d63c1cb1,2025-03-14T12:15:13.693000
CVE-2024-13772,0,0,8aa1d58d8df083611965325d4056997a1a74e3b5c7ec55d91eca1ff1d36213b6,2025-03-14T12:15:13.907000
CVE-2024-13773,0,0,d7022ad9ff4786c11c3ccedfd649addbd228e68d9f171a83917d5cbcd5741b6a,2025-03-14T12:15:14.100000
CVE-2024-13774,0,0,79f4d1a7ea114db5ba731a9177efda59b5bdf0f997e09eca02aae430d9de0e14,2025-03-12T17:01:06.413000
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
CVE-2024-13777,0,0,b33d8c64d6edba912fc043a3b3033deac93a29824073f84ccb4027b47d8f33ea,2025-03-05T10:15:15.367000
@ -251840,7 +251840,7 @@ CVE-2024-2406,0,0,c9b679e86de726ed280bae6f96533f4aea7f8098b4506ff442be791301afa2
CVE-2024-24060,0,0,76420c08875743804b95d33c1b8e327e25e9a56c748b2569fe6e9e74860b3f4b,2024-11-21T08:58:53.127000
CVE-2024-24061,0,0,b44f4520c297437d45fb26f88d26245a5b6e5157f6d3a6fede608839ca3e86f0,2024-11-21T08:58:53.283000
CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d0681eb,2024-11-21T08:58:53.443000
CVE-2024-2408,0,0,a9a44685e12fb751abb365dcea513da0e8982589d7eaa294b433e4d0136753aa,2024-11-21T09:09:41.450000
CVE-2024-2408,0,1,cbbe9dcbe0868e1c9bf8912d7a6c3e914b1567e378ed42481c9fc943be2160f8,2025-03-14T14:15:15.033000
CVE-2024-2409,0,0,77d5c2883cdd5dbd6edc65df7d11494763b07409c810ab6debf5b40e86f36c09,2025-02-13T17:00:33.790000
CVE-2024-24091,0,0,ab544d8586eff97d50440c6aee00588f4dadfd440f573585f5d79c9b1b92e18e,2024-11-21T08:58:53.610000
CVE-2024-24092,0,0,42612e9d4b67369b95e4f784bad7b4f3ce9b376ecaf3980484ef440bfbfb510d,2024-11-21T08:58:53.847000
@ -254379,7 +254379,7 @@ CVE-2024-27363,0,0,000816135a5e0d34cea85b831dc31727f98550e96055ef57f0a1c37b792f2
CVE-2024-27364,0,0,2b38d7b61761eb8fae8574705214eff11f6fa32157870ade9ec7bb3c14e790a7,2024-09-11T15:27:12.647000
CVE-2024-27365,0,0,0aa36bbf9560a6ce3119769b43a38169e12136e167f318d9e696a92d74b03e2a,2024-09-20T13:09:31.330000
CVE-2024-27366,0,0,ef4066a391748c88dd2216d490b3c5320549be309784c64e177a3f247a3df45d,2024-09-11T15:26:58.437000
CVE-2024-27367,0,0,738ef53203f8a3a6335d17e4a9b28c46934bfa0ba0afe1bbb4331789ec90668a,2024-09-11T15:26:42.500000
CVE-2024-27367,0,1,ae0b0e72a707b362deaa42e018646312dd2f08c4028de63f448182d571d3fd72,2025-03-14T14:15:14.030000
CVE-2024-27368,0,0,928f1a854962ee09bc633561fd87e7f327f3d44aa8093cd055d60b1208b73696,2024-09-11T15:25:46.313000
CVE-2024-27370,0,0,104839b7ea71df41ce964ae5ea348695a6885be53f474b2b7689d1985d85623f,2024-11-21T09:04:27.190000
CVE-2024-27371,0,0,68cc0a73a21ff87eaa835039b271e039611470f87c19580d744665b4c4de5e5f,2024-11-21T09:04:27.380000
@ -254703,7 +254703,7 @@ CVE-2024-27851,0,0,c3b97ee6b26dfbc0c56d39614137e38659ab1609757d63181c34ff60a311c
CVE-2024-27852,0,0,21baed505dd28c7a0b77d3ba061072e5a4859b987a8b1d420f9b79d60ef54041,2024-12-09T19:40:07.710000
CVE-2024-27853,0,0,72a1ed6ec4d0895fb804921668bc2bff946add21527d9bb528b8f3dbbcdca964,2024-11-21T09:05:17.167000
CVE-2024-27855,0,0,9498904c1aaf88554f96d0182eda5cb5f555562d50e2e20fa99548d2f5e715fc,2025-03-13T14:15:24.497000
CVE-2024-27856,0,0,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000
CVE-2024-27856,0,1,b680ab5b88acd7c43ef11744d6b525d37df824faeef9c5b709df98aed5688604,2025-03-14T13:42:15.337000
CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000
CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000
CVE-2024-27859,0,0,a7656a9ee29e09d9d6dd0ed0138e7403302c55b95156638f98095c6c05798bbf,2025-03-03T16:52:20.953000
@ -254917,7 +254917,7 @@ CVE-2024-28073,0,0,9e93116ea0a1164669b0a89f103bcb752560d58559173a183331a8d5e18ea
CVE-2024-28074,0,0,9feb0c642dc45516453e6ef213c4c3411bb4332780935cb6eb8ecb254629299d,2024-11-21T09:05:45.503000
CVE-2024-28075,0,0,e758609c069f3752455c5ed3d122f3925b13bc8518a96806272df66059449b5a,2025-02-10T22:49:58.503000
CVE-2024-28076,0,0,cfa1f0c82188c22591c50be0e4f56f06870ab63b1f692b73d84f61059635b51e,2025-02-10T22:41:22
CVE-2024-28077,0,0,11861d52f1181341bb4975b159315043797eeb1a5228fdf7968084b7f30c6ead,2024-09-05T18:29:31.127000
CVE-2024-28077,0,1,ab6e8f4dc04fc1973b120a7e710381163bb4c8657a409fb2b83070ea1d7ab3ff,2025-03-14T14:15:14.653000
CVE-2024-2808,0,0,929e834e70a4305880128a178e107c6fe817020c4a8d1b390bde853ff35341d0,2024-11-21T09:10:34.280000
CVE-2024-28084,0,0,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000
CVE-2024-28085,0,0,e4974c1a5de240996c5adfec977f7c96492d57c62385b43f7fc4461a6ced18fa,2024-11-21T09:05:46.257000
@ -261441,7 +261441,7 @@ CVE-2024-3672,0,0,1f2bc8d9980c77a412c99b81b7443d8ae5ee623a7dabac082ebd0f43059e4c
CVE-2024-36728,0,0,380cfb4273b29250de899eba6de48f37da47c855c2b4aebfc9b64ee7a97eed97,2024-11-21T09:22:33.490000
CVE-2024-36729,0,0,7b56f01fd706c94393e3ef52cabd707db6eb18ad122d9830e54f744b2ce4cf4d,2024-11-21T09:22:33.740000
CVE-2024-3673,0,0,e164828477a784c9fdcdc0e4d6c19b0eec129743b7b338aea79ec63aceab21b6,2024-08-30T19:35:06.567000
CVE-2024-36730,0,0,4b69860b87e48c4fd0c09c8ad8f2d1fdd9b566df9d29e1075de1335a326d536f,2024-11-21T09:22:33.890000
CVE-2024-36730,0,1,410c6adcef120338ff5aeddb17dd6610145f63760639617fa266b0b9033b6d59,2025-03-14T14:15:15.717000
CVE-2024-36732,0,0,81ba85fc69d74cc192832ab6f674d87a86f9d3396e165e082d8d918ae0ce6a1a,2024-11-21T09:22:34.047000
CVE-2024-36734,0,0,2eb1d87ac32d1977c1f0b28392038961db03e840d3a5a3b5105eabed99ec9617,2024-11-21T09:22:34.267000
CVE-2024-36735,0,0,56396efacf07dfd6a0ebd5c425ab8343ec5ae3c614843b93884e23ab45d1db24,2024-11-21T09:22:34.490000
@ -261702,7 +261702,7 @@ CVE-2024-37070,0,0,c022bbfd510d9dfa3803db541238e2871b96a3963a669fa0a3bab8924a1c6
CVE-2024-37071,0,0,a67e9eb57bb911747e859e4f8acbe6d9597b1ffb725d99346231b7b26bb39319,2024-12-07T13:15:04.047000
CVE-2024-37077,0,0,a61753e8a7bc9b974748648e270addba7b9a945731807708a3fa2aad01161089,2024-11-21T09:23:08.803000
CVE-2024-37078,0,0,bd89123a0c458e38196f44b5c84293b821a2198e363b4989eb386f33a6b35386,2024-11-21T09:23:08.943000
CVE-2024-37079,0,0,0396eb38fa665ef124c0fb54a6022c6d480c394d7bac49ea6f82824c93d63f52,2024-11-21T09:23:09.090000
CVE-2024-37079,0,1,454c56f1d8b19fcefc03455b77a1e2f219146e569591e4dab0b63586cd5dc651,2025-03-14T14:15:16.010000
CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c50,2024-07-09T15:15:11.623000
CVE-2024-37080,0,0,27109dc64b6442f165a95168ed5bab30b86b8780d9e362bf70ae65c965cecd5f,2025-03-13T15:15:45.353000
CVE-2024-37081,0,0,5f3b3ea879aeb2af37255c2c906f01b45b1cdb7f35a5125d3d7fa22d1134f005,2024-11-21T09:23:09.430000
@ -264381,7 +264381,7 @@ CVE-2024-40601,0,0,0aa50b76ad7f2dcb34c436272c0e3e3d55010312a8dc26be4224bc6521d6a
CVE-2024-40602,0,0,e022549feee86fbc89f8fbf8ce3dfbde01d7ce40ae2524a08d7a96713545e379,2024-11-21T09:31:21.880000
CVE-2024-40603,0,0,a81c494a6cb5759d400143b1949358b6b12494350ee3f34b52eb2bcf3e3c43ce,2024-11-21T09:31:22.047000
CVE-2024-40604,0,0,89973d6255f60ea9c04c5a8c9cf7c9fe4181a5a9a407ba6376432e7802c0d164,2024-11-21T09:31:22.187000
CVE-2024-40605,0,0,668af7ac19fbaa23c1dd3d26b36943f2f535ffc1f18b0f93a71fc914a662befc,2024-11-21T09:31:22.320000
CVE-2024-40605,0,1,ec0691a64f01599ac002394a6d8c51c45d9aaf6fc0e3b45509572cac28871ac4,2025-03-14T14:15:16.200000
CVE-2024-4061,0,0,4506e00c38fc7fcea3bfd4a74c8b0712c1883e34e528f694845a597cf23ba99b,2024-11-21T09:42:06.793000
CVE-2024-40614,0,0,7b470bc2eae0c988a1ba65e093b9ba66a6230d3405f5a4a45e19fcc08e4ff159,2024-11-21T17:15:14.190000
CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000
@ -264515,7 +264515,7 @@ CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a
CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000
CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000
CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde5f0,2024-09-24T14:55:38.737000
CVE-2024-40771,0,0,81b2ead0067167d8532f832ed90232b1edb8a7d971b8334b76f2b3a7f78f361c,2025-01-16T17:15:11.850000
CVE-2024-40771,0,1,0232e0d22d195c868e166630b9a5f9c341aaadc94cf92814c65cdf4404457b15,2025-03-14T13:43:48.847000
CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000
CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000
CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000
@ -264584,7 +264584,7 @@ CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e7
CVE-2024-40836,0,0,f547bde23b2f283281ff845ac25e2bcd425617d92a5f6cef3ab7dfbc5d800bdd,2025-03-13T20:15:21.770000
CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000
CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000
CVE-2024-40839,0,0,f287398273177798e7ccdf3956adcbca35beefd91280639fd10d6bb88b022750,2025-01-16T17:15:12.017000
CVE-2024-40839,0,1,609233dfc15b706126c9bdee275db0bae9e0311dffcf12f1522f3b8df29014d2,2025-03-14T13:44:22.267000
CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000
CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000
CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000
@ -264600,7 +264600,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
CVE-2024-40854,0,0,e102a7946cb0c2b74cd997e9d5f133a278dc3bd2a82b1b0f442f13402c7a7ade,2025-01-16T17:15:12.163000
CVE-2024-40854,0,1,e98dab3f3cdbcfc8e79448e579c2cd0ac129ec15112de4872eb183095b123a3a,2025-03-14T13:46:57.020000
CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000
CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000
CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000
@ -267359,7 +267359,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44192,0,0,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
CVE-2024-44192,0,1,75b6f810803038485a8963aa8a2da5d201c114054ba6e38dd596e86b7f4c45cb,2025-03-14T13:52:46.090000
CVE-2024-44193,0,0,8c85a5b1d1e4b95c546e1cb6528a307b8abbbd3125eeeb473d768fe58c08684e,2025-03-13T16:15:22.330000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
@ -267389,7 +267389,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370
CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000
CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000
CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000
CVE-2024-44227,0,1,3a41cc55db7f8739ca7ae6482d4e8d77329e53e12a98543a68a06a962386c42b,2025-03-14T12:01:21.157000
CVE-2024-44227,0,0,3a41cc55db7f8739ca7ae6482d4e8d77329e53e12a98543a68a06a962386c42b,2025-03-14T12:01:21.157000
CVE-2024-44228,0,0,7138c1073103562ce3a6d5a1318fa06c6cb2546a4ab71dfe53dca23017a72963,2025-03-13T18:15:43.927000
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
@ -268604,7 +268604,7 @@ CVE-2024-46264,0,0,be06e296b4e59e09e64dbaeda765f7618a669d78bb93ff90d843b411140f4
CVE-2024-46267,0,0,aeae934bd4bbfbeed8faaf8bea421e6ed5b96de7ff47d363e97fe3a805aef3bb,2024-10-04T16:38:16.390000
CVE-2024-4627,0,0,f7b2668735eda41b9d9726bb9fb33ae297df80142bbb24fc9138372b67a25cad,2024-11-21T09:43:14.720000
CVE-2024-46274,0,0,e8c90b6947c4da1392f83bfebd900cbdfed8c637485ec4663a2d105644845394,2024-10-04T16:37:30.007000
CVE-2024-46276,0,0,5c8b43007df0585eb933909da61b8f47de16d68e8615bc06f0a4e02b0d57d1f0,2024-10-04T16:36:49.997000
CVE-2024-46276,0,1,7d55d5b3c78e7b1cb07d93cf904b6cdffa90be9a2c801450cf936d1eb8f873b5,2025-03-14T14:15:16.497000
CVE-2024-46278,0,0,4acb28cd7ebc7add3a20d70095d3ee01ce1590ae1dbea75cd2bdc6a0c3af99da,2024-10-07T20:35:10.653000
CVE-2024-46280,0,0,ab3566e0063e53ac2e5b5f7c85459fe370bba081cd349a76be524da46e7b1f30,2024-10-04T13:51:25.567000
CVE-2024-4629,0,0,5a5e61d31c256268719f1bf927e70336c70971918c932b03b7c80bdb03a47e35,2024-11-21T09:43:14.917000
@ -270472,7 +270472,7 @@ CVE-2024-48932,0,0,4707baddab88420938ef2bb0cd3eb05cc529ff733a269664f0fe207cdf5e1
CVE-2024-48933,0,0,28cef5942360039f5257daed5315a8995c76c18244b8ab06d11132f94baae519,2024-10-15T18:56:52.363000
CVE-2024-48936,0,0,0044c13f4bbb6fca81cf2997b573ada4b5726c8f0d5dd13f8b6e3603fd25e0ac,2024-10-30T21:35:10.387000
CVE-2024-48937,0,0,f62cc867d1a0b40545c51955cd1de95d8fcb12c75e3d3bf16a375f9ad464f3a7,2025-03-13T14:15:32.693000
CVE-2024-48938,0,0,8e7107bb62222319da6c1ecc86d1cd45e021074975112ab549e27240b729f748,2024-10-17T19:49:56.327000
CVE-2024-48938,0,1,fe8d8cef60ef600de9c1306b034489b0b5a667dccc891a50a189898f3ac6310a,2025-03-14T14:15:16.790000
CVE-2024-48939,0,0,9fd45fdd854de6d1351e4a7a16841cdd4a8b12ab5f31c3c4dfb7ab36c4bdbbeb,2024-11-21T09:41:13.860000
CVE-2024-4894,0,0,08da41b1eb3b39a5ce145f87a7f03263d958bbcc39f79a29e392f05f23c08d28,2024-11-21T09:43:48.647000
CVE-2024-48941,0,0,ac5a4122835fc378fb46e450704764b8fe26775e4f072c0574729413dfa4910e,2024-10-11T21:36:46.327000
@ -274676,16 +274676,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be
CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000
CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000
CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000
CVE-2024-54463,0,1,7dcaa6701c5be296c448f7f2a1f3e839e626326b781459d1a611b1eb21d93eca,2025-03-14T12:00:22.240000
CVE-2024-54463,0,0,7dcaa6701c5be296c448f7f2a1f3e839e626326b781459d1a611b1eb21d93eca,2025-03-14T12:00:22.240000
CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
CVE-2024-54467,0,1,3088c8327c74eab499dab80addd957c5e1231a9995b4c278b1eb041dcd0bd0a1,2025-03-14T11:59:19.543000
CVE-2024-54467,0,0,3088c8327c74eab499dab80addd957c5e1231a9995b4c278b1eb041dcd0bd0a1,2025-03-14T11:59:19.543000
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
CVE-2024-54469,0,1,4ee093483a2ffd68c6c487da924bbbe74049fc67b5f7b010a17783a060f60e2d,2025-03-14T11:56:31.210000
CVE-2024-54469,0,0,4ee093483a2ffd68c6c487da924bbbe74049fc67b5f7b010a17783a060f60e2d,2025-03-14T11:56:31.210000
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54470,0,1,a4cdbf5ab0c647b7e4a0c8883037efe16e8b4a75edd339c796e374bc4cab967e,2025-03-14T13:48:19.380000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54473,0,1,7db41089a060e78f0966f38232c142a849ee9a7b8166906275d6c9ea82f3bc3e,2025-03-14T11:55:11.573000
CVE-2024-54473,0,0,7db41089a060e78f0966f38232c142a849ee9a7b8166906275d6c9ea82f3bc3e,2025-03-14T11:55:11.573000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,0cd7a97f6a5bdf6c5f1dc2dac1b33d81bed5b2cba36df8e6c42e07dbd4eaeb23,2025-03-13T14:15:33.343000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
@ -274707,7 +274707,7 @@ CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d05623
CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000
CVE-2024-54497,0,0,16bfbfe0aec1d7351a65f723e6cd691aeb69b26c677f8ec28ee6cca5def2a89d,2025-02-04T22:15:40.787000
CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000
CVE-2024-54499,0,0,c133d3f15988c5ac34c810762fe5ec20ea83eda4ebf16dbab8404963c417b3f8,2025-01-28T16:15:39.303000
CVE-2024-54499,0,1,21d10607beec83138f9b430ac88cb93ee8051ee2fbd8c2d0474b7e498630e68c,2025-03-14T13:49:41.167000
CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000
CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000
CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000
@ -274727,7 +274727,7 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000
CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000
CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
CVE-2024-54518,0,1,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000
CVE-2024-54519,0,0,ac20715adcd677814b78acbfc807a40b03ca00709ed2017ed1dee8e9d24e2ba5,2025-03-03T22:45:38.540000
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
CVE-2024-54520,0,0,7c9de11c44fff1c811e179df844df8d513ee8b6c64588ba95a8090a4b113d6eb,2025-03-03T22:45:38.540000
@ -274751,7 +274751,7 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31
CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000
CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000
CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000
CVE-2024-54546,0,1,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000
CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000
CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000
CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
@ -274759,7 +274759,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-54560,0,1,9511cfdaacf00672eafd77240d00bd440f12a816c756aa2ba7e9974225003b17,2025-03-14T11:53:55.893000
CVE-2024-54560,0,0,9511cfdaacf00672eafd77240d00bd440f12a816c756aa2ba7e9974225003b17,2025-03-14T11:53:55.893000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
@ -281482,6 +281482,7 @@ CVE-2025-1967,0,0,37ef6ee5daab67cef78e39409d5a4af89028c0c027dc29d14f4d4c29694f8c
CVE-2025-1969,0,0,1328a17fcef13e3f7c739c1a0ee8c221ba5eb1bbd63c3ffa42284acc83661832,2025-03-04T19:15:38.290000
CVE-2025-1979,0,0,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000
CVE-2025-1984,0,0,9373bf794f44d23fe13d12c9137d4c6bd91223bb2ee6c64568e72c7410875aee,2025-03-12T16:15:20.963000
CVE-2025-2000,1,1,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000
CVE-2025-20002,0,0,83af4d7c8d248743227569634040cdf61d921b36110cc72523762157833f7339,2025-03-05T00:15:37.910000
CVE-2025-20011,0,0,02e748d5ab9b04e037fb7d7fc747247640974b2f8f897d97b664a1d3813bbc00,2025-03-04T04:15:12.563000
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
@ -282497,7 +282498,7 @@ CVE-2025-22316,0,0,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347
CVE-2025-22317,0,0,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000
CVE-2025-22318,0,0,5368a1418cfba2423af73277ae3342fb96667eca67d105e8830cafc6ce9b8c3c,2025-01-21T14:15:10.110000
CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000
CVE-2025-2232,1,1,28d143097b05eceb04453a42dc51ca3e3dc579aa7c4bcf7cabe4049e54b21fb3,2025-03-14T12:15:14.887000
CVE-2025-2232,0,0,28d143097b05eceb04453a42dc51ca3e3dc579aa7c4bcf7cabe4049e54b21fb3,2025-03-14T12:15:14.887000
CVE-2025-22320,0,0,4a18a096a3e3278530b059a94ed0df6bda5c51f5655f0d9ec304e5a12141712d,2025-01-07T11:15:15.910000
CVE-2025-22321,0,0,c3ec78a4d8f363a8d35d3ed77c77053a584db7552a50bacc2a189071deec2efa,2025-01-07T11:15:16.073000
CVE-2025-22322,0,0,5711464cd01fb205e940f0d33538503f520fad7d3447a10a22ef500677509847,2025-01-21T14:15:10.280000
@ -282696,14 +282697,14 @@ CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff
CVE-2025-22622,0,0,0a67f003bf728be4e0886c35c47488ba14ce354a6aa44e3a32da5ad98803d9bf,2025-02-19T04:15:10.550000
CVE-2025-22623,0,0,ceb26a9f660e1cb7e36f5d2a604531760532e5dcac2e29e4972c1239b5f11c97,2025-03-06T05:15:21.790000
CVE-2025-22624,0,0,3150de4f7a54951c23cb3cffadbaece2b77c163f8f3e2c796c2351f5c75a26cc,2025-02-27T19:15:50.940000
CVE-2025-2263,0,0,50bfcf0570082b4fe0ca6dbbfd573102df5feba6d42bf5ae7866012dac75badf,2025-03-13T17:15:38.617000
CVE-2025-2263,0,1,74cbe7833bbd1ea9988e049093e8e0d6a238b2303a3f8beaefddbc1301d1af8c,2025-03-14T14:15:19.660000
CVE-2025-22630,0,0,593d04dbe4592bbbd0e67cbe1d1c9339c2fd794f2c49ac1ded1166dba2e072b6,2025-02-14T07:15:32.750000
CVE-2025-22631,0,0,698f5af7c231ca612ef49b5c9557ed0a6275cc603aec3b288e67c713c264419b,2025-02-23T23:15:10.290000
CVE-2025-22632,0,0,a00ccfb79a24fc13a5dc854108dab7b330a127a143f3348ecdc06f096bf01241,2025-02-23T23:15:10.440000
CVE-2025-22633,0,0,02df1f9c4167b5004d9e46deb61bcc6f164b0d8af25621032bfff352c06f6449,2025-02-23T23:15:10.573000
CVE-2025-22635,0,0,09e419c8f16726a5ee91c4fc6dc7331c581a4170004efdf2c30917789f693c93,2025-02-23T23:15:10.720000
CVE-2025-22639,0,0,be7302f0496784c815dda454f246bcda7231f0fd624159bb2f829ea5a8a5cc86,2025-02-18T20:15:26.010000
CVE-2025-2264,0,0,d39047f56fd0f830c0a19b6a0849067f514e689174b143fccf281df12e10f43e,2025-03-13T17:15:38.787000
CVE-2025-2264,0,1,72fbd8d0325a5748d5f1950322bdd77f07b6978ffec11868c4ee910b7ad27762,2025-03-14T14:15:19.937000
CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000
CVE-2025-22642,0,0,11c66884fcc0c5b60dea8fd453f90eae4e8d1cdd88bcbd39e4c0551736d3dc74,2025-02-18T19:15:25.350000
CVE-2025-22643,0,0,65c625211e7e886c19d6b17e08b20683447546e65838c862a04bf47449cfe4ca,2025-02-18T19:15:25.483000
@ -282723,6 +282724,7 @@ CVE-2025-22675,0,0,976876d8bada85ddb7f9b01306108b5dc8490f124ee847cc17386ccf66414
CVE-2025-22676,0,0,f4c77d445e330cc96300170b283a943375cafd2a56102f55d30d95490870d22d,2025-02-16T23:15:10.037000
CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000
CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000
CVE-2025-2268,1,1,a6a2c356e1b4e8aabc54738554addc2f8396321f1bd4eb229019027042fd44cd,2025-03-14T14:15:20.270000
CVE-2025-22680,0,0,ed52e8da467480ea2ad8b21b38383d42b7fac5c20f0fc461d0c4b7083891f417,2025-02-16T23:15:10.183000
CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000
CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000
@ -282937,6 +282939,7 @@ CVE-2025-23036,0,0,bed3f9c28ffbd5440bab4c6a23a0f082cff10a365d21d2f24a58721a579c0
CVE-2025-23037,0,0,8ad6abc3c45922b3e5f4b3211d5b3c2d6af0a80fa2d34129cbdbd7b356338082,2025-01-14T01:15:18.717000
CVE-2025-23038,0,0,65d2c74c51e7582cde1953d5316f19cbfa4ea3931a18c9a8aae1940dbd15df48,2025-02-13T19:02:34.650000
CVE-2025-23039,0,0,7fc8622f059047fac19c0c3260e144f1d60b8ffa056e264de94704d62b5a89b4,2025-01-17T21:15:11.560000
CVE-2025-2304,1,1,7e599424e18d35c2d19606f19037fa0224a10d6c05aa2592c8e3cd655893640e,2025-03-14T13:15:41.160000
CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8c5d,2025-01-15T18:15:24.797000
CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000
CVE-2025-23042,0,0,afc715b4dd34097c6adef37f4433f6aa2747936efa0df044baa0bbe2e7f26ee0,2025-01-14T19:15:44.863000
@ -284448,7 +284451,7 @@ CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a5
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
CVE-2025-25747,0,0,28e457a2ced1f61595bff7cdc4d6597aa5b94f6478c075d60e5cbe9fcc34164d,2025-03-12T16:15:23.153000
CVE-2025-25748,0,0,97d86b07efd43cb77c646f6b6a4f2a09dc14c74443bef5bb7225d191b7f2bf21,2025-03-11T18:15:32.810000
CVE-2025-25748,0,1,3ab336efbc13974bc989a84c6cf6f6e1505ec7aedb8b875635d96e7d8deb8239,2025-03-14T13:15:39.780000
CVE-2025-25749,0,0,2ee440ae003eb53b628305f09af3163dbc7c742efb8a1778db0e910c737ffb6d,2025-03-11T18:15:32.933000
CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000
@ -284699,6 +284702,7 @@ CVE-2025-26620,0,0,67bb16c31832fa279abf82fbaaa24277d7470c8a03c406771fcdd9b2a5168
CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0aa0,2025-02-22T16:15:31.033000
CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000
CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000
CVE-2025-26626,1,1,9b176d401b56fe835c0cca0d65c7c61ba39504d07fab426189a9fdec5c254a5d,2025-03-14T13:15:40.077000
CVE-2025-26627,0,0,213363a255cf8a5be4e2d9d01c58ab051704c76d0d2fef8faca8fb14c705a0c4,2025-03-11T17:16:38.930000
CVE-2025-26629,0,0,e91c3157209e703be4dd88a0bde2a4dac53e9ad6c98d58e09e22fb296066be2e,2025-03-11T17:16:39.537000
CVE-2025-26630,0,0,4810410c2500666ef354db229b00042787dbf2395a709ae921cb4d057fabeaa1,2025-03-11T17:16:42.820000
@ -284980,7 +284984,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
CVE-2025-27363,0,0,5d7226be659cf0a5d75c9183710cee7e9d31f4aae92e2da6b82d7565ed062834,2025-03-14T05:15:42.377000
CVE-2025-27363,0,1,08072e56ee9e597011ac32560b054cc92417d789a55f2614e2d4d150fd9382ae,2025-03-14T13:15:40.250000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
@ -285050,6 +285054,9 @@ CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
CVE-2025-27590,0,0,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99ba6,2025-03-03T04:15:09.020000
CVE-2025-27591,0,0,f842d266050a347d4ac9c4ea009a6d231e770fabc1767ac93d0528aedc541ea9,2025-03-12T14:15:16.667000
CVE-2025-27593,1,1,4877932812206a61e9b22a42c4636877513964045a19d35b689f8c32cb8784df,2025-03-14T13:15:40.437000
CVE-2025-27594,1,1,13aeb4beeef0aa3ac1b1f8c564e332272f73c16bdf19f9a1f3013d893ceeb6a3,2025-03-14T13:15:40.623000
CVE-2025-27595,1,1,49ee9c5a75167a7bb47ac67cbbbcf85de7d17be528ebb7a12316859d9abb0643,2025-03-14T13:15:40.763000
CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000
CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000
CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000
@ -285207,6 +285214,10 @@ CVE-2025-28938,0,0,bb686e628ef6e312b49ba678a23c3f02f95c9e58d0a5c6fece2faf8008763
CVE-2025-28940,0,0,ed38f8aafffe9d8e8d4c21ff98f3184dd535cea4b6a7d90b331442eb1950eaa4,2025-03-11T21:15:51.887000
CVE-2025-28941,0,0,bd0484d7ee3fba23d6ad7c462ccd1272ed6f158777e89bea27cfd8fce685afa6,2025-03-11T21:15:52.030000
CVE-2025-28943,0,0,39cd6f2d3f6ecc50e22f0deb639a3eb11e659d07b3ac031ed88186bae7521525,2025-03-11T21:15:52.187000
CVE-2025-29029,1,1,c4ec6d479a100337c805f809f26e59e285041fae7b057556dedf7be3347e2822,2025-03-14T14:15:17.977000
CVE-2025-29030,1,1,9e8b8899034d6533111de5661200c826db1b054b71bf6c56fb77dff490edbbd1,2025-03-14T14:15:18.200000
CVE-2025-29031,1,1,31a124a9d9cfe471be8a68d0aa3f1ef1bec5875babdf32c278c21dec703063f3,2025-03-14T14:15:18.430000
CVE-2025-29032,1,1,0b6eab7e8f78d0b67802c042eb5a6a44e3fd4c503122d47536d1c3e4c08abc2b,2025-03-14T14:15:18.623000
CVE-2025-29357,0,0,eec581bc6280e760c1fd44b58b6967abd649a1816aebddc11dae361aa11d2d86,2025-03-13T14:15:36.253000
CVE-2025-29358,0,0,c0293e9e568c1618e8022d34fa155184307ba8f56bd1302dd926613aeaad2997,2025-03-13T14:15:36.407000
CVE-2025-29359,0,0,53bd19f51944212438069c3b5cd4d6b4befa8766e9858957731a201787508d1e,2025-03-13T14:15:36.547000
@ -285216,6 +285227,7 @@ CVE-2025-29362,0,0,900105b323def7a1f6c0afff29b0a54b9fb7571d27e52f7feb5cdc022de2b
CVE-2025-29363,0,0,70ea3491d00f7d7dbb9db17a284fac4bf5f0d3786813896c37f4c8a950f7b2af,2025-03-13T14:15:37.103000
CVE-2025-29768,0,0,ef3df5099700449e95b09ddc0e8b15c97f7a8c26be5af35058db2bc386982533,2025-03-13T17:15:37.623000
CVE-2025-29773,0,0,cff55e3cc6a4e7b74369ef072704b1f80dad554a0771c5c1a337d2ebb1763afc,2025-03-13T19:15:52.257000
CVE-2025-29776,1,1,2bcf19cfe229ac44c33a42ac99a787c07bb1a792d9e30568e2fdaf86395b3131,2025-03-14T14:15:18.847000
CVE-2025-29891,0,0,a78b892f5bcda6cc523f37c0f7c0a917e608075d8e379fc19029783e37a5c34c,2025-03-13T09:15:14.860000
CVE-2025-29903,0,0,5eeb753d6207a33dadf8a1431c4fdae237eb7a54c906717f9d4c165d0dbfdb0c,2025-03-12T13:15:37.823000
CVE-2025-29904,0,0,9820bd6a0dd982ed5f05f4335993011de4f806af08b3ad85485f678d69ae0889,2025-03-12T13:15:38.050000

Can't render this file because it is too large.