diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json index 32aa0204f64..e06bc13edf9 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0582", "sourceIdentifier": "psirt@forgerock.com", "published": "2024-03-27T18:15:08.237", - "lastModified": "2024-11-21T07:37:26.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,69 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.1.4", + "matchCriteriaId": "478F1C63-04C4-4408-89B2-9BB8DCDEC3A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:forgerock:access_management:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C87A61CB-EA7F-4898-AA4A-4E4A911D6942" + } + ] + } + ] } ], "references": [ { "url": "https://backstage.forgerock.com/downloads/browse/am/featured", - "source": "psirt@forgerock.com" + "source": "psirt@forgerock.com", + "tags": [ + "Product" + ] }, { "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600", - "source": "psirt@forgerock.com" + "source": "psirt@forgerock.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://backstage.forgerock.com/downloads/browse/am/featured", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20857.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20857.json index 8f6c9ef5efb..65f4ab5b0ca 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20857.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20857", "sourceIdentifier": "security@vmware.com", "published": "2023-02-28T17:15:10.457", - "lastModified": "2024-11-21T07:41:42.380", + "lastModified": "2025-03-10T15:15:36.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27295.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27295.json index 034624f8988..6636d1991d7 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27295.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27295.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27295", "sourceIdentifier": "vulnreport@tenable.com", "published": "2023-02-28T17:15:11.547", - "lastModified": "2024-11-21T07:52:35.963", + "lastModified": "2025-03-10T15:15:36.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json index dd51cf18c90..484b009beb2 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38534", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.197", - "lastModified": "2024-11-21T08:13:46.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:09:26.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02" + } + ] + } + ] } ], "references": [ { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json index 2da8ce46f97..776627d54b2 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38535.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38535", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.463", - "lastModified": "2024-11-21T08:13:47.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:09:26.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-321" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02" + } + ] + } + ] } ], "references": [ { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json index 927021ff1ee..2426ce8854f 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38536.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38536", "sourceIdentifier": "security@opentext.com", "published": "2024-03-13T22:15:08.710", - "lastModified": "2024-11-21T08:13:47.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:09:26.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02" + } + ] + } + ] } ], "references": [ { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json index 9ddc162d35f..90a989612ae 100644 --- a/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json +++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44999", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T14:15:09.253", - "lastModified": "2024-11-21T08:26:12.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woocommerce:stripe_payment_gateway:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.6.0", + "matchCriteriaId": "5BFB7CAF-01E5-4890-8A27-59C3AB8891A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json index 69e9f8eb2e1..eca4b08c29f 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45824", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.027", - "lastModified": "2024-11-21T08:27:25.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T14:59:09.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,67 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "5.1.4", + "matchCriteriaId": "89B3DB07-5C6E-45E1-9590-53DC197374FA" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json index 2d336b4e40a..f21beefc880 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48296.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48296", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.300", - "lastModified": "2024-11-21T08:31:25.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T14:59:09.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "5.1.4", + "matchCriteriaId": "434D6C2A-C8EA-4667-99BB-564738EC3D0E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json index 5cbe13beb0d..96125714007 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50168.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50168", "sourceIdentifier": "security@pega.com", "published": "2024-03-14T16:15:49.863", - "lastModified": "2024-11-21T08:36:36.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:10:00.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.5", + "matchCriteriaId": "EEE0AA21-4E23-4A71-B128-589BA98C1108" + } + ] + } + ] } ], "references": [ { "url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note", - "source": "security@pega.com" + "source": "security@pega.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50198.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50198.json index c1ef8f9d660..c9a248009c8 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50198.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50198.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50198", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:05.200", - "lastModified": "2024-11-21T08:36:38.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50199.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50199.json index 0d6d375a881..095fa45b0f8 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50199.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50199.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50199", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:05.387", - "lastModified": "2024-11-21T08:36:38.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-306" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50200.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50200.json index ef11db712e5..eb57907ed3f 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50200.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50200.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50200", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:05.593", - "lastModified": "2024-11-21T08:36:38.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50201.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50201.json index 4851f6980a8..ea92e4ec3ac 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50201.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50201.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50201", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:05.770", - "lastModified": "2024-11-21T08:36:38.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50202.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50202.json index 4fd1a46b211..0b8ba4ee2d5 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50202.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50202.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50202", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:05.950", - "lastModified": "2024-11-21T08:36:39.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50203.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50203.json index 304c1a3c947..c7875a4b2d2 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50203.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50203.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50203", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:06.127", - "lastModified": "2024-11-21T08:36:39.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50204.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50204.json index 7a5e6337848..1cd022a1695 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50204.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50204.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50204", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:06.327", - "lastModified": "2024-11-21T08:36:39.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50205.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50205.json index b1d0de1c3bf..24a6d8275cc 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50205.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50205.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50205", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:06.500", - "lastModified": "2024-11-21T08:36:39.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50206.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50206.json index c476c8fa6a3..f80d70367d5 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50206.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50206", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:06.687", - "lastModified": "2024-11-21T08:36:39.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50207.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50207.json index 4fe71cc3c44..8dcf09022ed 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50207.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50207.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50207", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:06.860", - "lastModified": "2024-11-21T08:36:39.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50208.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50208.json index 80826e93cfc..9b262bfc655 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50208.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50208.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50208", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:07.030", - "lastModified": "2024-11-21T08:36:39.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50209.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50209.json index 25eec1f2cec..fbd5e4b80b8 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50209.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50209.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50209", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:07.407", - "lastModified": "2024-11-21T08:36:39.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50210.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50210.json index fb826f13275..b3b3bb36125 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50210.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50210.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50210", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:07.837", - "lastModified": "2024-11-21T08:36:40.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50211.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50211.json index 0472fdc7b8e..b91b8bf1166 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50211.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50211", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:08.303", - "lastModified": "2024-11-21T08:36:40.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50212.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50212.json index 0af689aba31..bd7c6b023fa 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50212.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50212.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50212", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:08.620", - "lastModified": "2024-11-21T08:36:40.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-755" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50213.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50213.json index 5af1455934c..ce20af524e7 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50213.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50213.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50213", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:08.830", - "lastModified": "2024-11-21T08:36:40.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50214.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50214.json index 18d4b05d88e..2d962e830c1 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50214.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50214", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:09.007", - "lastModified": "2024-11-21T08:36:40.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50215.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50215.json index ccd132c4846..1a910439ec8 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50215.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50215", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:09.180", - "lastModified": "2024-11-21T08:36:40.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50216.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50216.json index 8be860f111a..c5e8a5bd056 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50216.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50216", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:09.367", - "lastModified": "2024-11-21T08:36:40.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50217.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50217.json index 51869984a7b..18b6b12eb72 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50217.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50217.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50217", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:09.540", - "lastModified": "2024-11-21T08:36:40.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json index eceb6cbb385..274ef80d938 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52214", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T13:15:44.857", - "lastModified": "2024-11-21T08:39:24.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T14:59:09.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "263DDEA0-209A-4487-9995-A6E9C1F5B1F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json index 2be98671c71..5dc0110dbbe 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52231.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52231", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T07:15:52.120", - "lastModified": "2024-11-21T08:39:26.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:plus:wordpress:*:*", + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "29AB23FF-349F-474C-9EBB-C52B6DD8EB2A" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json index 7c67e962041..56f316a14b0 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52234.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52234", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T07:15:52.927", - "lastModified": "2024-11-21T08:39:27.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*", + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "EE0A3A17-2BCC-43E1-A109-45927E7ED56E" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json index cec67da4872..306599198bb 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52609", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:07.743", - "lastModified": "2024-11-21T08:40:11.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T15:10:00.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,260 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige la ejecuci\u00f3n entre mmput() y do_exit() La tarea A llama a binder_update_page_range() para asignar e insertar p\u00e1ginas en un espacio de direcciones remoto desde la tarea B. Para esto, la tarea A fija el mm remoto a trav\u00e9s de mmget_not_zero() primero. Esto puede competir con la Tarea B do_exit() y la disminuci\u00f3n final del recuento de mmput() provendr\u00e1 de la Tarea A. Tarea A | Tarea B ------------------+------------------ mmget_not_zero() | | hacer_salir() | salida_mm() | mmput() mmput() | salida_mmap() | eliminar_vma() | salida() | En este caso, el trabajo de ____fput() de la Tarea B se pone en cola en la Tarea A como TWA_RESUME. Entonces, en teor\u00eda, la Tarea A regresa al espacio de usuario y se ejecuta el trabajo de limpieza. Sin embargo, la Tarea A duerme, esperando una respuesta de la Tarea B que nunca llega (est\u00e1 muerta). Esto significa que binder_deferred_release() est\u00e1 bloqueado hasta que un evento de carpeta no relacionado obligue a la Tarea A a regresar al espacio de usuario. Todas las notificaciones de defunci\u00f3n asociadas tambi\u00e9n se retrasar\u00e1n hasta entonces. Para solucionar este problema, utilice mmput_async() que programar\u00e1 el trabajo en el mm->async_put_work WQ correspondiente en lugar de la Tarea A." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.29", + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "D8EE6C94-F3E4-4963-8B5A-9BE8CD1565DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52611.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52611.json index dba0a863bd7..0eaeb964c73 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52611.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52611.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52611", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:08.157", - "lastModified": "2024-11-21T08:40:11.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T15:41:09.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw88: sdio: respeta el host max_req_size en la ruta RX. Lukas informa errores skb_over_panic en su Banana Pi BPI-CM4 que viene con un SoC Amlogic A311D (G12B) y un RTL8822CS. Tarjeta combinada SDIO wifi/Bluetooth. El error que observ\u00f3 es id\u00e9ntico a lo que se solucion\u00f3 en el commit e967229ead0e (\"wifi: rtw88: sdio: verifique el bit HISR RX_REQUEST en rtw_sdio_rx_isr()\") pero esa confirmaci\u00f3n no solucion\u00f3 el problema de Lukas. Lukas descubri\u00f3 que deshabilitar o limitar la agregaci\u00f3n de RX soluciona el problema durante alg\u00fan tiempo (pero no lo soluciona por completo). En la siguiente discusi\u00f3n se discutieron algunos temas clave que tienen un impacto en este problema: - El SoC Amlogic A311D (G12B) tiene un error de hardware en el controlador SDIO que impide las transferencias DMA. En lugar de ello, todas las transferencias deben pasar por el controlador SRAM, que limita las transferencias a 1536 bytes. Los chips rtw88 no dividen los paquetes entrantes (RX), por lo que si se recibe un paquete grande, este se reenv\u00eda al host en su forma original. Los chips rtw88 pueden realice la agregaci\u00f3n RX, lo que significa que el host puede extraer m\u00e1s paquetes entrantes de la tarjeta con una transferencia MMC/SDIO. Esto depende de la configuraci\u00f3n en el registro REG_RXDMA_AGG_PG_TH (BIT_RXDMA_AGG_PG_TH limita la cantidad de paquetes que se agregar\u00e1n, BIT_DMA_AGG_TO_V1 configura un tiempo de espera para la agregaci\u00f3n y BIT_EN_PRE_CALC hace que el chip respete los l\u00edmites de manera m\u00e1s efectiva) Use m\u00faltiples lecturas consecutivas en rtw_sdio_read_port() y limite la cantidad de bytes que el host copia desde la tarjeta en una transferencia MMC/SDIO. Esto permite recibir un b\u00fafer que es mayor que el max_req_size del host (n\u00famero de bytes que se pueden transferir en una transferencia MMC/SDIO). Como resultado de esto, el error skb_over_panic desapareci\u00f3 ya que el controlador rtw88 ahora puede recibir m\u00e1s de 1536 bytes de la tarjeta (ya sea porque el paquete entrante es m\u00e1s grande o porque se han agregado varios paquetes). En caso de errores de recepci\u00f3n (Lukas ha observado -EILSEQ), debemos drenar los datos restantes del b\u00fafer de la tarjeta; de lo contrario, la tarjeta devolver\u00e1 datos corruptos para la siguiente llamada a rtw_sdio_read_port()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "A9E74EDC-6520-4AF7-BF2E-2259A9C10A79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52616.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52616.json index 56e590ae432..8cde44cd3b2 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52616.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52616.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52616", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:08.967", - "lastModified": "2024-11-21T08:40:12.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T15:41:09.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,207 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: lib/mpi: corrige el acceso inesperado al puntero en mpi_ec_init Cuando se inicializa la estructura mpi_ec_ctx, algunos campos no se borran, lo que provoca un bloqueo al hacer referencia al campo cuando se lanz\u00f3 la estructura. Inicialmente, este problema se ignor\u00f3 porque la memoria para mpi_ec_ctx se asigna con el indicador __GFP_ZERO. Por ejemplo, este error se activar\u00e1 al calcular el valor Za para SM2 por separado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "2D2F0709-60B3-49A5-80BB-D9815B21843F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11638.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11638.json index afb2c566dfc..5cbcd24afbf 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11638.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11638", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-10T06:15:20.797", - "lastModified": "2025-03-10T06:15:20.797", - "vulnStatus": "Received", + "lastModified": "2025-03-10T15:15:36.803", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/", diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json new file mode 100644 index 00000000000..3a5fd3d79ed --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-12604", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-10T15:15:36.947", + "lastModified": "2025-03-10T15:15:36.947", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "iletisim@usom.gov.tr", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap&Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap&Sign App: before V.1.025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-526" + }, + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari", + "source": "iletisim@usom.gov.tr" + }, + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0063", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26634.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26634.json index 0561282ca09..818683e583a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26634.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26634", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:10.053", - "lastModified": "2024-11-21T09:02:44.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T15:41:09.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,144 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: corrige la eliminaci\u00f3n de un espacio de nombres con nombres alternativos en conflicto. Mark informa un ERROR() cuando se elimina un espacio de nombres de red. \u00a1ERROR del kernel en net/core/dev.c:11520! Las interfaces f\u00edsicas movidas fuera de init_net se \"reembolsan\" a init_net cuando ese espacio de nombres desaparece. El nombre de la interfaz principal puede sobrescribirse en el proceso si hubiera entrado en conflicto. Tambi\u00e9n debemos descartar todos los nombres alternativos en conflicto. Las correcciones recientes abordaron garantizar que los nombres alternativos se movieran con la interfaz principal, lo que provoc\u00f3 este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.60", + "versionEndExcluding": "6.1.76", + "matchCriteriaId": "669EF392-199C-46A8-997D-C976351952E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "EB070897-9C4B-4820-AE94-31318C9F5D76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json index a0739949d0e..c6e68b624c4 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26641", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:11.193", - "lastModified": "2024-11-21T09:02:44.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:58:35.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,514 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ip6_tunnel: aseg\u00farese de extraer el encabezado interno en __ip6_tnl_rcv(). El syzbot encontr\u00f3 que __ip6_tnl_rcv() pod\u00eda acceder a datos unificados [1]. Llame a pskb_inet_may_pull() para solucionar este problema e inicialice la variable ipv6h despu\u00e9s de esta llamada, ya que puede cambiar skb->head. [1] ERROR: KMSAN: valor uninit en __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] ERROR: KMSAN: valor uninit en INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] ERROR: KMSAN: uninit -valor en IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321 __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] IP6_ECN_decapsulate+0x7df/0x1e50 include/ net/inet_ecn.h:321 ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727 __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845 ip6_tnl_rcv+0xce/0x100 net/ipv 6/ip6_tunnel.c:888 gre_rcv +0x143f/0x1870 ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438 ip6_input_finish net/ipv6/ip6_input.c:483 [en l\u00ednea] NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ip6_input+0x15d/0x 430 netos /ipv6/ip6_input.c:492 ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586 dst_input include/net/dst.h:461 [en l\u00ednea] ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79 NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net/core/dev.c:5532 [en l\u00ednea] __netif_receive_skb+0x1a6/0x5a0 net/core/dev. c:5646 netif_receive_skb_internal net/core/dev.c:5732 [en l\u00ednea] netif_receive_skb+0x58/0x660 net/core/dev.c:5791 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555 tun_get_user+0x53af/0x66d0 drivers /net/tun.c:2002 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/ 0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read _escribir .c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en: slab_post_alloc_hook+0x129/0xa 70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [en l\u00ednea] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560 __alloc_skb+0x318/0x740 net /core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 tun_alloc_skb drivers/net/tun.c:1531 [en l\u00ednea] tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read_write.c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common. c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 0 PID: 5034 Comm: syz-executor331 No contaminado 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/ 2023" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "EA72E37E-0124-4468-B383-C248577636B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.77", + "matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.16", + "matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.4", + "matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5FE69B5A-CFC0-470E-9846-7D8086814986" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5AE3364-DB2D-4543-B1E2-175BF8BEBEE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:c800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11E837C7-F91E-4486-B0FD-3222E69AB17D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93B9B933-7D69-4B33-8983-C1CEC000B38B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "048F04A2-5630-453A-A855-E9314B2BAB62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a9500:*:*:*:*:*:*:*:*", + "matchCriteriaId": "002F31D0-96E3-495F-8F86-7C9190F20248" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:c190:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D3202DD-7616-4C9E-AFA1-61A1311F6C42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "775078AE-16E0-4AF6-9022-372FC2852107" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "23BA50E9-44A7-4443-AAE7-59911BB24EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a220:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92AFCF5D-1291-4E75-A12B-B95BBDAC3440" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2720:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9C227886-9186-49C3-A2B1-A0C1D5E5705A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "50B5C295-3711-4002-9D6D-72B6A237F650" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F997DB9A-AF66-4CE1-B33B-A04493ECBA19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2820:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22D33DD7-EB3F-4B85-B9F8-1D744112C9E0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20241108-0008/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json index 45bdf67332f..ec231ebfc1e 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28401", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T17:15:08.043", - "lastModified": "2024-11-21T09:06:17.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:10:00.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "TOTOLINK X2000R anterior a v1.0.0-B20231213.1013 contiene una vulnerabilidad de Cross-site scripting (XSS) Almacenado en el control de acceso ra\u00edz en la p\u00e1gina inal\u00e1mbrica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0-b20231213.1013", + "matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json index dc652a8f277..151520c998c 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28403", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T16:15:08.583", - "lastModified": "2024-11-21T09:06:17.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:10:00.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "TOTOLINK X2000R V1.0.0-B20221128.1033 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina VPN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0-b20231213.1013", + "matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json index 945925aeba4..a1cbe772bb2 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29112", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T15:15:08.050", - "lastModified": "2024-11-21T09:07:34.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T14:59:09.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "A4B296D6-ACDE-4053-941D-36503786C8E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json index fa117d5a172..ca70e6b605d 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29419", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T15:15:07.967", - "lastModified": "2024-11-21T09:08:01.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T14:59:09.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "Hay una vulnerabilidad de Cross Site Scripting (XSS) en la configuraci\u00f3n inal\u00e1mbrica en la p\u00e1gina de configuraci\u00f3n f\u00e1cil de TOTOLINK X2000R anterior a v1.0.0-B20231213.1013." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.0-b20231213.1013", + "matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json index 1a202a50bda..1de887b25a8 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29759", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T14:15:10.993", - "lastModified": "2024-11-21T09:08:16.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.55", + "matchCriteriaId": "CAD776DB-4CD1-4A12-9F2D-3745A49E7BD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json index ca7a8a1f5c0..43dd470f0da 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29921", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:39.390", - "lastModified": "2024-11-21T09:08:37.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:supsystic:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.17", + "matchCriteriaId": "FAF37CC5-60EA-46BC-A961-E6FCD54C11F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json index c7c6dd515c0..1f0cf3a3d8b 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29925", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:40.270", - "lastModified": "2024-11-21T09:08:37.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T15:50:32.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.7", + "matchCriteriaId": "BA6F290F-954F-4E4D-84CC-B8D1492B3EA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47109.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47109.json new file mode 100644 index 00000000000..c4727c01c25 --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47109.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47109", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-10T16:15:12.703", + "lastModified": "2025-03-10T16:15:12.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 UI could disclosure the installation path of the server which could aid in further attacks against the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185259", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52905.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52905.json new file mode 100644 index 00000000000..aa3d0879cbb --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52905.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52905", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-10T16:15:12.887", + "lastModified": "2025-03-10T16:15:12.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185264", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5295.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5295.json index b90aabb7580..ec752dc67a3 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5295.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5295", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-23T22:15:15.420", - "lastModified": "2024-11-21T09:47:22.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T16:26:06.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,62 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.09b01", + "matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json index 11ce70c5817..8061ca14d08 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0624", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-19T19:15:15.120", - "lastModified": "2025-02-19T19:15:15.120", + "lastModified": "2025-03-10T16:15:13.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2521", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-0624", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2112.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2112.json index 5eed83544b6..99cbbb3a545 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2112.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2112.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2112", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-08T22:15:36.443", - "lastModified": "2025-03-08T22:15:36.443", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:13.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.506085", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaolian-11/code_demo/blob/main/yaoqishan-sql.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2113.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2113.json index f8dcbf697c0..c23e841f01f 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2113.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2113.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2113", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T03:15:34.137", - "lastModified": "2025-03-09T03:15:34.137", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:13.950", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.506341", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506341", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2115.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2115.json index a5b31c0a750..d830e6ce219 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2115.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2115", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T06:15:11.933", - "lastModified": "2025-03-09T06:15:11.933", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:14.147", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.506655", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/heiheixz/report/blob/main/sk_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2120.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2120.json index 0896264232b..7648ad313c6 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2120.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2120.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2120", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T11:15:35.023", - "lastModified": "2025-03-09T11:15:35.023", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:14.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.507327", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/Thinkware-Dashcam", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2121.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2121.json index dde2b3820bb..d7477152cf4 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2121.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2121.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2121", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T11:15:36.647", - "lastModified": "2025-03-09T11:15:36.647", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:14.483", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.507328", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/Thinkware-Dashcam", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2122.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2122.json index 5f3e984d18b..6f4a5312f54 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2122.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2122.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2122", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T14:15:15.430", - "lastModified": "2025-03-09T14:15:15.430", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:14.617", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -128,6 +128,10 @@ { "url": "https://vuldb.com/?id.299035", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/geo-chen/Thinkware-Dashcam", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2123.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2123.json index 8a7620b0644..1672dab72cc 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2123.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2123.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2123", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-09T15:15:36.413", - "lastModified": "2025-03-09T15:15:36.413", - "vulnStatus": "Received", + "lastModified": "2025-03-10T16:15:14.740", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,14 @@ { "url": "https://vuldb.com/?submit.507418", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/GeSHi/geshi-1.0/issues/159", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25382.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25382.json new file mode 100644 index 00000000000..49453215f51 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25382.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25382", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T16:15:13.393", + "lastModified": "2025-03-10T16:15:13.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json new file mode 100644 index 00000000000..cc41b511ae9 --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25614", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T15:15:37.330", + "lastModified": "2025-03-10T15:15:37.330", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/armaansidana2003/CVE-2025-25614", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/changeweb/Unifiedtransform", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json new file mode 100644 index 00000000000..4c2508a5f24 --- /dev/null +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25620", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T15:15:37.490", + "lastModified": "2025-03-10T15:15:37.490", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/armaansidana2003/CVE-2025-25620", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/changeweb/Unifiedtransform", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25940.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25940.json new file mode 100644 index 00000000000..ad815d2044c --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25940.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25940", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T16:15:13.520", + "lastModified": "2025-03-10T16:15:13.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/t-oster/VisiCut", + "source": "cve@mitre.org" + }, + { + "url": "https://royblume.github.io/CVE-2025-25940/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25977.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25977.json new file mode 100644 index 00000000000..1efaeabe32a --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25977.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25977", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T16:15:13.633", + "lastModified": "2025-03-10T16:15:13.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in canvg v.4.0.2 allows an attacker to execute arbitrary code via the Constructor of the class StyleElement." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/canvg/canvg/issues/1749", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26910.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26910.json new file mode 100644 index 00000000000..fbaa7674267 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26910.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26910", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-10T15:15:37.660", + "lastModified": "2025-03-10T15:15:37.660", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design WPBookit allows Stored XSS. This issue affects WPBookit: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpbookit/vulnerability/wordpress-wpbookit-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26916.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26916.json new file mode 100644 index 00000000000..ffd6f78ff15 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26916.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26916", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-10T15:15:37.830", + "lastModified": "2025-03-10T15:15:37.830", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in EPC Massive Dynamic. This issue affects Massive Dynamic: from n/a through 8.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/massive-dynamic/vulnerability/wordpress-massive-dynamic-theme-8-2-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26933.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26933.json new file mode 100644 index 00000000000..c7afe168ffb --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26933.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26933", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-10T15:15:37.997", + "lastModified": "2025-03-10T15:15:37.997", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-place-order-without-payment/vulnerability/wordpress-place-order-without-payment-for-woocommerce-plugin-2-6-7-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26936.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26936.json new file mode 100644 index 00000000000..ca8157d5c28 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26936.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26936", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-10T15:15:38.177", + "lastModified": "2025-03-10T15:15:38.177", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Fresh Framework allows Code Injection. This issue affects Fresh Framework: from n/a through 1.70.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fresh-framework/vulnerability/wordpress-fresh-framework-plugin-1-70-0-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d92e3c72cba..1f6a69c5afb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-10T15:00:19.914944+00:00 +2025-03-10T17:00:20.674386+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-10T14:15:26.737000+00:00 +2025-03-10T16:58:35.783000+00:00 ``` ### Last Data Feed Release @@ -33,44 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284610 +284622 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `12` -- [CVE-2024-57492](CVE-2024/CVE-2024-574xx/CVE-2024-57492.json) (`2025-03-10T14:15:24.387`) -- [CVE-2025-1497](CVE-2025/CVE-2025-14xx/CVE-2025-1497.json) (`2025-03-10T14:15:24.723`) -- [CVE-2025-2149](CVE-2025/CVE-2025-21xx/CVE-2025-2149.json) (`2025-03-10T13:15:36.290`) -- [CVE-2025-2151](CVE-2025/CVE-2025-21xx/CVE-2025-2151.json) (`2025-03-10T13:15:36.497`) -- [CVE-2025-2152](CVE-2025/CVE-2025-21xx/CVE-2025-2152.json) (`2025-03-10T14:15:26.543`) -- [CVE-2025-2153](CVE-2025/CVE-2025-21xx/CVE-2025-2153.json) (`2025-03-10T14:15:26.737`) -- [CVE-2025-25615](CVE-2025/CVE-2025-256xx/CVE-2025-25615.json) (`2025-03-10T14:15:24.960`) -- [CVE-2025-25616](CVE-2025/CVE-2025-256xx/CVE-2025-25616.json) (`2025-03-10T14:15:25.097`) -- [CVE-2025-26865](CVE-2025/CVE-2025-268xx/CVE-2025-26865.json) (`2025-03-10T14:15:25.220`) +- [CVE-2024-12604](CVE-2024/CVE-2024-126xx/CVE-2024-12604.json) (`2025-03-10T15:15:36.947`) +- [CVE-2024-47109](CVE-2024/CVE-2024-471xx/CVE-2024-47109.json) (`2025-03-10T16:15:12.703`) +- [CVE-2024-52905](CVE-2024/CVE-2024-529xx/CVE-2024-52905.json) (`2025-03-10T16:15:12.887`) +- [CVE-2025-25382](CVE-2025/CVE-2025-253xx/CVE-2025-25382.json) (`2025-03-10T16:15:13.393`) +- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T15:15:37.330`) +- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T15:15:37.490`) +- [CVE-2025-25940](CVE-2025/CVE-2025-259xx/CVE-2025-25940.json) (`2025-03-10T16:15:13.520`) +- [CVE-2025-25977](CVE-2025/CVE-2025-259xx/CVE-2025-25977.json) (`2025-03-10T16:15:13.633`) +- [CVE-2025-26910](CVE-2025/CVE-2025-269xx/CVE-2025-26910.json) (`2025-03-10T15:15:37.660`) +- [CVE-2025-26916](CVE-2025/CVE-2025-269xx/CVE-2025-26916.json) (`2025-03-10T15:15:37.830`) +- [CVE-2025-26933](CVE-2025/CVE-2025-269xx/CVE-2025-26933.json) (`2025-03-10T15:15:37.997`) +- [CVE-2025-26936](CVE-2025/CVE-2025-269xx/CVE-2025-26936.json) (`2025-03-10T15:15:38.177`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `55` -- [CVE-2023-0487](CVE-2023/CVE-2023-04xx/CVE-2023-0487.json) (`2025-03-10T14:15:22.880`) -- [CVE-2023-25233](CVE-2023/CVE-2023-252xx/CVE-2023-25233.json) (`2025-03-10T14:15:23.970`) -- [CVE-2024-57064](CVE-2024/CVE-2024-570xx/CVE-2024-57064.json) (`2025-03-10T14:15:24.207`) -- [CVE-2025-1382](CVE-2025/CVE-2025-13xx/CVE-2025-1382.json) (`2025-03-10T14:15:24.567`) -- [CVE-2025-2130](CVE-2025/CVE-2025-21xx/CVE-2025-2130.json) (`2025-03-10T13:15:36.090`) -- [CVE-2025-2148](CVE-2025/CVE-2025-21xx/CVE-2025-2148.json) (`2025-03-10T14:15:26.130`) -- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-10T13:15:34.970`) -- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-10T13:15:35.167`) -- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-10T13:15:35.303`) -- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-10T13:15:35.443`) -- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-10T13:15:35.573`) -- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-10T13:15:35.703`) -- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-10T13:15:35.837`) -- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-10T13:15:35.960`) -- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T14:15:25.827`) -- [CVE-2025-27840](CVE-2025/CVE-2025-278xx/CVE-2025-27840.json) (`2025-03-10T14:15:25.943`) +- [CVE-2023-52214](CVE-2023/CVE-2023-522xx/CVE-2023-52214.json) (`2025-03-10T14:59:09.437`) +- [CVE-2023-52231](CVE-2023/CVE-2023-522xx/CVE-2023-52231.json) (`2025-03-10T15:50:32.850`) +- [CVE-2023-52234](CVE-2023/CVE-2023-522xx/CVE-2023-52234.json) (`2025-03-10T15:50:32.850`) +- [CVE-2023-52609](CVE-2023/CVE-2023-526xx/CVE-2023-52609.json) (`2025-03-10T15:10:00.520`) +- [CVE-2023-52611](CVE-2023/CVE-2023-526xx/CVE-2023-52611.json) (`2025-03-10T15:41:09.180`) +- [CVE-2023-52616](CVE-2023/CVE-2023-526xx/CVE-2023-52616.json) (`2025-03-10T15:41:09.180`) +- [CVE-2024-11638](CVE-2024/CVE-2024-116xx/CVE-2024-11638.json) (`2025-03-10T15:15:36.803`) +- [CVE-2024-26634](CVE-2024/CVE-2024-266xx/CVE-2024-26634.json) (`2025-03-10T15:41:09.180`) +- [CVE-2024-26641](CVE-2024/CVE-2024-266xx/CVE-2024-26641.json) (`2025-03-10T16:58:35.783`) +- [CVE-2024-28401](CVE-2024/CVE-2024-284xx/CVE-2024-28401.json) (`2025-03-10T15:10:00.520`) +- [CVE-2024-28403](CVE-2024/CVE-2024-284xx/CVE-2024-28403.json) (`2025-03-10T15:10:00.520`) +- [CVE-2024-29112](CVE-2024/CVE-2024-291xx/CVE-2024-29112.json) (`2025-03-10T14:59:09.437`) +- [CVE-2024-29419](CVE-2024/CVE-2024-294xx/CVE-2024-29419.json) (`2025-03-10T14:59:09.437`) +- [CVE-2024-29759](CVE-2024/CVE-2024-297xx/CVE-2024-29759.json) (`2025-03-10T15:50:32.850`) +- [CVE-2024-29921](CVE-2024/CVE-2024-299xx/CVE-2024-29921.json) (`2025-03-10T15:50:32.850`) +- [CVE-2024-29925](CVE-2024/CVE-2024-299xx/CVE-2024-29925.json) (`2025-03-10T15:50:32.850`) +- [CVE-2024-5295](CVE-2024/CVE-2024-52xx/CVE-2024-5295.json) (`2025-03-10T16:26:06.647`) +- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-10T16:15:13.110`) +- [CVE-2025-2112](CVE-2025/CVE-2025-21xx/CVE-2025-2112.json) (`2025-03-10T16:15:13.817`) +- [CVE-2025-2113](CVE-2025/CVE-2025-21xx/CVE-2025-2113.json) (`2025-03-10T16:15:13.950`) +- [CVE-2025-2115](CVE-2025/CVE-2025-21xx/CVE-2025-2115.json) (`2025-03-10T16:15:14.147`) +- [CVE-2025-2120](CVE-2025/CVE-2025-21xx/CVE-2025-2120.json) (`2025-03-10T16:15:14.347`) +- [CVE-2025-2121](CVE-2025/CVE-2025-21xx/CVE-2025-2121.json) (`2025-03-10T16:15:14.483`) +- [CVE-2025-2122](CVE-2025/CVE-2025-21xx/CVE-2025-2122.json) (`2025-03-10T16:15:14.617`) +- [CVE-2025-2123](CVE-2025/CVE-2025-21xx/CVE-2025-2123.json) (`2025-03-10T16:15:14.740`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b91422ca873..1d2be949c8e 100644 --- a/_state.csv +++ b/_state.csv @@ -214390,7 +214390,7 @@ CVE-2023-0483,0,0,076aa122ad914c1164f82f3f9f173341f80591ee3542f2aef7ed6562b6f26e CVE-2023-0484,0,0,8bbf0133f11289ba6dab230eb2ebc471707598c6dc2e7bd50d80f9b6868763d1,2025-02-19T20:15:33.520000 CVE-2023-0485,0,0,c94592c0a92f081c506f16872d53f1637abd06d2d748b9cc55aedabdb3c6af8d,2024-11-21T07:37:16.357000 CVE-2023-0486,0,0,79f862c17d6dd435ce4b6172df19c26a832def1ec531a28f8bb4e693b9a4b884,2025-02-13T17:15:55.600000 -CVE-2023-0487,0,1,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000 +CVE-2023-0487,0,0,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000 CVE-2023-0488,0,0,e1927f12e06abbd714f1592921e934aaf4c65af80824b7cfd1162a6fd6b257e4,2024-11-21T07:37:16.667000 CVE-2023-0489,0,0,ff94ed989ecf200ca9c9e93b2f43e5b73974735ffa1dec60779e8e34a66fa1cd,2024-11-21T07:37:16.783000 CVE-2023-0490,0,0,de5db187dc29d08e72001552229674aafbc72c7f1535c50224381914e9f169d3,2025-01-14T20:15:26.490000 @@ -214481,7 +214481,7 @@ CVE-2023-0578,0,0,1b664a5f9087e1616dad80854d7095835d0ab88854a8196a7fe50c003be364 CVE-2023-0579,0,0,a9030806eb2c6a88cf9d4657f7bd32aa28a98c879cbc09d7f601d1f1c378ba9b,2024-11-21T07:37:26.030000 CVE-2023-0580,0,0,fb2903613cebd2dc46456b158d0e03dde7bc6f83ca3387673eba11cce6f53333,2024-11-21T07:37:26.137000 CVE-2023-0581,0,0,235330329aa9cb2413ff17de2e1747757523f4328b3fd3439758453dd9792730,2024-11-21T07:37:26.240000 -CVE-2023-0582,0,0,b81939d48daf4b881fc0c2d4b8f6598502a6fa649da8701115d2b53a95c72fb6,2024-11-21T07:37:26.337000 +CVE-2023-0582,0,1,d98ef0be504f0768a9b6e20b4bacf3f87fa947d58f24a759afe9734ed3312ef7,2025-03-10T15:50:32.850000 CVE-2023-0583,0,0,aecdf5bf075fe00bf28cdbb70dc4e17c1d3edbe8508537d39ebcdc1d79c2adc0,2024-11-21T07:37:26.457000 CVE-2023-0584,0,0,86d98ae13897aba2e27973d5ba25ca898414447a0e558495482aae224a1f3bda,2024-11-21T07:37:26.560000 CVE-2023-0585,0,0,49ac0e7f939629954485d621143f248a92ef053fa7893146e4d823a2591822c5,2024-11-21T07:37:26.653000 @@ -216470,7 +216470,7 @@ CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d CVE-2023-20854,0,0,dacd2e665bd38bf4ba99d80576d86e64bbe079de09ee99a977ca737c5655d81d,2024-11-21T07:41:42.060000 CVE-2023-20855,0,0,f03026e1049b3344c34a6bcc1b12772374c4095cc8d63adbb19c5a88418e0228,2024-11-21T07:41:42.180000 CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000 -CVE-2023-20857,0,0,c25d90613d7fbb05e9c99852bf3d4fc04dae65733405726280e5ed45462fe07f,2024-11-21T07:41:42.380000 +CVE-2023-20857,0,1,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000 CVE-2023-20858,0,0,427e18ddecdd57cabdcf7a2c3f0765b4fc6b3ef29cd70d30a73313181e34474c,2024-11-21T07:41:42.477000 CVE-2023-20859,0,0,a149fcc9e6b397e6867e61052fc9e57bb8ebda4b9da8d77d31122383a87a762f,2024-11-21T07:41:42.577000 CVE-2023-2086,0,0,4bd07e7f4519a004987d08259ec919f33db41e8bd2e5bac80d42e3053bac0b12,2024-11-21T07:57:54.533000 @@ -220288,7 +220288,7 @@ CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601 CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000 CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000 CVE-2023-25231,0,0,88c61d385aa432e00fc3c0ad1089f0cddd7c90b8afad049aca3f8d335980af3f,2024-11-21T07:49:20.813000 -CVE-2023-25233,0,1,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000 +CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000 CVE-2023-25234,0,0,a510bebe2375b1af45612a3ab2f3dac7b3dc7853220bc1cd50b6c5e9d04afedc,2024-11-21T07:49:21.077000 CVE-2023-25235,0,0,596c788630eb27db3d761bc92f36535d6f58c10a053690d1add9bf413ab2f052,2024-11-21T07:49:21.203000 CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000 @@ -221836,7 +221836,7 @@ CVE-2023-27291,0,0,f15103f462a9934b3ac93d72050d98408ccebda0d448d74ff8c344a5fe434 CVE-2023-27292,0,0,97dcbe475305ce7caa822a272d7c9ae7ba2ff74ad54d20a927c7a39de32fb198,2024-11-21T07:52:35.623000 CVE-2023-27293,0,0,a6bd67d7f4699cf2b8a0eaf868b22b96444ff9300c334690ff1df27158d500f3,2024-11-21T07:52:35.733000 CVE-2023-27294,0,0,a8c2ed9f7bf316e1c8137f253452c0e613f7a6b7e34251d8285938c38d5a8709,2024-11-21T07:52:35.860000 -CVE-2023-27295,0,0,404b478058137d80a51656a9ce298835ed99f8ed097a9e66008da66eb6f07a53,2024-11-21T07:52:35.963000 +CVE-2023-27295,0,1,576d9de968bd51df200d9f288f1821e9b43ab98ad3fbb55bfbcd9987087b4cbc,2025-03-10T15:15:36.603000 CVE-2023-27296,0,0,7f5274562ccbbbb6af5e35f2605b8581df7cc1222d4fd056126d8ea79d3035b5,2024-11-21T07:52:36.060000 CVE-2023-27298,0,0,0fce4c894e225fbd7e4c5bb58306e8f69a7ae7ff803ff130bf62832af8167cfb,2024-11-21T07:52:36.240000 CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f05c,2024-11-21T07:59:11.053000 @@ -230761,9 +230761,9 @@ CVE-2023-38530,0,0,4e4e66a2c24c9621836f71f66bc79096ab1c9791f030d61f091097512aeb6 CVE-2023-38531,0,0,f2ed48e07d4840ae6c56e55cb29ea3d8c8fb13a973f5d004638b1c054bb1d6ec,2024-11-21T08:13:46.483000 CVE-2023-38532,0,0,93e795319b21d595bc386ad4f7ab375ae9f1953850bb0258fa24bc5f3b5c1076,2024-11-21T08:13:46.620000 CVE-2023-38533,0,0,c16ba29eb2d545356ad441068c0d777daacf50687c7b9841b866bf45682b2c89,2024-11-21T08:13:46.767000 -CVE-2023-38534,0,0,2b69e909a777c4e09ca35160ae25689beae3a1d13bb2a59e7b7d869cf3077c26,2024-11-21T08:13:46.917000 -CVE-2023-38535,0,0,428e3c756a93aa80ca8dee74061029c646c7e0b28752bf31236047e6113e7399,2024-11-21T08:13:47.050000 -CVE-2023-38536,0,0,bc42a49d2f6cd0b23955cf36f3dd93aca7cf8423253b9e2980178f2e5fc30044,2024-11-21T08:13:47.197000 +CVE-2023-38534,0,1,8d28f84459bf3f165fb4079eb9d07c71ac1b6926d9580283297409c2baf14ede,2025-03-10T15:09:26.080000 +CVE-2023-38535,0,1,db02b1a3c0ca63cc493b6d0de151a536cde5a20e781e04a7541df00b86ef576c,2025-03-10T15:09:26.080000 +CVE-2023-38536,0,1,96e5b19b66d0a947123a455de26402a6be7d62953ec516b62788e3f9db675a3b,2025-03-10T15:09:26.080000 CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64cd2,2024-11-21T08:13:47.330000 CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000 CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000 @@ -235479,7 +235479,7 @@ CVE-2023-44995,0,0,09b6031c8143bcb3dd8732530414f342c756d0f762cb4033139ead2113975 CVE-2023-44996,0,0,22eb9e1b1051547c27e8899f36155195706aa2759899c97aff28cf36873a0b8b,2024-11-21T08:26:12.090000 CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026ef0a,2024-11-21T08:26:12.213000 CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000 -CVE-2023-44999,0,0,4f7501630a43c7d4750793398d2204b7429cd2f2d191a30f553f62f5c529b1a4,2024-11-21T08:26:12.467000 +CVE-2023-44999,0,1,1ada106c655b6d6ef1dbb71a35ab8a2b0fd749e8bf40c0a55ff48e7ffaf0098c,2025-03-10T15:50:32.850000 CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000 CVE-2023-45000,0,0,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000 CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000 @@ -236105,7 +236105,7 @@ CVE-2023-45820,0,0,0f279d6051434e62af88a09aa9584ff189866c2fa6071bfd090ee65e61aaa CVE-2023-45821,0,0,a5efc0cf09fbe0ffb997a5d9952a120426712f734319dcebcd5f558f82197dca,2024-11-21T08:27:25.503000 CVE-2023-45822,0,0,b8705e0d0b51b3169e64459069d4473b1901d07584912fde63fc8216205fbdd7,2024-11-21T08:27:25.650000 CVE-2023-45823,0,0,9cf2f9f9b608ff4330d5f4e9163895af0b4c72a268e8bc48c1079d139ae10904,2024-11-21T08:27:25.797000 -CVE-2023-45824,0,0,286be4458a31638e5127840906a9a2155d0a987a203c80a88202eebf90f6b6ba,2024-11-21T08:27:25.933000 +CVE-2023-45824,0,1,29884b9890bc82562f06e35ee63345404aae2cc9c0ecc27d0bcd2bafb744f128,2025-03-10T14:59:09.437000 CVE-2023-45825,0,0,cc4f775aec9a77cdb80822f190dfb31088087996aff99b7b525e09a3649bcb6e,2024-11-21T08:27:26.060000 CVE-2023-45826,0,0,2049fdcfacd49e62f3dee07525456735a2621cfb7b2b713331b170eaaa2c4f93,2024-11-21T08:27:26.227000 CVE-2023-45827,0,0,abaf7216d57163ffcb299f06a62cc36e0969e2f3d40b98189cc2564ddfd70e0b,2024-11-21T08:27:26.363000 @@ -237923,7 +237923,7 @@ CVE-2023-48292,0,0,49b6ed3c7d82cc19d07f9b07faeae8eed968f0f9266280c60e9f10ad4e10a CVE-2023-48293,0,0,7ec36e7fb2f0cd6575e1daab3edfac0587e55782822da6ae2d2ac5b84c8b6039,2024-11-21T08:31:25.337000 CVE-2023-48294,0,0,0823cef5ec1945423a2723001f0cbbc10811a1d7069f9e43f8bc302fbf48eb89,2024-11-21T08:31:25.490000 CVE-2023-48295,0,0,e3f7b0fabd467ba3d6d38c5a491e5d95e73fa412e4e67ec80fc391d92d9caaa6,2024-11-21T08:31:25.650000 -CVE-2023-48296,0,0,0a15e48ad7844c9fa59bb7696fbcabfe945f7138cd12c884fe95e7b4cde1ee7f,2024-11-21T08:31:25.800000 +CVE-2023-48296,0,1,903abecd157925dab479e1a9b8eb1615a76b874865832fde013c59cd80a022c0,2025-03-10T14:59:09.437000 CVE-2023-48297,0,0,5c29092d616aeb3553526d5d48e7236fe2eb36b7252a78c024845e2f7a8ca0b6,2024-11-21T08:31:25.937000 CVE-2023-48298,0,0,93a4e2a4bafe2888e8111342b6def94e2d2d08c80634f2badc050f7dd3bad50f,2024-11-21T08:31:26.090000 CVE-2023-48299,0,0,32b7b9547f9d8722df1b4409045acff64c8bf92421b88ca8d40dbfb2913b4da4,2024-11-21T08:31:26.243000 @@ -239368,7 +239368,7 @@ CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000 CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000 CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000 -CVE-2023-50168,0,0,839c58ebb67d0eff1d2b8b5a29b7775d811d7c03a6f89a1b449ff37e232b995c,2024-11-21T08:36:36.050000 +CVE-2023-50168,0,1,a3ca312444e261a21b0fe92f05d01db88818150e1c5d5420ae68cf4f08ec1d71,2025-03-10T15:10:00.520000 CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000 CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000 CVE-2023-50172,0,0,25c03c7011f73a3630332b712bf3e6e5aa0720bd78ba59ee21b22af315f1dd14,2024-11-21T08:36:36.190000 @@ -239393,28 +239393,28 @@ CVE-2023-50194,0,0,648aeae0a443915f5d986b99757cc14e3d8fa6fb926bc094ed76392c5c041 CVE-2023-50195,0,0,0055bf9b102c1953a04fbdec2fda27ae9f3bbca29b798cf939095c9a948ea97c,2024-11-21T08:36:38.253000 CVE-2023-50196,0,0,76b1049dab48586a085df3c0a6ad1e28c4439753de6afae7bda2eb2c11ad1672,2024-11-21T08:36:38.370000 CVE-2023-50197,0,0,1d3b02b860128bb5029c41ac3776bf9f3c1ed8ab3f6bbf1e59772c2a98be0195,2024-11-21T08:36:38.490000 -CVE-2023-50198,0,0,5e6280fedbd71287f3388ca0bc8d999e71f6cdfd0db273fffd6156697c8e46c1,2024-11-21T08:36:38.610000 -CVE-2023-50199,0,0,006a4143e910cb9db8d161ec1d973fdf54541918a0d48688c6d3d7bc234e5d79,2024-11-21T08:36:38.737000 +CVE-2023-50198,0,1,7a19f515359e13fa313363f52767fb3adc52a455c63be43ef5f3e66039c113c6,2025-03-10T16:26:06.647000 +CVE-2023-50199,0,1,90859661f878ac18ce00ff03f9314ab6c8f2d45e6f49cd52f4d3773245fe3a5d,2025-03-10T16:26:06.647000 CVE-2023-5020,0,0,3ebfd312a63bb08213128d50313f23ce93215fe3c37de9d1421de1e39db29d89,2024-11-21T08:40:54.350000 -CVE-2023-50200,0,0,8373233220283fd54d2070e77f13f8a00063236c7d24fa6cfc47a889982da830,2024-11-21T08:36:38.860000 -CVE-2023-50201,0,0,62f641eb64d318c3539a5a5f68105889046d02d2c6029b689e97bd42606452d2,2024-11-21T08:36:38.980000 -CVE-2023-50202,0,0,d180d7eb3b0bef572bdfe7e434f60eb5e154fa548c185e5b8e2c82dfae7e396c,2024-11-21T08:36:39.103000 -CVE-2023-50203,0,0,483db6e9a2ea9eca4d196b6744908afb33c730a00fb4962cdc9038a3b6e39fd8,2024-11-21T08:36:39.233000 -CVE-2023-50204,0,0,36eb51b8a8048c19d4b7df22668eae06ee9dfcb165c3110c9b344b1fbb1d3eed,2024-11-21T08:36:39.353000 -CVE-2023-50205,0,0,c61e562ff4cf9a35648a8db294ea3f638d87ad887ae46ebb61a326d2a0cb1342,2024-11-21T08:36:39.487000 -CVE-2023-50206,0,0,7b219eb9406518cae369ac7e7fafdbab1d76a1e7b1522a2db9815b395ec606e4,2024-11-21T08:36:39.617000 -CVE-2023-50207,0,0,c86abbe8b92f98baf948cca45884269d458cbeeef484ca2ce68ddc7bf8dd9e33,2024-11-21T08:36:39.740000 -CVE-2023-50208,0,0,4e6567245ec22c5e3d4553111aeb08ba5dfda080e92f87e9995d6d7cfc8cac73,2024-11-21T08:36:39.863000 -CVE-2023-50209,0,0,99f2755be3b346891a689c02854b06751971cd341dd7d9937e137a9e3c735b73,2024-11-21T08:36:39.980000 +CVE-2023-50200,0,1,4d8dd6a7529464c66381176afb853b6e8e8a2718a65c2c3a0a3a14420935f4b1,2025-03-10T16:26:06.647000 +CVE-2023-50201,0,1,7d6906b3768b3869dfeea0a11edc3d2aea25f78fb8e5cc48408e55ed3db21026,2025-03-10T16:26:06.647000 +CVE-2023-50202,0,1,f061da0feabf8922bdb40f8b3e1f668d0279f5acbbb7ffc5ace135220bde6d06,2025-03-10T16:26:06.647000 +CVE-2023-50203,0,1,36a97005595c883e336e84a3e43c42a00df60f0bef2d237f253211c14af47a0e,2025-03-10T16:26:06.647000 +CVE-2023-50204,0,1,3cd0869aafc3815b1d14881ecd137b723bf8d514ccc8fea519e86f9976216bd9,2025-03-10T16:26:06.647000 +CVE-2023-50205,0,1,4067290f89744f83762a90342d9b5ff0ad8500229c6d518fea880f5c66f6565f,2025-03-10T16:26:06.647000 +CVE-2023-50206,0,1,2c02bd008b90f9a5b96316edbdf959aca11de74d4b8783ae07d407f51be80413,2025-03-10T16:26:06.647000 +CVE-2023-50207,0,1,65929ec45c07845ef32258c6a91dddaaf49d8d22a3455fc165b33c8fc5a706d6,2025-03-10T16:26:06.647000 +CVE-2023-50208,0,1,1bbea70eb1891758e013fe61e6bd7a4356b57a2bd47cabdf6c1f8cfdbb01f02c,2025-03-10T16:26:06.647000 +CVE-2023-50209,0,1,2e1b9b15b259929d1ab2afda166d8f86c00c39c0e2b65b98ed883dd3fcc178e8,2025-03-10T16:26:06.647000 CVE-2023-5021,0,0,d5ed528cd2d04cbb0f9c02d11ed404a1c1a5e7d82066d69d6067ce83108913da,2024-11-21T08:40:54.490000 -CVE-2023-50210,0,0,c40dcf7e2a99bb8bd2c8e0c1aa2743abde9a67aeaf5acb490e4ba8fac9d964e0,2024-11-21T08:36:40.110000 -CVE-2023-50211,0,0,90c1b79371746104cd5175cf3eee9753a3c4dde8dd03783e0e545f64510a4a8d,2024-11-21T08:36:40.230000 -CVE-2023-50212,0,0,660967e488d5c35d19b8b90912455229dc99f5a5d283255b2bc4a4046e1f5b12,2024-11-21T08:36:40.353000 -CVE-2023-50213,0,0,bf84b84ed0eaac09cbd91e956d59cd581b0a086993cb355527385be64dab1a15,2024-11-21T08:36:40.470000 -CVE-2023-50214,0,0,f95c8312844dea14b73513327cce30a4d399a35267061fbd217e71bb1ea84e33,2024-11-21T08:36:40.590000 -CVE-2023-50215,0,0,51b3c7166030ef77130d4afa7c25027aa45894aad31d46641276fe8e2886c231,2024-11-21T08:36:40.720000 -CVE-2023-50216,0,0,4032f6a8fac9ea254fb9d0dfa2743e25deca5a561f9f04ca5cc6c97051dc6636,2024-11-21T08:36:40.840000 -CVE-2023-50217,0,0,93e4fa06cfe09de19c8d114835b966e03d41c1d4c1ce08acc4cd79c4dd23f7e4,2024-11-21T08:36:40.980000 +CVE-2023-50210,0,1,6d244a2c079487d7b33be255cf1fb9e8197987cf74371c2573983312a1c1aef3,2025-03-10T16:26:06.647000 +CVE-2023-50211,0,1,b02adad60288c41511e94a7ba022165a57a346ffa83739d34318b5616cbfb226,2025-03-10T16:26:06.647000 +CVE-2023-50212,0,1,ea3c4da5e75a60db07de8e076c9f28d2bf886269f9a2552099202272b48571d2,2025-03-10T16:26:06.647000 +CVE-2023-50213,0,1,a83e1ee6369c3b10c8754dab303fc20a1967fd63ed41b288ba18cd6f9ff1e06c,2025-03-10T16:26:06.647000 +CVE-2023-50214,0,1,8e18966eaf9bcfb06d8920a3c6ef8df6f85421ae39f0db617530f69f94a2001a,2025-03-10T16:26:06.647000 +CVE-2023-50215,0,1,6d29327ec23ed79c03b2e0a4833cfb3c6a7165a411432917d15a8c459d4cb87c,2025-03-10T16:26:06.647000 +CVE-2023-50216,0,1,6323db3fc2516221a4ae0f7abba22641c9fc5086d31d0c27f185befbb09e33d8,2025-03-10T16:26:06.647000 +CVE-2023-50217,0,1,b88efa8a8f677eb0831a9db706d938a13759020777672cd8fcad59f843be6b46,2025-03-10T16:26:06.647000 CVE-2023-50218,0,0,4afe1ef0276133be7935638cbd2e85e1eb71072de1f8990a0f86eda896d50103,2024-11-21T08:36:41.120000 CVE-2023-50219,0,0,77041172f2802de8b9e4c7ab0da5d39ea410d34684f3114836da31ea96721cb7,2024-11-21T08:36:41.250000 CVE-2023-5022,0,0,77c514e21cf9d9288b8d50b5d4e761ef67e4cc58115e2c2e9a8541aee9ed20d0,2024-11-21T08:40:54.627000 @@ -240793,7 +240793,7 @@ CVE-2023-52209,0,0,5cc49a8c9584ee3734b32a880f990b114eed31ffc8d335c9e91f0f26aefc7 CVE-2023-5221,0,0,ac593677b3376dde09bd34a833907807ada0e2a1e2a05727f4f5313a1311ef84,2024-11-21T08:41:19.317000 CVE-2023-52211,0,0,4fd3248f4c554c980821f389569db32dc9c558ea6ec811b2423a7ecef28bcc4f,2024-11-21T08:39:24.437000 CVE-2023-52213,0,0,3601be2f1a2926cded9245ab21da9f59f377ccf814013c5e8b2d3dc18f46cd1d,2024-11-21T08:39:24.560000 -CVE-2023-52214,0,0,dc95caebbc19bbe35deb08bddf40d6503aa27c84c3bd4b4f2b0f62b7ad115c20,2024-11-21T08:39:24.690000 +CVE-2023-52214,0,1,5be0569656ae6ebd8c334d7369937d6e92e6550235e7d003f573f68e74226476,2025-03-10T14:59:09.437000 CVE-2023-52215,0,0,65dd38763a56901fd2bf92818082f00e711bcdeb4b87c1f54143d565ece2e8e3,2024-11-21T08:39:24.820000 CVE-2023-52216,0,0,5b6f1089c088b9daa2fff83e5549313d7ca0def2a262e8c39c2c0c91f5d94203,2024-11-21T08:39:24.943000 CVE-2023-52217,0,0,447b3fd9aaf7581ab2dca3fde3150c58c3c612e636d6e3b2675dce7ceccb0017,2024-11-21T08:39:25.070000 @@ -240812,10 +240812,10 @@ CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2 CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000 CVE-2023-5223,0,0,2fb00a8c39af0b009cca243d971676d52c15e47da332f24d74c2dc93b3b5f165,2024-11-21T08:41:19.617000 CVE-2023-52230,0,0,f74a4b7b498808aeca0a984a29729c461b3b795e9da7ce52049e0e1692c07a5d,2024-11-21T08:39:26.800000 -CVE-2023-52231,0,0,1898ae72b4557d66d34412838f4eac948bee83dc48ddea1259f96624fd15c5fd,2024-11-21T08:39:26.930000 +CVE-2023-52231,0,1,6a989c6c6fd5f334eff59c4f030f69494f93136d76eb0b6839d99d333595495f,2025-03-10T15:50:32.850000 CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3938,2024-11-21T08:39:27.053000 CVE-2023-52233,0,0,2423e3afa7be038ccf2190464fe2d4c37e2d909a99b6b2c713bd1ae6e307c147,2024-11-21T08:39:27.173000 -CVE-2023-52234,0,0,39a5bbe4db6b624413f844df3d1b1a3bf6bf3843620d3098c5576cc456c7da30,2024-11-21T08:39:27.303000 +CVE-2023-52234,0,1,52810b8529a5123a1ba1ea3a3af103acb34cd679a281604f82998848fdeaf764,2025-03-10T15:50:32.850000 CVE-2023-52235,0,0,38fc0b124e8fbe66aaf7d1f1df9b950ee33f38eef712db18d6428c2cb89643d8,2025-02-27T20:15:37.787000 CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000 CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000 @@ -241148,15 +241148,15 @@ CVE-2023-52605,0,0,eef3cf44ce41a02a3399eb957485c8288751166988c05159972483b6e58d9 CVE-2023-52606,0,0,e71801b4f5a4981b2569467690ce52413eb8f37a0337e3baa8643032e9366860,2025-02-14T16:40:45.753000 CVE-2023-52607,0,0,4022b2f965be96edd122082d59ec69486998f3198a0825ca9c95b3fe6070d1de,2024-11-21T08:40:11.080000 CVE-2023-52608,0,0,1d16de97ff29d39dc7d22baf8d49dafff2272c15cb0f5687aeaf3537fafcbe02,2025-02-25T18:52:37.897000 -CVE-2023-52609,0,0,68b6c722db826f8d3e573655c486ba16421d86e9e7c0510f6dc3171cefc3eb34,2024-11-21T08:40:11.410000 +CVE-2023-52609,0,1,16d2a63db45d95bcc5c4040a7addf598310e72b425dbda6023b9f1d530ffd997,2025-03-10T15:10:00.520000 CVE-2023-5261,0,0,12a347f49e473c2171e63989f079cf4aa858b311ce4aa7919b57ad843edc6646,2024-11-21T08:41:23.970000 CVE-2023-52610,0,0,42e4932933a1b2b44e26dd827e869b81fe3fa11f7d288d5d9be953648fafefe9,2024-11-21T08:40:11.557000 -CVE-2023-52611,0,0,5950f9de28ca701a6d877ef416e5b0da9f8ec02d7c89b8bab6bf8cc7164deff5,2024-11-21T08:40:11.703000 +CVE-2023-52611,0,1,330152c1b221e2b7cc759a830648270d0698ae2b359283f7aa0502b6ad4fd800,2025-03-10T15:41:09.180000 CVE-2023-52612,0,0,d6d47cff640a52161b4f9351b162fb8859b2930a7044931b4890a50707eb6b85,2025-02-27T03:20:23.277000 CVE-2023-52613,0,0,96325267c27d73302c8edfb72e5ff60c5b387d18ebd2882583f0fdf9459cad86,2024-11-21T08:40:11.967000 CVE-2023-52614,0,0,52c94d505914b26a7b25e71d5a23d26488e4516b2dcce84229cb69170bc5bf85,2024-12-12T15:20:02.283000 CVE-2023-52615,0,0,d8d6425893b09196f356165ccca56dc5d14626c565c3defa9edaa655ca205929,2024-12-12T15:20:12.140000 -CVE-2023-52616,0,0,1f55bb5e40a40abf9cea18a1d496803a21c38b82f69ff542219826caa6851f89,2024-11-21T08:40:12.420000 +CVE-2023-52616,0,1,a9ba78ce1866347ee08e18d82dd36ef60fddc2ec75b345f6e0f635dddf7a02d9,2025-03-10T15:41:09.180000 CVE-2023-52617,0,0,43a6c3b54c97e95c95b1a3b856ce894a04e8e0998a4a6b1e4b1c3f666122ec07,2024-11-21T08:40:12.540000 CVE-2023-52618,0,0,a284d66a0a173675b029b5aee3ada2aa13bfa94d23d149bbf9319a57e50731a2,2024-11-21T08:40:12.740000 CVE-2023-52619,0,0,b2659b5699bfc1e111c9a9843d46194c0f86d0d7ec9412530eece4634db68a61,2024-11-21T08:40:12.933000 @@ -245757,7 +245757,7 @@ CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580 CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000 CVE-2024-11636,0,0,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000 CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000 -CVE-2024-11638,0,0,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000 +CVE-2024-11638,0,1,b3f0fba6b9e57ad0eb73493a02c935ea4ba6428dd3e65c707db806293722fd2a,2025-03-10T15:15:36.803000 CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000 CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000 CVE-2024-11640,0,0,703b195ff151c253fbe91a68928542f3fce11ad9103611204a13abf98a6770f0,2025-03-08T12:15:34.510000 @@ -246683,6 +246683,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 CVE-2024-12602,0,0,6a6f401c6c4934c31c54c267328b5cfeb9b2f93f94e5b5a1cce33d5e69f2089d,2025-02-06T13:15:38.907000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 +CVE-2024-12604,1,1,365eafd508bd0d30c9c0eae62d3ad0864e472e4672d7a16d9e686b8d021666c0,2025-03-10T15:15:36.947000 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000 CVE-2024-12607,0,0,a778c1b19df180457278323673004b895cd04ef11611b1a21cf7e73706325fb5,2025-03-07T09:15:14.700000 @@ -253542,7 +253543,7 @@ CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9f CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000 CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000 CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000 -CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000 +CVE-2024-26634,0,1,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000 CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000 CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720289,2024-11-21T09:02:44.270000 CVE-2024-26637,0,0,33676b92619865021f629b461c2549985de282ac3ac30f360d4728cbdc20aa03,2024-11-21T09:02:44.403000 @@ -253550,7 +253551,7 @@ CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d46 CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000 CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000 CVE-2024-26640,0,0,54c5da3b229a93028da04fd82c4249df09909d6ac16876a131e19755de0888f3,2024-11-21T09:02:44.737000 -CVE-2024-26641,0,0,5f47a642bf5ae3dc0f36324b4a1b8f7c8a7ca05295b1963f0b237d32cbae450a,2024-11-21T09:02:44.853000 +CVE-2024-26641,0,1,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000 CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000 CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000 CVE-2024-26644,0,0,3e955ecc04cafd50770b4e01603b044ae0abf17da766c5be4deb9ef73da57365,2024-11-21T09:02:45.230000 @@ -255087,9 +255088,9 @@ CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67 CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df33448955ca,2024-11-21T09:06:16.637000 CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 -CVE-2024-28401,0,0,2802927e5ad9b082a6c099f44230ec67d2e7b0dc68f3c4abdb5e00577ed5f858,2024-11-21T09:06:17.097000 +CVE-2024-28401,0,1,9f0dbbbe7a6ec84e7d4faab16829c35681918247fdaaf914064f4e00200084ab,2025-03-10T15:10:00.520000 CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000 -CVE-2024-28403,0,0,860309db1aa80a38c13205a0c2daedf50384bd0d9a847292c61f38375d2f0dd5,2024-11-21T09:06:17.480000 +CVE-2024-28403,0,1,81618e0ea8184e7980a777fc304e501742d1a0ee0b5eb76d1188a31fa424f013,2025-03-10T15:10:00.520000 CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000 CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000 CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000 @@ -255576,7 +255577,7 @@ CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b CVE-2024-2911,0,0,ea8e4206a3c0bfceb3e41c8a3a3622f0f3db1e83a81f091f5308d2a4dc3ff64f,2024-11-21T09:10:49.123000 CVE-2024-29110,0,0,188b12a44958677313d622a075fc663921a549ff0ec7192ae3aa84b867a019d1,2024-11-21T09:07:34.573000 CVE-2024-29111,0,0,43c01cdf3c81bdb08ab32728f1ab12bd4d113a32f12b5b11c5a8312b12fa01f2,2024-11-21T09:07:34.703000 -CVE-2024-29112,0,0,22fbc807a608e11c3ab90c64425a997e5eb5ddfdf96a55d3fadff1c9efe3e429,2024-11-21T09:07:34.840000 +CVE-2024-29112,0,1,7bf41a966eaae89ebefd5c8b4c7e1306d7f21a731d1056a111c69bd2a160ffe1,2025-03-10T14:59:09.437000 CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4edf2,2025-02-04T20:59:42.987000 CVE-2024-29114,0,0,88300e212efe02d630837b11131224e74f01a0cd0f11f5165976518107e30b35,2024-11-21T09:07:35.123000 CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000 @@ -255768,7 +255769,7 @@ CVE-2024-2941,0,0,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68 CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000 CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000 -CVE-2024-29419,0,0,0ce606f5a5cf07356613fec2326ebde34442b78001dc20551d09af7fea8ca551,2024-11-21T09:08:01.520000 +CVE-2024-29419,0,1,3d6442d0944c2f3dbf573e7842459e57abd01dc61b07d44258cf4f6e849723b5,2025-03-10T14:59:09.437000 CVE-2024-2942,0,0,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000 CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000 CVE-2024-2943,0,0,beca67e7e14d7fa541ce7bb02133b5918a7ee95ca547f351aa0b1a0c61776892,2025-02-21T18:30:31.883000 @@ -255896,7 +255897,7 @@ CVE-2024-29755,0,0,131508e7f31b5dd773300df31549782ce0ce017525cc3577b3551d26eabf9 CVE-2024-29756,0,0,e77feac16a93aca73ccbe8dcfafacd1ca46e891f6b1a10023dff30a1bdc4c245,2024-11-21T09:08:15.560000 CVE-2024-29757,0,0,bd7783b6715cff85d146b7f3bcffcb931e226d2a557937fa75537c3d9b443b55,2024-11-21T09:08:15.743000 CVE-2024-29758,0,0,6ea6f820d39944c9f593511e726a4e557f489b72484f2be43d28f1260dec212a,2024-11-21T09:08:15.927000 -CVE-2024-29759,0,0,c2dfb00f6e1bc85acc51fca4c87b232f29bacf43ab7fb57706676573571deb58,2024-11-21T09:08:16.050000 +CVE-2024-29759,0,1,ab262c2b0ceec01043067092edae533e60eb44e1368d3e01b32f3eb36aaa261f,2025-03-10T15:50:32.850000 CVE-2024-2976,0,0,be906ae6792b8669cd4d4b057f3766fd4a8c9c37d055d1b85958a80dc6b656bd,2025-01-15T18:15:32.177000 CVE-2024-29760,0,0,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000 CVE-2024-29761,0,0,768c3eca5f21654a3a2565d24ad5040669ec8be99a6791320fd6dff74c94e8c9,2024-11-21T09:08:16.287000 @@ -256066,11 +256067,11 @@ CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 CVE-2024-29920,0,0,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000 -CVE-2024-29921,0,0,b9c2dd4a6ac014b1d80df166ec8cf95b75954206dfe5823ed81b4aa10da07d17,2024-11-21T09:08:37.447000 +CVE-2024-29921,0,1,e972cc140ebce7d247cad524d991e101a8614910bacf9680d1c950dc8c3c8178,2025-03-10T15:50:32.850000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29923,0,0,a45a81b524b42be32edcb85a652cac38dc1e978ac5963a2acd47db1d0bf7d066,2025-01-31T18:23:56.537000 CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045f92,2024-11-21T09:08:37.800000 -CVE-2024-29925,0,0,741a1b83114336e7e00db1ac9c4ad6c0646d7c9b5cba9cea2fe9d5d0216d43e3,2024-11-21T09:08:37.920000 +CVE-2024-29925,0,1,3699e901e2f7d0ef83c4982ad0536627ef263ff0faa1926d70f8cf0af46976f9,2025-03-10T15:50:32.850000 CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000 CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000 CVE-2024-29928,0,0,cae0001505e95b812c21633d98b96b15f5b908a7cd513a5258817260411218f4,2024-11-21T09:08:38.310000 @@ -269153,6 +269154,7 @@ CVE-2024-47103,0,0,6771e67ef5c816d19656e97b7a1b0ea749558ddc5479baa3c972619b096bd CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000 CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000 +CVE-2024-47109,1,1,d621b048b89fb1b4567be75db094ed14a736130d33d5ef97b3380b15a8306aed,2025-03-10T16:15:12.703000 CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000 CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000 CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000 @@ -273386,6 +273388,7 @@ CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 CVE-2024-52902,0,0,a3380a1085a80da252bc071d60beac51ec60c4709d752c512c4410d14d967500,2025-02-19T15:15:14.660000 +CVE-2024-52905,1,1,765c4d3461973ee00d14a1e8164972daef69e62a79523827ab9c3d6fb99db084,2025-03-10T16:15:12.887000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 @@ -273420,7 +273423,7 @@ CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca63 CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000 CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000 CVE-2024-52949,0,0,696d0f2d9f6f32b8f638cc01e3ed01b74797e84c628afddbb0ec84c427c07fde,2025-01-29T09:15:07.317000 -CVE-2024-5295,0,0,2396dadecb35968608e7faeb909b9c67144b6a2007cc474b7ce69341811bcf77,2024-11-21T09:47:22.707000 +CVE-2024-5295,0,1,cb8a26708b9a9483332c374cb3e6212b16da1fe7bc9688d6cac0cf935ed4c53d,2025-03-10T16:26:06.647000 CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be506ce,2024-11-27T21:15:07.997000 CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000 CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000 @@ -275909,7 +275912,7 @@ CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6 CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000 CVE-2024-5706,0,0,f09a3fc0306ab86b2dee756b4e00346daa3fb01dc12c33d9d6fa100062bc19ae,2025-02-19T23:15:10.960000 CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 -CVE-2024-57064,0,1,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000 +CVE-2024-57064,0,0,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000 CVE-2024-57065,0,0,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000 CVE-2024-57066,0,0,9f715954ea971b4d1d25c40c38035cabc1d38fcea115ceb055b4b2227dcd1941,2025-02-06T16:15:39.803000 CVE-2024-57067,0,0,cd7e64784c62ad9238926b63024a621c822b21b9ab52f7c517976f23a99e2eca,2025-02-06T16:15:39.980000 @@ -276058,7 +276061,7 @@ CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531 CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000 CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 -CVE-2024-57492,1,1,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000 +CVE-2024-57492,0,0,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000 CVE-2024-57498,0,0,3826c405fd29f665f0ad91bf9f453f7e5685abcd0e2ddebcfe40540a3c6b47f2,2025-02-04T20:15:49.423000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000 @@ -280524,7 +280527,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 -CVE-2025-0624,0,0,40e303d9d1190ea3151af079fa636fe8ad6f27eeabbce833afeffc52d49290f2,2025-02-19T19:15:15.120000 +CVE-2025-0624,0,1,3681056eba6f8e69f21f0f32e34b0e25f0040c1cfb5977910e8e31a65b5cc762,2025-03-10T16:15:13.110000 CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000 @@ -280986,7 +280989,7 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89 CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000 CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000 CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000 -CVE-2025-1382,0,1,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000 +CVE-2025-1382,0,0,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000 CVE-2025-1383,0,0,3d6bb558842041d82d621f422104cb5c9be368f9bc9ceccf69a42cab81d3fdb5,2025-03-06T12:15:35.937000 CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 @@ -281028,7 +281031,7 @@ CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e537331 CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000 CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000 -CVE-2025-1497,1,1,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000 +CVE-2025-1497,0,0,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1504,0,0,0caf0fe296ba3de7804662f98b8d86d33ae80da3d9d2ad938f31b1ae97694007,2025-03-08T03:15:37.393000 CVE-2025-1505,0,0,1355264158a2ba11ce2fd21a6bc45f6ba2c7a41beba2055617c8a72a80e67517,2025-03-06T20:21:36.547000 @@ -281508,7 +281511,7 @@ CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2 CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 CVE-2025-21117,0,0,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000 -CVE-2025-2112,0,0,85227d11e81908281475abb4c87b58749be99c2e996f8b7b4c8c362d9654e82a,2025-03-08T22:15:36.443000 +CVE-2025-2112,0,1,5f77149442171744809539a428d973ad03b97deb512aa66cd024b8d02805c91c,2025-03-10T16:15:13.817000 CVE-2025-21121,0,0,1697e078ff9a5405d9a543461696c63d50506a646e18e458652be622eb5556f4,2025-03-03T14:54:17.487000 CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000 CVE-2025-21123,0,0,0be58033a62e1c138323b992604392193cd26a8c4f221072c6847ce8703ed4eb,2025-03-03T14:54:17.487000 @@ -281518,7 +281521,7 @@ CVE-2025-21126,0,0,10ba9f2eeb85ed246290b21f0c7e73660020f9c493ce656be1411dab877e2 CVE-2025-21127,0,0,6ca3d8cc02cdac3fbe512e4c8a13fe7008821b139ef240ca0adb0f0fb4680f8f,2025-02-11T14:55:09.333000 CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000 -CVE-2025-2113,0,0,198321c4bb2a71e92e596335b1432beb230188aac734caad5bf90de063af4008,2025-03-09T03:15:34.137000 +CVE-2025-2113,0,1,55e1dec71d2842289ae725e7d4fc3d818c9d71c23afdeb77399d187fae7ae311,2025-03-10T16:15:13.950000 CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000 CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000 CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000 @@ -281530,7 +281533,7 @@ CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372f CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000 CVE-2025-2114,0,0,742b040392533f1a6cfa6d341fe3374fa2ff12cac643030e695f2a5f5d08022a,2025-03-09T05:15:30.270000 -CVE-2025-2115,0,0,3021382c6741742138519b90c1ecc2ab1d1b6fcce8a4cc71b5453ea52ab138e8,2025-03-09T06:15:11.933000 +CVE-2025-2115,0,1,fd18299636ce5f2bc38c51cf068829a7894b4fdfa24622983bc2f76959b52834,2025-03-10T16:15:14.147000 CVE-2025-21155,0,0,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000 CVE-2025-21156,0,0,27b960f0b5b6864477f57a25e5df52b68937946efa0b6d1473b660f8b7066f80,2025-02-19T22:54:41.513000 CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000 @@ -281564,14 +281567,14 @@ CVE-2025-21190,0,0,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 CVE-2025-21198,0,0,409f66843b554eefbda1b14eaef7f0d6b61447a101bf7413282917ca002ecb4d,2025-02-28T16:02:50.353000 -CVE-2025-2120,0,0,b533d65276850c88a6f68043d3c7cc2b8e635bf5331a78cad5aab688dffba10f,2025-03-09T11:15:35.023000 +CVE-2025-2120,0,1,10248c9048201befa4f8181190c48cf1217aeca23433be817032d43a13b2d918,2025-03-10T16:15:14.347000 CVE-2025-21200,0,0,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000 CVE-2025-21201,0,0,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 CVE-2025-21206,0,0,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 CVE-2025-21208,0,0,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000 -CVE-2025-2121,0,0,5f6e6cafc8b053796282a2422f8f4ad4175988241f629294d1d4fcda459a8172,2025-03-09T11:15:36.647000 +CVE-2025-2121,0,1,814899ae1d2eb84af8f25b992b134a50db8489b80b4a7974f517d4d245bd2b9f,2025-03-10T16:15:14.483000 CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000 CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000 CVE-2025-21212,0,0,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000 @@ -281582,7 +281585,7 @@ CVE-2025-21216,0,0,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1 CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000 CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000 CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 -CVE-2025-2122,0,0,693427cf7568fa096eba73cae872c6c4016e2931d02b54a434b5570972dee040,2025-03-09T14:15:15.430000 +CVE-2025-2122,0,1,290547752a470d8da206a92c3e8e3368775c5b89590f8d1ea4998fa5f87483ca,2025-03-10T16:15:14.617000 CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000 CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000 CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000 @@ -281591,7 +281594,7 @@ CVE-2025-21226,0,0,2f5f6ccc39acdfb2b7cec30e176e0e2f1dc141d4d0fd55d9540bbaff25e2e CVE-2025-21227,0,0,e74cc881cc3f14638775245e0247523b50d3fe8f76ca0a79bf3911d59cf7d8a7,2025-01-27T18:47:16.717000 CVE-2025-21228,0,0,e66ffb1cd2f0c8e69939717342c89b3e470530ed77fe35b7d613be20fb5699e7,2025-01-27T18:47:27.603000 CVE-2025-21229,0,0,5b9d343c3675c785c1883befc5d74a71c8b6d41d9e72125678b91a16a5f7065e,2025-01-27T18:47:37.697000 -CVE-2025-2123,0,0,4acb0fd53b16a2ca153ab60669e2444368e4297661d2e9c1e10749c06973c268,2025-03-09T15:15:36.413000 +CVE-2025-2123,0,1,c1cf101a0a7411e29877dcdb4dc40119fa11040be147bbffa0b70d523e6b6fb2,2025-03-10T16:15:14.740000 CVE-2025-21230,0,0,bf3028f0f96a246b5ecbe951552b973bc02e0b51e420392170a1dd03d48b14e3,2025-01-27T18:47:46.557000 CVE-2025-21231,0,0,d044bbfe2f119bd723d5344cae8147732c3ad7961b5471c3a188b0d47573734f,2025-01-27T18:47:57.930000 CVE-2025-21232,0,0,23d68831fa0a23eddcf0b6ecfa974d8fa3f8ae535f8e37868367b2a8f7dabf73,2025-01-24T21:51:59.700000 @@ -281665,7 +281668,7 @@ CVE-2025-21296,0,0,e6a1c9957561caf3c08496803c0d30c1ebf34930666c8fe32257ce9086419 CVE-2025-21297,0,0,3ab7b3c14f4caef771a6720deb6e250b1f436927d02f1b51343e4279e8f230d4,2025-01-24T21:48:42.703000 CVE-2025-21298,0,0,8777cfa0600445139c487075d5ab0c735aed30e39ea02043ecdccc9440939232,2025-01-24T21:48:49.880000 CVE-2025-21299,0,0,f36898ed7a072fb1bf3a66d319990cf8422e046997a77b84517942b1fed08dc7,2025-01-24T21:48:59.153000 -CVE-2025-2130,0,1,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000 +CVE-2025-2130,0,0,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000 CVE-2025-21300,0,0,37096ee2a4f954708906e2afd28314e98d8e4ab0c7ac8239b74c189373571d90,2025-01-24T21:49:29.857000 CVE-2025-21301,0,0,8953ad23567d52390e15e46d491856022afaf971fd601bd1a6ce8eed1c3fb533,2025-01-24T21:49:37.347000 CVE-2025-21302,0,0,884c6727a46036a58204ac04a3b80c31d9ebeb9d1b7ece8a19fc57a9180b92a6,2025-01-24T21:49:44.423000 @@ -281786,9 +281789,9 @@ CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 CVE-2025-21424,0,0,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000 CVE-2025-2147,0,0,ddb9ff2fab6cd02e2e5f72966eefcef9573206f3b8726de0ad1c2dc97e3bf31b,2025-03-10T11:15:38.157000 -CVE-2025-2148,0,1,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000 +CVE-2025-2148,0,0,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 -CVE-2025-2149,1,1,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000 +CVE-2025-2149,0,0,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000 CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000 CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000 CVE-2025-21492,0,0,175b05e4b6021ea2e9dabd82cb14ca0549d088227dfc44490c43cf779c0afb04,2025-01-24T20:15:34.390000 @@ -281809,7 +281812,7 @@ CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530 CVE-2025-21507,0,0,3c4d97b7a000801ae327a1e1ce8c0533b2db78864da71a309a9bca7bbf1def04,2025-01-23T17:15:24.297000 CVE-2025-21508,0,0,77d16baf9f8d14a680d396801ee4bbaa43bfb9b28cfbcf88a906be04f5238cd1,2025-01-22T19:15:10.767000 CVE-2025-21509,0,0,21a812b786cc6eba1f43d96ae439efec57e46377f98df4f2aa400b62d6b5770d,2025-01-23T16:15:36.777000 -CVE-2025-2151,1,1,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000 +CVE-2025-2151,0,0,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000 CVE-2025-21510,0,0,a9d4ed31cacc6780a953598023a9516bc432ebf53a4d880ebf8bed4d05eb13a9,2025-01-23T16:15:36.937000 CVE-2025-21511,0,0,a53b91609f0dde5b99ec85ee5e2f3015ee303e4f60a7051aed47d398a1b562cd,2025-01-23T22:15:15.583000 CVE-2025-21512,0,0,4eee0786dd6533099e7bc79f41166620e0d69b15829df1bc0a8a9db2b8b193d5,2025-01-23T22:15:15.720000 @@ -281820,7 +281823,7 @@ CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3 CVE-2025-21517,0,0,e6ce3ce90dfd2ca78ff83027905b529bbb9ea13ec96e6c8775fabfa89270d8d2,2025-01-22T19:15:10.990000 CVE-2025-21518,0,0,c9eaf260be716880ca796fe981cd87022ab8a92ceab0d36a88ce6c5ee05c86d3,2025-01-22T19:15:11.100000 CVE-2025-21519,0,0,953346c50dbdf4cef12c3fa84206e07ea88eb4d2d7232205446bca84001fdd28,2025-01-22T19:15:11.213000 -CVE-2025-2152,1,1,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000 +CVE-2025-2152,0,0,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000 CVE-2025-21520,0,0,a8393da1f727381379437de45c567aa2d807597d28fb46c2d614246a56f4d998,2025-01-22T19:15:11.340000 CVE-2025-21521,0,0,82cfbde2abe5d368e7cb3292856c6e197483ce94c21f4c3bf7942fb0fa7e28fa,2025-01-22T19:15:11.457000 CVE-2025-21522,0,0,cb66a3c1d1dfcbcb008084ba6cf867c8acb6791563e88e0edf7750492de7f060,2025-01-22T19:15:11.577000 @@ -281831,7 +281834,7 @@ CVE-2025-21526,0,0,fdac7cf5aa22219ce3d30e2931ce86c3afca18afa9001cd9d592ceb99fd98 CVE-2025-21527,0,0,fe6e17ba8c4f9cbb7443f4ecebffc8123cb250add87fccb4e7a78b1549e18f3c,2025-02-04T16:15:41.537000 CVE-2025-21528,0,0,e4a89dd052a14e910c273cde2b54814a4717a3a651bc8b5657a5be581524c187,2025-02-04T16:15:41.670000 CVE-2025-21529,0,0,4c7a012163f04cc8de95049169013b919bfdfb658a06c133c7cff3a918912f76,2025-02-18T21:15:25.577000 -CVE-2025-2153,1,1,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000 +CVE-2025-2153,0,0,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000 CVE-2025-21530,0,0,aba8a6aa74e189f13322985a854d7fce1ce0609f6c2ff755aa082cda64c94c2c,2025-02-18T21:15:25.703000 CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000 CVE-2025-21532,0,0,24d283ebf9e83eedc77bd765fab01c9d1c1c0ad92a193cdae6d8f4a7be52dad1,2025-02-18T21:15:25.820000 @@ -283947,6 +283950,7 @@ CVE-2025-25361,0,0,dd0fd4c24b78008e91609d0ad78fcd088a6f876ce651fa9ebadb9ad2df525 CVE-2025-25362,0,0,9cdfc22f6fba81a660a23fb14358e78116e49805e8504ef86ce8786368248ff5,2025-03-06T15:15:17.277000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25381,0,0,1a2bb06e970af8252b42b35cce67724a6bfba5c092f06ed50d25977950572c1a,2025-03-07T20:15:37.850000 +CVE-2025-25382,1,1,f4d7357828629f0991d4a631820157d6dc805fb951d13516fbb79d6f3367f88e,2025-03-10T16:15:13.393000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000 @@ -283998,9 +284002,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25615,1,1,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000 -CVE-2025-25616,1,1,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000 +CVE-2025-25614,1,1,c675990c7d380dd61a91c4658854dbebaa65b350bca03a6e567ad85dbe4d1974,2025-03-10T15:15:37.330000 +CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000 +CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000 CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000 +CVE-2025-25620,1,1,c97dc91c74c9312565adbd3deb243defc9e4012573757fad1b98f7080f6f489f,2025-03-10T15:15:37.490000 CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284076,6 +284082,7 @@ CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 +CVE-2025-25940,1,1,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000 CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000 CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000 CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000 @@ -284094,6 +284101,7 @@ CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8 CVE-2025-25967,0,0,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000 CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000 CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000 +CVE-2025-25977,1,1,bb550a41eadbb916b3aa5352e596b02014414ea85adec399ddf53ebef816beca,2025-03-10T16:15:13.633000 CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,8b2b3adef615c73806983235252325f570b2dccda1b7c0643592bd465b468928,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,5e1156693b620548738bd3f03c659034c8fa7558a7d1a0f45f9ae1ea86e44f07,2025-02-14T20:15:37.210000 @@ -284238,14 +284246,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000 CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000 CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000 -CVE-2025-26594,0,1,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000 -CVE-2025-26595,0,1,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000 -CVE-2025-26596,0,1,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000 -CVE-2025-26597,0,1,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000 -CVE-2025-26598,0,1,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000 -CVE-2025-26599,0,1,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000 -CVE-2025-26600,0,1,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000 -CVE-2025-26601,0,1,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000 +CVE-2025-26594,0,0,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000 +CVE-2025-26595,0,0,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000 +CVE-2025-26596,0,0,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000 +CVE-2025-26597,0,0,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000 +CVE-2025-26598,0,0,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000 +CVE-2025-26599,0,0,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000 +CVE-2025-26600,0,0,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000 +CVE-2025-26601,0,0,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000 CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000 CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000 CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000 @@ -284308,7 +284316,7 @@ CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 -CVE-2025-26865,1,1,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000 +CVE-2025-26865,0,0,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 CVE-2025-26876,0,0,951eb7449b154de578d3128a59b04224fb75a7c7aa4bcfeca0a4c24d809c64ec,2025-02-25T15:15:24.180000 @@ -284329,11 +284337,13 @@ CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702 CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000 CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 +CVE-2025-26910,1,1,4dd8ff18e0ceed65e66990b8d198f071259fe37bcbce427ec021ca038a8b4226,2025-03-10T15:15:37.660000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000 CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca3cc,2025-02-25T15:15:26.663000 CVE-2025-26914,0,0,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000 CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000 +CVE-2025-26916,1,1,c4eb40a7c438db2a0841bf5dfe4e66f1b955790d3c50ca241216d4ff7c7a6139,2025-03-10T15:15:37.830000 CVE-2025-26917,0,0,c1097030fbcc9b94d267c252ddacbb859283ed99e922157cf435c49676b50741,2025-03-03T14:15:56.640000 CVE-2025-26918,0,0,23788357a0b6dd77631565c9d4f3eb930266dadf051f40a3a97eb14cd9ad37b2,2025-03-03T14:15:56.787000 CVE-2025-26925,0,0,d5e509c3100c8df66ee25704b916843165e5ea195a85927b6d7f6a9a10386673,2025-02-26T14:15:11.743000 @@ -284341,7 +284351,9 @@ CVE-2025-26926,0,0,46670274056f543a2d8d831b8a506aef43cfadd1396d409b955b63f1e76e6 CVE-2025-26928,0,0,861f1ddc85c79a1a8d63021b4a752a7980136fff79059fb765bfdd66a75382c5,2025-02-25T15:15:27.067000 CVE-2025-26931,0,0,7680a16e5e4bc5cb7d571ec7522e8eb1da81a45543fb23fce8deb347b9f39cce,2025-02-25T15:15:27.200000 CVE-2025-26932,0,0,30e11ffe0fff9feb38697cc84d4135950611987600314e1279c1b8624ccdcf60,2025-02-25T15:15:27.337000 +CVE-2025-26933,1,1,923c4c91aeec786aadd94fb7553873b1b9d45a3b48f857802839df0fbfee89b3,2025-03-10T15:15:37.997000 CVE-2025-26935,0,0,9a8d29558b30c8784ffd5f723fd7b9a597b88af12b658cf1d4aa9a2c8103a0f0,2025-02-25T15:15:27.470000 +CVE-2025-26936,1,1,9d27fbfa1037e1a88a13f73270560d903b33ee9cc86389e8ebcad3245eccb6f5,2025-03-10T15:15:38.177000 CVE-2025-26937,0,0,fed4f7fb03e7e7397a66feffa07ed44235873cf8d6e3b0b63bd6710ca35b749c,2025-02-25T15:15:27.607000 CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb222e,2025-02-25T15:15:27.747000 CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000 @@ -284549,7 +284561,7 @@ CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000 -CVE-2025-27636,0,1,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000 +CVE-2025-27636,0,0,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000 CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000 @@ -284608,4 +284620,4 @@ CVE-2025-27824,0,0,bbbadd94bca912d17091ba5687790372eed06151266f5eb5403da18d55309 CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fee41,2025-03-07T22:15:38.380000 CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 -CVE-2025-27840,0,1,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 +CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000