From a925f2956198396a1859ecdab1a8a0f86f41b0cf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 27 Mar 2025 23:03:52 +0000 Subject: [PATCH] Auto-Update: 2025-03-27T23:00:21.041841+00:00 --- CVE-2021/CVE-2021-472xx/CVE-2021-47201.json | 119 +++++- CVE-2021/CVE-2021-472xx/CVE-2021-47203.json | 181 ++++++++- CVE-2021/CVE-2021-472xx/CVE-2021-47209.json | 80 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47210.json | 130 ++++++- CVE-2021/CVE-2021-472xx/CVE-2021-47212.json | 85 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47214.json | 90 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47215.json | 85 ++++- CVE-2022/CVE-2022-259xx/CVE-2022-25936.json | 12 +- CVE-2022/CVE-2022-259xx/CVE-2022-25967.json | 19 +- CVE-2022/CVE-2022-42xx/CVE-2022-4201.json | 12 +- CVE-2022/CVE-2022-42xx/CVE-2022-4205.json | 12 +- CVE-2022/CVE-2022-43xx/CVE-2022-4306.json | 22 +- CVE-2022/CVE-2022-47xx/CVE-2022-4776.json | 22 +- CVE-2022/CVE-2022-47xx/CVE-2022-4793.json | 22 +- CVE-2022/CVE-2022-483xx/CVE-2022-48303.json | 32 +- CVE-2022/CVE-2022-48xx/CVE-2022-4828.json | 22 +- CVE-2023/CVE-2023-223xx/CVE-2023-22322.json | 32 +- CVE-2023/CVE-2023-230xx/CVE-2023-23021.json | 34 +- CVE-2023/CVE-2023-233xx/CVE-2023-23331.json | 32 +- CVE-2023/CVE-2023-303xx/CVE-2023-30307.json | 39 +- CVE-2023/CVE-2023-383xx/CVE-2023-38302.json | 39 +- CVE-2023/CVE-2023-385xx/CVE-2023-38551.json | 14 +- CVE-2023/CVE-2023-429xx/CVE-2023-42952.json | 34 +- CVE-2023/CVE-2023-523xx/CVE-2023-52350.json | 34 +- CVE-2023/CVE-2023-523xx/CVE-2023-52359.json | 34 +- CVE-2023/CVE-2023-523xx/CVE-2023-52386.json | 34 +- CVE-2023/CVE-2023-526xx/CVE-2023-52642.json | 187 ++++++++- CVE-2024/CVE-2024-00xx/CVE-2024-0022.json | 34 +- CVE-2024/CVE-2024-03xx/CVE-2024-0399.json | 27 +- CVE-2024/CVE-2024-07xx/CVE-2024-0757.json | 39 +- CVE-2024/CVE-2024-14xx/CVE-2024-1401.json | 27 +- CVE-2024/CVE-2024-16xx/CVE-2024-1658.json | 27 +- CVE-2024/CVE-2024-209xx/CVE-2024-20937.json | 16 +- CVE-2024/CVE-2024-209xx/CVE-2024-20962.json | 16 +- CVE-2024/CVE-2024-210xx/CVE-2024-21039.json | 16 +- CVE-2024/CVE-2024-210xx/CVE-2024-21073.json | 16 +- CVE-2024/CVE-2024-211xx/CVE-2024-21111.json | 16 +- CVE-2024/CVE-2024-217xx/CVE-2024-21724.json | 24 +- CVE-2024/CVE-2024-220xx/CVE-2024-22054.json | 14 +- CVE-2024/CVE-2024-222xx/CVE-2024-22264.json | 14 +- CVE-2024/CVE-2024-225xx/CVE-2024-22524.json | 32 +- CVE-2024/CVE-2024-229xx/CVE-2024-22983.json | 27 +- CVE-2024/CVE-2024-232xx/CVE-2024-23232.json | 34 +- CVE-2024/CVE-2024-232xx/CVE-2024-23257.json | 34 +- CVE-2024/CVE-2024-232xx/CVE-2024-23292.json | 34 +- CVE-2024/CVE-2024-241xx/CVE-2024-24150.json | 32 +- CVE-2024/CVE-2024-242xx/CVE-2024-24275.json | 34 +- CVE-2024/CVE-2024-242xx/CVE-2024-24276.json | 34 +- CVE-2024/CVE-2024-243xx/CVE-2024-24389.json | 34 +- CVE-2024/CVE-2024-252xx/CVE-2024-25248.json | 34 +- CVE-2024/CVE-2024-256xx/CVE-2024-25615.json | 14 +- CVE-2024/CVE-2024-264xx/CVE-2024-26454.json | 39 +- CVE-2024/CVE-2024-268xx/CVE-2024-26806.json | 110 +++++- CVE-2024/CVE-2024-268xx/CVE-2024-26807.json | 162 +++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26811.json | 124 +++++- CVE-2024/CVE-2024-268xx/CVE-2024-26814.json | 178 ++++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26815.json | 138 ++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26816.json | 231 ++++++++++-- CVE-2024/CVE-2024-268xx/CVE-2024-26818.json | 117 +++++- CVE-2024/CVE-2024-268xx/CVE-2024-26820.json | 222 +++++++++-- CVE-2024/CVE-2024-274xx/CVE-2024-27437.json | 188 ++++++++- CVE-2024/CVE-2024-276xx/CVE-2024-27604.json | 34 +- CVE-2024/CVE-2024-280xx/CVE-2024-28084.json | 34 +- CVE-2024/CVE-2024-281xx/CVE-2024-28154.json | 34 +- CVE-2024/CVE-2024-281xx/CVE-2024-28156.json | 34 +- CVE-2024/CVE-2024-286xx/CVE-2024-28613.json | 34 +- CVE-2024/CVE-2024-292xx/CVE-2024-29225.json | 39 +- CVE-2024/CVE-2024-294xx/CVE-2024-29419.json | 34 +- CVE-2024/CVE-2024-297xx/CVE-2024-29754.json | 39 +- CVE-2024/CVE-2024-298xx/CVE-2024-29855.json | 14 +- CVE-2024/CVE-2024-306xx/CVE-2024-30614.json | 39 +- CVE-2024/CVE-2024-311xx/CVE-2024-31142.json | 39 +- CVE-2024/CVE-2024-333xx/CVE-2024-33307.json | 39 +- CVE-2024/CVE-2024-340xx/CVE-2024-34004.json | 27 +- CVE-2024/CVE-2024-348xx/CVE-2024-34899.json | 39 +- CVE-2024/CVE-2024-353xx/CVE-2024-35362.json | 39 +- CVE-2024/CVE-2024-363xx/CVE-2024-36306.json | 12 +- CVE-2024/CVE-2024-370xx/CVE-2024-37032.json | 39 +- CVE-2024/CVE-2024-37xx/CVE-2024-3787.json | 14 +- CVE-2024/CVE-2024-38xx/CVE-2024-3823.json | 27 +- CVE-2024/CVE-2024-40xx/CVE-2024-4009.json | 12 +- CVE-2024/CVE-2024-43xx/CVE-2024-4372.json | 27 +- CVE-2024/CVE-2024-47xx/CVE-2024-4750.json | 27 +- CVE-2024/CVE-2024-48xx/CVE-2024-4886.json | 22 +- CVE-2024/CVE-2024-550xx/CVE-2024-55070.json | 39 +- CVE-2025/CVE-2025-06xx/CVE-2025-0624.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22739.json | 56 +++ CVE-2025/CVE-2025-227xx/CVE-2025-22740.json | 56 +++ CVE-2025/CVE-2025-23xx/CVE-2025-2361.json | 6 +- CVE-2025/CVE-2025-246xx/CVE-2025-24662.json | 6 +- CVE-2025/CVE-2025-267xx/CVE-2025-26733.json | 56 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26873.json | 56 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26874.json | 56 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26890.json | 56 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26898.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26956.json | 56 +++ README.md | 73 ++-- _state.csv | 398 ++++++++++---------- 98 files changed, 4695 insertions(+), 575 deletions(-) create mode 100644 CVE-2025/CVE-2025-227xx/CVE-2025-22739.json create mode 100644 CVE-2025/CVE-2025-227xx/CVE-2025-22740.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26733.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26873.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26874.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26890.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26898.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26956.json diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json index ec545522119..9c7a8f4a466 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47201", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.123", - "lastModified": "2024-11-21T06:35:37.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:15:23.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iavf: libera q_vectors antes de las colas en iavf_disable_vf iavf_free_queues() borra adaptador->num_active_queues, del que depende iavf_free_q_vectors(), por lo que se debe intercambiar el orden de estas dos llamadas de funci\u00f3n en iavf_disable_vf(). Esto resuelve un p\u00e1nico que se produce cuando se deshabilita la interfaz y luego se vuelve a activar despu\u00e9s de que se restablece la comunicaci\u00f3n PF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.13", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "CAAC333B-58DB-4C4B-98C7-032C07430D26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/78638b47132244e3934dc5dc79f6372d5ce8e98c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89f22f129696ab53cfbc608e0a2184d0fea46ac1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/926e8c83d4c1c2dac0026637eb0d492df876489e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ef6589cac9a8c47f5544ccdf4c498093733bb3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78638b47132244e3934dc5dc79f6372d5ce8e98c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89f22f129696ab53cfbc608e0a2184d0fea46ac1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/926e8c83d4c1c2dac0026637eb0d492df876489e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ef6589cac9a8c47f5544ccdf4c498093733bb3f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json index a753aab765f..dc4c834eea6 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47203", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.217", - "lastModified": "2024-11-21T06:35:37.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:15:41.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,214 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se corrige la corrupci\u00f3n de list_add() en lpfc_drain_txq() Al analizar la lista txq en lpfc_drain_txq(), el controlador intenta pasar las solicitudes al adaptador. Si dicho intento falla, se establece una cadena \"fail_msg\" local y se genera un mensaje de registro. Luego, el trabajo se agrega a una lista de finalizaciones para su cancelaci\u00f3n. El procesamiento de cualquier otro trabajo de la lista txq contin\u00faa, pero como \"fail_msg\" permanece establecido, los trabajos se agregan a la lista de finalizaciones independientemente de si se pas\u00f3 un wqe al adaptador. Si se agrega correctamente a txcmplq, los trabajos se agregan a ambas listas, lo que da como resultado la corrupci\u00f3n de la lista. Se soluciona borrando la cadena fail_msg despu\u00e9s de agregar un trabajo a la lista de finalizaciones. Esto evita que los trabajos posteriores se agreguen a la lista de finalizaciones a menos que hayan tenido una falla apropiada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.293", + "matchCriteriaId": "83024F84-4857-4CAF-957E-C14804BAC4AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.291", + "matchCriteriaId": "8B1EE39E-FE30-4B7D-A26F-631135BCBB3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.256", + "matchCriteriaId": "FCEB92FF-21BF-4F75-ACA1-6AE1D51A79FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.218", + "matchCriteriaId": "4F85F433-5DEA-47D3-B07E-3B1AC474D6E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "51A152D8-D5CE-47BD-9041-DEE164DCE99D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json index f73960f6959..601de34cdde 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47209", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.447", - "lastModified": "2024-11-21T06:35:38.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:16:39.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/fair: Evitar que los grupos de tareas inactivos recuperen cfs_rq Kevin informa fallos que apuntan a un use-after-free de un cfs_rq en update_blocked_averages(). La depuraci\u00f3n inicial revel\u00f3 que tenemos cfs_rq activos (on_list=1) en un grupo de tareas a punto de ser kfree() en free_fair_sched_group(). Sin embargo, no estaba claro c\u00f3mo puede suceder eso. Su configuraci\u00f3n del kernel result\u00f3 en un dise\u00f1o de struct sched_entity que coloca el miembro 'my_q' directamente en el medio del objeto, lo que hace que se superponga incidentalmente con el puntero de lista libre de SLUB. Eso, en combinaci\u00f3n con la manipulaci\u00f3n del puntero de lista libre de SLAB_FREELIST_HARDENED, conduce a una violaci\u00f3n de acceso confiable en forma de un #GP que hizo que el UAF fallara r\u00e1pidamente. Michal parece haberse topado con el mismo problema[1]. \u00c9l ya diagnostic\u00f3 correctamente que el commit a7b359fc6a37 (\"sched/fair: Insertar correctamente cfs_rq en la lista al desregular\") est\u00e1 causando que se cumplan las condiciones previas para que se produzca la UAF al volver a agregar cfs_rq tambi\u00e9n a los grupos de tareas que ya no tienen tareas en ejecuci\u00f3n, es decir, tambi\u00e9n a los que est\u00e1n inactivos. Sin embargo, su an\u00e1lisis no detecta la causa ra\u00edz real y no se puede ver solo desde el backtrace del bloqueo, ya que el verdadero infractor es tg_unthrottle_up() que se llama a trav\u00e9s de sched_cfs_period_timer() mediante la interrupci\u00f3n del temporizador en un momento inconveniente. Cuando unregister_fair_sched_group() desvincula todos los cfs_rq del grupo de tareas que est\u00e1 inactivo, no se protege a s\u00ed mismo de ser interrumpido. Si la interrupci\u00f3n del temporizador se activa mientras iteramos sobre todas las CPU o despu\u00e9s de que unregister_fair_sched_group() haya terminado pero antes de desvincular el grupo de tareas, sched_cfs_period_timer() se ejecutar\u00e1 y recorrer\u00e1 la lista de grupos de tareas, intentando liberar cfs_rq, es decir, volver a agregarlos al grupo de tareas moribundo. Estos ser\u00e1n posteriormente -- en free_fair_sched_group() -- kfree()'ed mientras siguen vinculados, lo que lleva a los fuegos artificiales que Kevin y Michal est\u00e1n viendo. Para solucionar esta ejecuci\u00f3n, aseg\u00farese de que el grupo de tareas moribundo se desvincule primero. Sin embargo, simplemente cambiar el orden de anulaci\u00f3n del registro y desvinculaci\u00f3n del grupo de tareas no es suficiente, ya que los caminantes de RCU concurrentes a\u00fan podr\u00edan verlo, como se puede ver a continuaci\u00f3n: CPU1: CPU2: : timer IRQ: : do_sched_cfs_period_timer(): : : : distributed_cfs_runtime(): : rcu_read_lock(); : : : unthrottle_cfs_rq(): sched_offline_group(): : : walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026): list_del_rcu(&tg->list); : (1) : list_for_each_entry_rcu(child, &parent->children, brothers) : : (2) list_del_rcu(&tg->siblings); : : tg_unthrottle_up(): anular_registro_justo_sched_group(): struct cfs_rq *cfs_rq = tg->cfs_rq[cpu_of(rq)]; : : list_del_leaf_cfs_rq(tg->cfs_rq[cpu]); : : : : si (!cfs_rq_est\u00e1_deca\u00eddo(cfs_rq) || cfs_rq->nr_en_ejecuci\u00f3n) (3) : lista_agregar_hoja_cfs_rq(cfs_rq); : : : : : : : : : ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "172C15F0-CF2B-47F2-8931-3368DC97E4E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/512e21c150c1c3ee298852660f3a796e267e62ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b027789e5e50494c2325cc70c8642e7fd6059479", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/512e21c150c1c3ee298852660f3a796e267e62ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b027789e5e50494c2325cc70c8642e7fd6059479", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json index 88e63abe9c9..1ff84a9d979 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47210", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.497", - "lastModified": "2024-11-21T06:35:38.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:17:41.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,151 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: tipd: Eliminar WARN_ON en tps6598x_block_read Llamar a tps6598x_block_read con una longitud mayor que la permitida se puede solucionar simplemente devolviendo un error. No es necesario bloquear los sistemas con la funci\u00f3n de p\u00e1nico al advertir habilitada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.218", + "matchCriteriaId": "4EA92CE5-2AFA-4EA3-A037-2E68A1E6E6EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.162", + "matchCriteriaId": "51A152D8-D5CE-47BD-9041-DEE164DCE99D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.82", + "matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json index 98586f77213..329f9e19f0c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47212", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.597", - "lastModified": "2024-11-21T06:35:38.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:02:03.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,94 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Actualizar el controlador de errores para UCTX y UMEM En el flujo de descarga r\u00e1pida, el estado del dispositivo se establece en error interno, lo que indica que el controlador inici\u00f3 el proceso de destrucci\u00f3n. En este caso, cuando se ejecuta un comando de destrucci\u00f3n, debe devolver MLX5_CMD_STAT_OK. Corrija MLX5_CMD_OP_DESTROY_UCTX y MLX5_CMD_OP_DESTROY_UMEM para que devuelvan OK en lugar de EIO. Esto corrige un seguimiento de llamadas en el proceso de lanzamiento de umem - [ 2633.536695] Seguimiento de llamadas: [ 2633.537518] ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs] [ 2633.538596] remove_client_context+0x8b/0xd0 [ib_core] [ 2633.539641] deshabilitar_device+0x8c/0x130 [ib_core] [ 2633.540615] __ib_unregister_device+0x35/0xa0 [ib_core] [ 2633.541640] ib_unregister_device+0x21/0x30 [ib_core] [ 2633.542663] __mlx5_ib_remove+0x38/0x90 [mlx5_ib] [ 2633.543640] bus_auxiliar_eliminar+0x1e/0x30 [auxiliar] [ 2633.544661] dispositivo_liberaci\u00f3n_controlador_interno+0x103/0x1f0 [ 2633.545679] bus_eliminar_dispositivo+0xf7/0x170 [ 2633.546640] dispositivo_del+0x181/0x410 [ 2633.547606] mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core] [ 2633.548777] mlx5_anular_registro_dispositivo+0x27/0x40 [mlx5_core] [ 2633.549841] mlx5_uninit_one+0x21/0xc0 [mlx5_core] [ 2633.550864] remove_one+0x69/0xe0 [mlx5_core] [ 2633.551819] pci_device_remove+0x3b/0xc0 [ 2633.552731] device_release_driver_internal+0x103/0x1f0 [ 2633.553746] unbind_store+0xf6/0x130 [ 2633.554657] kernfs_fop_write+0x116/0x190 [ 2633.555567] vfs_write+0xa5/0x1a0 [ 2633.556407] ksys_write+0x4f/0xb0 [ 2633.557233] do_syscall_64+0x5b/0x1a0 [ 2633.558071] entry_SYSCALL_64_after_hwframe+0x65/0xca [ 2633.559018] RIP: 0033:0x7f9977132648 [ 2633.559821] C\u00f3digo: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55 [ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648 [ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001 [ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740 [ 2633.566653] R10: 000000000000000 R11: 0000000000000246 R12: 00007f99774056e0 [ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c [ 2633.568725] ---[ fin de seguimiento 10b4fe52945e544d ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "F77953F3-06B8-4DF3-8B46-B116AAD86BB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a51a6da375d82aed5c8f83abd13e7d060421bd48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba50cd9451f6c49cf0841c0a4a146ff6a2822699", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a51a6da375d82aed5c8f83abd13e7d060421bd48", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba50cd9451f6c49cf0841c0a4a146ff6a2822699", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json index ebd41264e1a..471e6559731 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47214", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.680", - "lastModified": "2024-11-21T06:35:38.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:05:27.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,99 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hugetlb, userfaultfd: se corrige el error de restauraci\u00f3n de reserva en userfaultfd Actualmente, en el caso is_continue en hugetlb_mcopy_atomic_pte(), si salimos usando \"goto out_release_unlock;\" en los casos donde idx >= size, o !huge_pte_none(), el c\u00f3digo detectar\u00e1 que new_pagecache_page == false, y por lo tanto llamar\u00e1 a restore_reserve_on_error(). En este caso, veo que restore_reserve_on_error() elimina la reserva, y la siguiente llamada a remove_inode_hugepages() incrementar\u00e1 h->resv_hugepages causando una fuga 100% reproducible. Deber\u00edamos tratar el caso is_continue de forma similar a agregar una p\u00e1gina al pagecache y establecer new_pagecache_page en true, para indicar que no hay ninguna reserva para restaurar en la ruta del error, y no necesitamos llamar a restore_reserve_on_error(). Cambie el nombre new_pagecache_page a page_in_pagecache para que quede claro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "53E796CA-D377-4F91-8FF4-33D9CAC9A4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13.13:*:*:*:*:*:*:*", + "matchCriteriaId": "6047C65C-29BB-4EDB-B410-FA269D2877D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b5069d44e2fbc4a9093d005b3ef0949add3dd27e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc30042df6fcc82ea18acf0dace831503e60a0b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5069d44e2fbc4a9093d005b3ef0949add3dd27e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc30042df6fcc82ea18acf0dace831503e60a0b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json index ff6b2a4d4eb..e75662c0927 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47215", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:48.727", - "lastModified": "2024-11-21T06:35:38.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:05:34.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,94 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: kTLS, se corrige un fallo en el flujo de resincronizaci\u00f3n RX Para el flujo de resincronizaci\u00f3n RX de TLS, mantenemos una lista de contextos TLS que requieren cierta atenci\u00f3n para comunicar su informaci\u00f3n de resincronizaci\u00f3n al hardware. Aqu\u00ed corregimos las corrupciones de la lista al proteger las entradas contra los movimientos provenientes de resync_handle_seq_match(), hasta que se complete por completo su manejo de resincronizaci\u00f3n en napi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "172C15F0-CF2B-47F2-8931-3368DC97E4E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebeda7a9528ae690e6bf12791a868f0cca8391f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebeda7a9528ae690e6bf12791a868f0cca8391f2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-259xx/CVE-2022-25936.json b/CVE-2022/CVE-2022-259xx/CVE-2022-25936.json index 0a03eddee34..ad673bb21d2 100644 --- a/CVE-2022/CVE-2022-259xx/CVE-2022-25936.json +++ b/CVE-2022/CVE-2022-259xx/CVE-2022-25936.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25936", "sourceIdentifier": "report@snyk.io", "published": "2023-01-30T05:15:10.057", - "lastModified": "2024-11-21T06:53:14.680", + "lastModified": "2025-03-27T21:15:39.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-259xx/CVE-2022-25967.json b/CVE-2022/CVE-2022-259xx/CVE-2022-25967.json index b4c7fc30955..35132472247 100644 --- a/CVE-2022/CVE-2022-259xx/CVE-2022-25967.json +++ b/CVE-2022/CVE-2022-259xx/CVE-2022-25967.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25967", "sourceIdentifier": "report@snyk.io", "published": "2023-01-30T05:15:10.177", - "lastModified": "2024-11-21T06:53:16.090", + "lastModified": "2025-03-27T21:15:40.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ @@ -157,6 +167,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JS-ETA-2936803", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4201.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4201.json index 0bc0546ea2c..161633451ae 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4201.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4201.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4201", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-27T22:15:08.913", - "lastModified": "2024-11-21T07:34:46.233", + "lastModified": "2025-03-27T21:15:40.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4205.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4205.json index b86f6e3fc81..75b76390212 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4205.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4205.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4205", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-27T22:15:08.997", - "lastModified": "2024-11-21T07:34:46.597", + "lastModified": "2025-03-27T21:15:40.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4306.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4306.json index b20b9232ccc..42bddfa6722 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4306.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4306.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4306", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:10.510", - "lastModified": "2024-11-21T07:34:58.863", + "lastModified": "2025-03-27T21:15:41.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4776.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4776.json index 37bc51e73e9..8e5d03a39b6 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4776.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4776.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4776", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:12.190", - "lastModified": "2024-11-21T07:35:55.227", + "lastModified": "2025-03-27T21:15:41.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4793.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4793.json index 3444ad0e36f..ec51ee6c65b 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4793.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4793.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4793", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:12.477", - "lastModified": "2024-11-21T07:35:57.187", + "lastModified": "2025-03-27T21:15:41.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48303.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48303.json index 9e873f59d70..f41063f7bea 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48303.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48303.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48303", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T04:15:08.030", - "lastModified": "2024-11-21T07:33:07.547", + "lastModified": "2025-03-27T21:15:40.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4828.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4828.json index c8fe6a22f93..f39d8c99b57 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4828.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4828.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4828", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:12.627", - "lastModified": "2024-11-21T07:36:01.580", + "lastModified": "2025-03-27T21:15:41.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22322.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22322.json index 636c1733ad7..c14f5944c57 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22322.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22322.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22322", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-30T07:15:09.237", - "lastModified": "2024-11-21T07:44:31.633", + "lastModified": "2025-03-27T21:15:41.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23021.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23021.json index f2c7a79957e..2901ab3f3f3 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23021.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23021.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23021", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:21.027", - "lastModified": "2025-02-21T18:53:16.480", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:41.857", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23331.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23331.json index 65521ce409b..2284d0a72aa 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23331.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23331.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23331", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-24T01:15:10.683", - "lastModified": "2024-11-21T07:46:00.377", + "lastModified": "2025-03-27T21:15:42.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30307.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30307.json index 6a4a7632ea7..b6769737fa1 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30307.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30307.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30307", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:20.383", - "lastModified": "2024-11-21T07:59:59.780", + "lastModified": "2025-03-27T21:15:42.407", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en los enrutadores TP-LINK TL-R473GP-AC, TP-LINK XDR6020, TP-LINK TL-R479GP-AC, TP-LINK TL-R4239G, TP-LINK TL-WAR1200L y TP-LINK TL-R476G permite los atacantes secuestran sesiones TCP, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/", diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38302.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38302.json index 59e43fa8acf..21da438d0a0 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38302.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38302.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38302", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.313", - "lastModified": "2024-11-21T08:13:16.783", + "lastModified": "2025-03-27T21:15:42.617", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Cierta compilaci\u00f3n de software para el dispositivo Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys) filtra la direcci\u00f3n MAC de Wi-Fi y la direcci\u00f3n MAC de Bluetooth a las propiedades del sistema a las que se puede acceder por cualquier aplicaci\u00f3n local en el dispositivo sin ning\u00fan permiso o privilegio especial. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en este caso se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"ro.boot.wifi_mac\" para obtener indirectamente la direcci\u00f3n MAC de Wi-Fi y lee la propiedad del sistema \"ro.boot.bt_mac\" para obtener la direcci\u00f3n MAC de Bluetooth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38551.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38551.json index 4eecd541146..7fd19908e3a 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38551.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38551.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38551", "sourceIdentifier": "support@hackerone.com", "published": "2024-05-31T18:15:09.780", - "lastModified": "2024-11-21T08:13:48.717", + "lastModified": "2025-03-27T21:15:42.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42952.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42952.json index 08004ba79c7..70b48ba9b96 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42952.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42952.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42952", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:51.510", - "lastModified": "2024-12-05T19:56:22.987", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:42.933", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52350.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52350.json index d87aa903391..7a7a1444769 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52350.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52350.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52350", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.687", - "lastModified": "2024-11-27T16:22:44.777", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:43.130", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52359.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52359.json index f89a5dc0b39..57ae2c56d57 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52359.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52359", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.293", - "lastModified": "2024-12-09T18:03:10.427", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:43.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json index 1a0c1955182..66964d20779 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52386.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52386", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T10:15:08.487", - "lastModified": "2024-12-09T18:01:30.060", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:43.500", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json index 69556f64482..b3198d0f4b2 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52642", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.447", - "lastModified": "2024-11-21T08:40:16.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:05:43.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,214 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: rc: bpf adjunto/detach requiere permiso de escritura. Tenga en cuenta que bpf adjunto/detach tambi\u00e9n requiere CAP_NET_ADMIN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "24443040-F8E0-445D-8395-40A94214526C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6a9d552483d50953320b9d3b57abdee8d436f23f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93136132d1b5792bf44151e3494ae3691cd738e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93d8109bf182510629bbefc8cd45296d2393987f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f6087851ec6dce5b15f694aeaf3e8ec8243224e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/caf2da1d4562de4e35eedec0be2b7f1ee25d83be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d98210108e7b2ff64b332b0a3541c8ad6a0617b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a9d552483d50953320b9d3b57abdee8d436f23f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93136132d1b5792bf44151e3494ae3691cd738e8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93d8109bf182510629bbefc8cd45296d2393987f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f6087851ec6dce5b15f694aeaf3e8ec8243224e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/caf2da1d4562de4e35eedec0be2b7f1ee25d83be", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d98210108e7b2ff64b332b0a3541c8ad6a0617b0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0022.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0022.json index a56a7aa5b46..69ce6638b8b 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0022.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0022", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.330", - "lastModified": "2024-11-25T13:52:21.147", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:43.683", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json index 94d717841a4..b6979fd54b7 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0399.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0399", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.627", - "lastModified": "2024-11-21T08:46:29.970", + "lastModified": "2025-03-27T21:15:43.857", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WooCommerce Customers Manager de WordPress anterior a la versi\u00f3n 29.7 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por el rol Suscriptor+." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0757.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0757.json index 9b1598a3146..cb3a8bc7ecc 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0757.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0757.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0757", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:08.707", - "lastModified": "2024-11-21T08:47:18.487", + "lastModified": "2025-03-27T21:15:44.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Insert or Embed Articulate Content en WordPress hasta 4.3000000023 no filtra correctamente qu\u00e9 extensiones de archivo pueden importarse en el servidor, lo que permite cargar c\u00f3digo malicioso dentro de archivos zip." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/eccd017c-e442-46b6-b5e6-aec7bbd5f836/", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1401.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1401.json index 048818c4636..ad593515a1c 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1401.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1401.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1401", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-19T15:15:07.183", - "lastModified": "2024-11-21T08:50:30.317", + "lastModified": "2025-03-27T21:15:44.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Profile Box Shortcode And Widget de WordPress anterior a 1.2.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1658.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1658.json index 1f1aceb4a85..127b874175a 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1658.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1658.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1658", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T16:15:07.227", - "lastModified": "2024-11-21T08:51:01.347", + "lastModified": "2025-03-27T22:15:14.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Grid Shortcodes de WordPress anterior a 1.1.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar un ataque de Cross-Site Scripting Almacenado" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20937.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20937.json index 35445c37c7e..a873305a6cd 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20937.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20937", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:48.227", - "lastModified": "2024-11-29T14:08:17.250", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T22:15:15.273", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20962.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20962.json index e676ccb82a2..2e22f2293a6 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20962.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20962", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:50.207", - "lastModified": "2024-11-29T14:06:30.670", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:44.353", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21039.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21039.json index a58d6f3f3b1..81d8b7c77f9 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21039.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21039.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21039", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:20.260", - "lastModified": "2024-11-27T16:29:33.007", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:44.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21073.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21073.json index 14001f985d3..1a3d7bfd97f 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21073.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21073", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:26.190", - "lastModified": "2024-12-04T16:28:30.120", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:44.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21111.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21111.json index f0d2103b525..7f5acae87d0 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21111.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21111", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:32.780", - "lastModified": "2024-12-05T15:16:10.643", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:44.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json index 485e55771af..782a8856a7c 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21724", "sourceIdentifier": "security@joomla.org", "published": "2024-02-29T01:44:03.773", - "lastModified": "2025-02-14T17:24:52.837", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T22:15:15.453", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22054.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22054.json index 1a2c768b6b9..ed398d804aa 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22054.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22054.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22054", "sourceIdentifier": "support@hackerone.com", "published": "2024-02-20T18:15:51.393", - "lastModified": "2024-11-21T08:55:28.447", + "lastModified": "2025-03-27T21:15:44.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22264.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22264.json index e069fd8687a..54b383db3aa 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22264.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22264.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22264", "sourceIdentifier": "security@vmware.com", "published": "2024-05-08T04:15:08.900", - "lastModified": "2024-11-21T08:55:55.360", + "lastModified": "2025-03-27T21:15:45.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24219", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json index cc1b4b5cb1d..9e35ccf6d92 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22524", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.043", - "lastModified": "2024-11-21T08:56:24.203", + "lastModified": "2025-03-27T21:15:45.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22983.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22983.json index aae11fb3840..c2895bba689 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22983.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22983", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T22:15:26.453", - "lastModified": "2024-11-21T08:56:50.910", + "lastModified": "2025-03-27T22:15:15.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Projectworlds Visitor Management System en PHP v.1.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del par\u00e1metro de nombre en el endpoint myform.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23232.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23232.json index 9bceb086ddf..c64fd8fe754 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23232.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23232", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.833", - "lastModified": "2024-12-05T19:50:23.700", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:45.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23257.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23257.json index 278e99921fe..10a1fe03058 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23257.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23257", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.760", - "lastModified": "2024-12-20T17:08:48.080", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T22:15:15.830", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json index ec4f2ecf547..2878d606fb8 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23292", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:50.257", - "lastModified": "2024-12-09T14:39:31.653", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:45.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24150.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24150.json index 4e8662fc874..794f2c79416 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24150.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24150.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24150", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:11.777", - "lastModified": "2024-11-21T08:58:59.480", + "lastModified": "2025-03-27T21:15:45.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24275.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24275.json index 9e4d151cc3c..e17d72df523 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24275.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24275", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T23:15:07.520", - "lastModified": "2025-02-18T13:44:28.043", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:45.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24276.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24276.json index a44aa0564d7..e199739d797 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24276.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24276", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T23:15:07.583", - "lastModified": "2025-02-18T13:44:14.953", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:46.123", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json index 48f7dd8b69b..ef06b6e3fa1 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24389", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T02:15:51.970", - "lastModified": "2025-03-04T14:23:03.773", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:46.297", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25248.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25248.json index 12238ca7401..2053b966aa8 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25248.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25248", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T22:15:07.003", - "lastModified": "2025-02-14T16:22:09.803", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:46.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25615.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25615.json index 2c6f272825f..0b57d67b88d 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25615.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25615.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25615", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-03-05T21:15:08.637", - "lastModified": "2024-11-21T09:01:05.260", + "lastModified": "2025-03-27T21:15:46.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json index 2b4f22fd209..8630a1a4ece 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26454.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26454", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T01:15:58.780", - "lastModified": "2024-11-21T09:02:25.983", + "lastModified": "2025-03-27T21:15:46.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting en Healthcare-Chatbot hasta 9b7058a puede ocurrir a trav\u00e9s de un payload manipulado en el par\u00e1metro email1 o pwd1 en login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26806.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26806.json index d5b143446fb..7ec35b80f12 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26806.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26806.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26806", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.333", - "lastModified": "2024-11-21T09:03:07.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:30:21.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,119 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: cadence-qspi: elimina las llamadas auxiliares de suspensi\u00f3n en todo el sistema desde los ganchos PM en tiempo de ejecuci\u00f3n No se espera que las devoluciones de llamada ->runtime_suspend() y ->runtime_resume() llamen a spi_controller_suspend() y spi_controller_resume(). Elimina llamadas a aquellos en el controlador cadence-qspi. Esos ayudantes tienen actualmente dos funciones: - Detienen/inician la cola, incluido el trato con el kworker. - Alternan el indicador SPI_CONTROLLER_SUSPENDED del controlador SPI. Requiere adquirir ctlr->bus_lock_mutex. El primer paso es irrelevante porque cadence-qspi no est\u00e1 en cola. Sin embargo, el segundo paso tiene dos implicaciones: - Se produce un punto muerto, porque ->runtime_resume() se llama en un contexto donde el bloqueo ya est\u00e1 tomado (en la devoluci\u00f3n de llamada ->exec_op(), donde se incrementa el recuento de uso). - No permitir\u00eda todas las operaciones una vez que el dispositivo se autosuspenda. Aqu\u00ed hay un breve \u00e1rbol de llamadas que resalta el interbloqueo mutex: spi_mem_exec_op() ... spi_mem_access_start() mutex_lock(&ctlr->bus_lock_mutex) cqspi_exec_mem_op() pm_runtime_resume_and_get() cqspi_resume() spi_controller_resume() mutex_lock(&ctlr->bus_lock_mutex) ... spi_mem _acceso_end () mutex_unlock(&ctlr->bus_lock_mutex) ..." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26807.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26807.json index 162bebd2079..82bcb20e179 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26807.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26807", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.380", - "lastModified": "2024-11-21T09:03:07.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:35:59.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,175 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: cadence-qspi: corrige la referencia del puntero en los ganchos PM en tiempo de ejecuci\u00f3n dev_get_drvdata() se utiliza para adquirir el puntero a cqspi y el controlador SPI. Ninguno de los dos integra al otro; Esto conduce a la corrupci\u00f3n de la memoria. En una plataforma determinada (Mobileye EyeQ5), la corrupci\u00f3n de la memoria est\u00e1 oculta dentro de cqspi->f_pdata. Adem\u00e1s, esta memoria no inicializada se utiliza como mutex (ctlr->bus_lock_mutex) por spi_controller_suspend()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "584D76D2-1164-4D5F-A720-182A249B363A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*", + "matchCriteriaId": "D218D46E-9A95-4C75-A4D1-2C8957EFF613" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*", + "matchCriteriaId": "1F43B313-8B49-45C5-BA3F-43A00C1ABFDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*", + "matchCriteriaId": "E57BBF5A-3C2F-4683-90E9-C55C20DA0392" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*", + "matchCriteriaId": "B8400C3E-16EB-4BE1-BFF2-F165B9C6C2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "063461C2-6DB7-4D4D-90A5-FF26944C693A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "4CB13E07-8733-47AA-B47A-ABC9AA44E4F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E9ED291-2EE9-4BE1-8925-FD7F622D1012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03f1573c9587029730ca68503f5062105b122f61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32ce3bb57b6b402de2aec1012511e7ac4e7449dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/03f1573c9587029730ca68503f5062105b122f61", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32ce3bb57b6b402de2aec1012511e7ac4e7449dc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json index 9290eac6200..90b8e5fa701 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26811", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-08T10:15:08.540", - "lastModified": "2024-11-21T09:03:07.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:37:50.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,145 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ksmbd: validar el tama\u00f1o del payload en la respuesta de ipc Si instala herramientas ksmbd maliciosas, ksmbd.mountd puede devolver una respuesta de ipc no v\u00e1lida al servidor del kernel de ksmbd. ksmbd debe validar el tama\u00f1o del payload de la respuesta ipc de ksmbd.mountd para evitar el desbordamiento de la memoria o los l\u00edmites. Este parche valida 3 respuestas ipc que tienen payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9", + "matchCriteriaId": "18FE1EAE-C36C-49FC-A5E0-0A661CDC561E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*", + "matchCriteriaId": "3F2A4A3D-068A-4CF2-A09F-9C7937DDB0A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26814.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26814.json index 43294daf32b..eb9046ec4b0 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26814.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26814", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-05T09:15:09.393", - "lastModified": "2024-11-21T09:03:08.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:36:57.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,209 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vfio/fsl-mc: Bloquear el controlador de interrupciones de llamada sin disparador. El puntero de disparo eventfd_ctx del objeto vfio_fsl_mc_irq es inicialmente NULL y puede convertirse en NULL si el usuario establece el disparador eventfd en -1. El propio controlador de interrupciones garantiza que el disparador siempre ser\u00e1 v\u00e1lido entre request_irq() y free_irq(), pero los mecanismos de prueba de bucle invertido para invocar la funci\u00f3n del controlador deben probar el disparador. Las rutas de activaci\u00f3n y configuraci\u00f3n de ioctl utilizan igate y, por lo tanto, son mutuamente excluyentes. El controlador vfio-fsl-mc no utiliza irqfds ni admite ning\u00fan tipo de operaci\u00f3n de enmascaramiento; por lo tanto, a diferencia de vfio-pci y vfio-platform, el flujo puede permanecer esencialmente sin cambios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "39E99A59-C6E2-4A27-972D-AC7C8F99D7C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.4", + "versionEndIncluding": "6.8.12", + "matchCriteriaId": "8FE7815E-A5E1-4B71-A901-16FF3B224E48" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json index 3a575805eca..bcdacaf9b71 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26815", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T11:15:49.380", - "lastModified": "2024-11-21T09:03:08.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:09:57.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: taprio: verificaci\u00f3n adecuada de TCA_TAPRIO_TC_ENTRY_INDEX taprio_parse_tc_entry() no verifica correctamente el atributo TCA_TAPRIO_TC_ENTRY_INDEX: int tc; // Valor con signo tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]); if (tc >= TC_QOPT_MAX_QUEUE) { NL_SET_ERR_MSG_MOD(extack, \"\u00edndice de entrada TC fuera de rango\"); volver -RANGE; } syzbot inform\u00f3 que pod\u00eda alimentar valores negativos arbitrarios: UBSAN: desplazamiento fuera de los l\u00edmites en net/sched/sch_taprio.c:1722:18 exponente de desplazamiento -2147418108 es negativo CPU: 0 PID: 5066 Comm: syz-executor367 No tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 29/02/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386 taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [ en l\u00ednea] taprio_parse_tc_entries net /sched/sch_taprio.c:1768 [en l\u00ednea] taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877 taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134 qdisc_create+0x9d4/0x1190 net/sched/sch_api. c:1355 tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_ker nel net/netlink/ AF_NETLINK.C: 1341 [en l\u00ednea] netlink_unicast+0x7ea/0x980 net/netlink/AF_netLink.c: 1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c: 1908 sock_sendmsg_nosec net/socket.c: 730 [730] 1 /0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/ 0x240 entrada_SYSCALL_64_after_hwframe +0x6f/0x77 RIP: 0033:0x7f1b2dea3759 C\u00f3digo: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 8 9c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002e RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000 R10: 0000555500000000 R 11: 0000000000000246 R12: 00007ffd4de45340 R13: 00007ffd4de45310 R14: 00000000000000001 R15: 00007ffd4de45340" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "3057E4AB-0FB4-49B3-B63D-10D187B96B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.3", + "versionEndIncluding": "6.8.12", + "matchCriteriaId": "B71866A7-EBBC-450A-A34B-D42B21232828" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json index 8c9b6b66d75..c5e297b7688 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26816", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T14:15:07.490", - "lastModified": "2024-11-21T09:03:08.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:10:26.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,272 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86, relocs: ignorar reubicaciones en la secci\u00f3n .notes Al compilar con CONFIG_XEN_PV=y, los s\u00edmbolos .text se emiten en la secci\u00f3n .notes para que Xen pueda encontrar el punto de entrada \"startup_xen\" . Esta informaci\u00f3n se utiliza antes de iniciar el kernel, por lo que las reubicaciones no son \u00fatiles. De hecho, realizar reubicaciones en la secci\u00f3n .notes significa que la base KASLR est\u00e1 expuesta ya que /sys/kernel/notes es legible en todo el mundo. Para evitar filtrar la base de KASLR sin da\u00f1ar las herramientas sin privilegios que esperan leer /sys/kernel/notes, omita realizar reubicaciones en la secci\u00f3n .notes. Los valores legibles en .notes son id\u00e9nticos a los que se encuentran en System.map." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.23", + "versionEndExcluding": "4.19.311", + "matchCriteriaId": "686D6C3D-0C09-4C39-9651-BB0C3639BB0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.3", + "versionEndIncluding": "6.8.12", + "matchCriteriaId": "B71866A7-EBBC-450A-A34B-D42B21232828" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13edb509abc91c72152a11baaf0e7c060a312e03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47635b112a64b7b208224962471e7e42f110e723", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52018aa146e3cf76569a9b1e6e49a2b7c8d4a088", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cb59db49c9c0fccfd33b2209af4f7ae3c6ddf40", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4e7ff1a74274e59a2de9bb57236542aa990d20a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaa8736370db1a78f0e8434344a484f9fd20be3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae7079238f6faf1b94accfccf334e98b46a0c0aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2a9f98d884205145fd155304a6955822ccca1c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7cff9780297d55d97ad068b68b703cfe53ef9af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13edb509abc91c72152a11baaf0e7c060a312e03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47635b112a64b7b208224962471e7e42f110e723", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52018aa146e3cf76569a9b1e6e49a2b7c8d4a088", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cb59db49c9c0fccfd33b2209af4f7ae3c6ddf40", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4e7ff1a74274e59a2de9bb57236542aa990d20a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaa8736370db1a78f0e8434344a484f9fd20be3b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae7079238f6faf1b94accfccf334e98b46a0c0aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af2a9f98d884205145fd155304a6955822ccca1c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7cff9780297d55d97ad068b68b703cfe53ef9af", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26818.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26818.json index 0ebd7af06cd..990311c5282 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26818.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26818", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.757", - "lastModified": "2024-11-21T09:03:08.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:07:41.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: herramientas/rtla: Repare la advertencia de clang sobre el tama\u00f1o de var de mount_point clang informa esta advertencia: $ make HOSTCC=clang CC=clang LLVM_IAS=1 [...] clang -O -g -DVERSION=\\\"6.8.0-rc3\\\" -flto=auto -fExceptions -fstack-protector-strong -fasynchronous-unwind-tables -fstack-clash-protection -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE= 2 -Wp,-D_GLIBCXX_ASSERTIONS $(pkg-config --cflags libtracefs) -c -o src/utils.o src/utils.c src/utils.c:548:66: advertencia: 'fscanf' puede desbordarse; el b\u00fafer de destino en el argumento 3 tiene un tama\u00f1o 1024, pero el especificador correspondiente puede requerir un tama\u00f1o 1025 [-Wfortify-source] 548 | while (fscanf(fp, \"%*s %\" STR(MAX_PATH) \"s %99s %*s %*d %*d\\n\", punto_montaje, tipo) == 2) { | ^ Aumente el tama\u00f1o de la variable mount_point a MAX_PATH+1 para evitar el desbordamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "66A88832-B39F-48D0-BFA1-F660E52CE523" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json index 390b161fbf9..ea5da7f497d 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26820", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.867", - "lastModified": "2024-11-21T09:03:08.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:08:08.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,259 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hv_netvsc: registre VF en netvsc_probe si se perdi\u00f3 NET_DEVICE_REGISTER. Si el controlador hv_netvsc se descarga y se vuelve a cargar, el controlador NET_DEVICE_REGISTER no puede realizar el registro VF exitosamente ya que la llamada de registro se recibe antes de que finalice netvsc_probe. Esto se debe a que registramos Register_netdevice_notifier() muy temprano (incluso antes de vmbus_driver_register()). Para solucionar este problema, intentamos registrar cada VF coincidente (si es visible como un dispositivo de red) al final de netvsc_probe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.301", + "versionEndExcluding": "4.19.310", + "matchCriteriaId": "0C102B83-9358-4BD1-9297-1A94BEA3DDED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.263", + "versionEndExcluding": "5.4.272", + "matchCriteriaId": "AF41893B-0886-4293-AA61-5C6B08DD535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.203", + "versionEndExcluding": "5.10.213", + "matchCriteriaId": "127C0358-D61B-4AD7-A81A-5178B3DD562F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.141", + "versionEndExcluding": "5.15.152", + "matchCriteriaId": "4E9B2BFF-389B-4E68-B2C3-4DF136E83E21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.65", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "85FE2B5D-00C2-4E9F-9867-2DDD88EFA68B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.4", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "96EC0E0A-8E36-415A-86C1-EA5EA917A06F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27437.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27437.json index c7e0f0932a1..ad842905da5 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27437.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27437.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27437", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-05T09:15:09.443", - "lastModified": "2024-11-21T09:04:36.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-27T21:37:24.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,75 +15,223 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/pci: deshabilita la habilitaci\u00f3n autom\u00e1tica de INTx IRQ exclusivo. Actualmente, para dispositivos que requieren enmascaramiento en el irqchip para INTx, es decir. En dispositivos sin soporte DisINTx, la IRQ se habilita en request_irq() y posteriormente se deshabilita seg\u00fan sea necesario para alinearse con el indicador de estado enmascarado. Esto presenta una ventana donde la interrupci\u00f3n podr\u00eda dispararse entre estos eventos, lo que hace que la IRQ incremente la profundidad de desactivaci\u00f3n dos veces. Esto ser\u00eda irrecuperable para un usuario ya que el indicador enmascarado impide las habilitaciones anidadas a trav\u00e9s de vfio. En su lugar, invierta la l\u00f3gica usando IRQF_NO_AUTOEN de modo que INTx exclusivo nunca se habilite autom\u00e1ticamente, luego desenmascare seg\u00fan sea necesario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.6", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "ADFF9FF1-413F-4606-9C95-7A20215ACD86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.4", + "versionEndIncluding": "6.8.12", + "matchCriteriaId": "8FE7815E-A5E1-4B71-A901-16FF3B224E48" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27604.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27604.json index 18831ec24f3..af10ad39e1e 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27604.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27604", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T21:15:46.010", - "lastModified": "2025-02-27T18:15:41.613", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T22:15:16.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28084.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28084.json index 16ced100a04..6067dff7e57 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28084.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28084", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-03T21:15:49.963", - "lastModified": "2025-01-08T15:50:22.960", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:46.983", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json index eb7f3d362c3..d898ae5d043 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28154", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.733", - "lastModified": "2025-01-19T02:36:34.320", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:47.183", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json index ffdee482ead..7bb25ec97f2 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28156", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.837", - "lastModified": "2025-01-19T02:27:21.977", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:47.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json index adc13ed4f65..d421c0b393f 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28613", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-24T04:15:18.820", - "lastModified": "2025-03-06T15:51:21.690", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:47.510", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29225.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29225.json index d86916902bb..8e383580685 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29225.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29225.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29225", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-04T00:15:07.200", - "lastModified": "2024-11-21T09:07:51.173", + "lastModified": "2025-03-27T21:15:47.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "WRC-X3200GST3-B v1.25 y anteriores, y WRC-G01-W v1.24 y anteriores permiten que un atacante no autenticado adyacente a la red obtenga el archivo de configuraci\u00f3n que contiene informaci\u00f3n confidencial enviando una solicitud especialmente manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU95381465/", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json index c1c44088011..dd2dca7ab65 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29419", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T15:15:07.967", - "lastModified": "2025-03-10T15:33:52.230", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:47.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json index 86473e2e6c1..87ed3dfa486 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29754.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29754", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-04-05T20:15:08.717", - "lastModified": "2024-11-21T09:08:15.260", + "lastModified": "2025-03-27T21:15:48.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En TMU_IPC_GET_TABLE, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-04-01", diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29855.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29855.json index 4214d4f5bad..77663c199ee 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29855.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29855.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29855", "sourceIdentifier": "support@hackerone.com", "published": "2024-06-11T04:15:12.953", - "lastModified": "2024-11-21T09:08:28.550", + "lastModified": "2025-03-27T21:15:48.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4585", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30614.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30614.json index f2c5ed1647b..2f28c0fa0db 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30614.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30614.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30614", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T06:15:06.820", - "lastModified": "2024-11-21T09:12:18.340", + "lastModified": "2025-03-27T21:15:48.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Ametys CMS v4.5.0 y anteriores permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de recursos expuestos al alcance del error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], "references": [ { "url": "https://github.com/Lucky-lm/CVE-2024-30614/issues/1", diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json index 7c321c616d2..1191f8e306e 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31142", "sourceIdentifier": "security@xen.org", "published": "2024-05-16T14:15:08.903", - "lastModified": "2024-11-21T09:12:55.110", + "lastModified": "2025-03-27T21:15:48.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Debido a un error l\u00f3gico en XSA-407 (confusi\u00f3n de tipo de rama), la mitigaci\u00f3n no se aplica correctamente cuando se pretende utilizarla. XSA-434 (desbordamiento de pila de retorno especulativo) utiliza la misma infraestructura, por lo que se ve igualmente afectado. Para obtener m\u00e1s detalles, consulte: https://xenbits.xen.org/xsa/advisory-407.html https://xenbits.xen.org/xsa/advisory-434.html" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://xenbits.xenproject.org/xsa/advisory-455.html", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33307.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33307.json index 4a54b1a8aa4..09fa340b45a 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33307.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33307.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33307", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.837", - "lastModified": "2024-11-21T09:16:47.213", + "lastModified": "2025-03-27T21:15:48.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Apellido\" en Crear usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json index 122f39a49ae..6c5e6b77659 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34004", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.340", - "lastModified": "2024-11-21T09:17:53.467", + "lastModified": "2025-03-27T22:15:16.257", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar m\u00f3dulos wiki y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34899.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34899.json index 482496fa475..b8bf083d436 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34899.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34899.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34899", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:37.673", - "lastModified": "2024-11-21T09:19:31.127", + "lastModified": "2025-03-27T21:15:48.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "WWBN AVideo 12.4 es vulnerable a Cross Site Scripting (XSS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://hackerdna.com/courses/cve/cve-2024-34899", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json index 55a81a0cdb7..a060297af11 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35362", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:10.687", - "lastModified": "2024-11-21T09:20:13.357", + "lastModified": "2025-03-27T21:15:48.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ecshop 3.6 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de ecshop/article_cat.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/shopex/ecshop/issues/6", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36306.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36306.json index e78c34d66b4..dba46df3e8b 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36306.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36306.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36306", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:10.857", - "lastModified": "2024-11-21T09:22:00.633", + "lastModified": "2025-03-27T21:15:49.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37032.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37032.json index 203f5ee1cd6..bffb0a4dae1 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37032.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37032", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T04:15:09.617", - "lastModified": "2024-11-21T09:23:05.137", + "lastModified": "2025-03-27T21:15:49.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Ollama anterior a 0.1.34 no valida el formato del resumen (sha256 con 64 d\u00edgitos hexadecimales) al obtener la ruta del modelo y, por lo tanto, maneja mal los casos de prueba TestGetBlobsPath, como menos de 64 d\u00edgitos hexadecimales, m\u00e1s de 64 d\u00edgitos hexadecimales o una inicial. ../ subcadena." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/modelpath_test.go#L41-L58", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3787.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3787.json index 11cc5ff80e0..34ac945ad95 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3787.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3787", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-05-14T15:42:16.080", - "lastModified": "2025-02-27T16:20:34.350", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-27T21:15:49.447", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3823.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3823.json index 8c5e59649a6..57c446c5465 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3823.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3823.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3823", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-15T06:15:14.650", - "lastModified": "2024-11-21T09:30:28.433", + "lastModified": "2025-03-27T21:15:49.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Base64 Encoder/Decoder de WordPress hasta la versi\u00f3n 0.9.2 no tiene verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador conectado agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json index 84663443cc9..6a4295a04a5 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4009", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-06-05T18:15:11.420", - "lastModified": "2024-11-21T09:42:01.553", + "lastModified": "2025-03-27T21:15:49.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -113,6 +113,16 @@ "value": "CWE-294" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4372.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4372.json index c98b59f4b92..f9701831bdc 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4372.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4372.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4372", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-21T06:15:10.000", - "lastModified": "2024-11-21T09:42:43.207", + "lastModified": "2025-03-27T21:15:49.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Carousel Slider de WordPress anterior a 2.2.11 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como el de editor realizar ataques de Cross Site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4750.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4750.json index 67f22b2ab64..6fedc369ff0 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4750.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4750.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4750", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:11.960", - "lastModified": "2024-11-21T09:43:31.107", + "lastModified": "2025-03-27T21:15:50.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento buddyboss-platform de WordPress anterior a 2.6.0 contiene una vulnerabilidad IDOR que permite a un usuario darle me gusta a una publicaci\u00f3n privada manipulando la identificaci\u00f3n incluida en la solicitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json index d22b162b0ec..5d6cf9a06bb 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4886", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-05T06:15:12.443", - "lastModified": "2024-11-21T09:43:47.583", + "lastModified": "2025-03-27T21:15:50.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55070.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55070.json index f4776195cea..9c6cf05be0d 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55070.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55070", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T20:15:27.247", - "lastModified": "2025-03-27T20:15:27.247", + "lastModified": "2025-03-27T21:15:50.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Broken Object Level Authorization vulnerability in the component /households/permissions of hay-kot mealie v2.2.0 allows group managers to edit their own permissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://github.com/mealie-recipes/mealie/issues/4593", diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json index ed177d51513..0cc24dcbfcf 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0624", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-19T19:15:15.120", - "lastModified": "2025-03-17T05:15:33.400", + "lastModified": "2025-03-27T22:15:16.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:2869", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:3367", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-0624", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json new file mode 100644 index 00000000000..f72ca21cecf --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22739.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22739", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:16.590", + "lastModified": "2025-03-27T22:15:16.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ThimPress LearnPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LearnPress: from n/a through 4.2.7.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/learnpress/vulnerability/wordpress-learnpress-plugin-4-2-7-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json new file mode 100644 index 00000000000..a75c4290c29 --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22740.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22740", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:16.747", + "lastModified": "2025-03-27T22:15:16.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Automattic Sensei LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sensei LMS: from n/a through 4.24.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sensei-lms/vulnerability/wordpress-sensei-lms-plugin-4-24-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2361.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2361.json index 1c7c1142955..954bf6cecc5 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2361.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2361.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2361", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T05:15:36.713", - "lastModified": "2025-03-21T22:15:26.110", + "lastModified": "2025-03-27T21:15:50.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -140,6 +140,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/21/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json index c7a0c516054..d30ab11ae42 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json @@ -2,13 +2,13 @@ "id": "CVE-2025-24662", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-27T15:15:15.227", - "lastModified": "2025-01-27T15:15:15.227", + "lastModified": "2025-03-27T22:15:16.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authorization vulnerability in NotFound LearnDash LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LearnDash LMS: from n/a through 4.20.0.1." + "value": "Missing Authorization vulnerability in LearnDash LearnDash LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LearnDash LMS: from n/a through 4.20.0.1." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "audit@patchstack.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json new file mode 100644 index 00000000000..0f3ee87240a --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26733.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26733", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.003", + "lastModified": "2025-03-27T22:15:17.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/traveler/vulnerability/wordpress-traveler-theme-3-1-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26873.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26873.json new file mode 100644 index 00000000000..30fe5b2053e --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26873.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26873", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.150", + "lastModified": "2025-03-27T22:15:17.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/traveler/vulnerability/wordpress-traveler-theme-3-1-8-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26874.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26874.json new file mode 100644 index 00000000000..c6baf1d5a0d --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26874.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26874", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.293", + "lastModified": "2025-03-27T22:15:17.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MemberSpace allows Reflected XSS.This issue affects MemberSpace: from n/a through 2.1.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/memberspace/vulnerability/wordpress-memberspace-plugin-2-1-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26890.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26890.json new file mode 100644 index 00000000000..7f368d8ff01 --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26890.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26890", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.440", + "lastModified": "2025-03-27T22:15:17.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginUs.Net HUSKY allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through 1.3.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-products-filter/vulnerability/wordpress-husky-plugin-1-3-6-4-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json new file mode 100644 index 00000000000..35435fb6b99 --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26898.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26898", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.573", + "lastModified": "2025-03-27T22:15:17.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/traveler/vulnerability/wordpress-traveler-theme-3-1-8-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26956.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26956.json new file mode 100644 index 00000000000..9186ba60291 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26956.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26956", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-27T22:15:17.717", + "lastModified": "2025-03-27T22:15:17.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Shinetheme Traveler.This issue affects Traveler: from n/a through 3.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/traveler/vulnerability/wordpress-traveler-theme-3-1-8-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 812bb97b27c..e2f2afc3f78 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-27T21:00:20.042074+00:00 +2025-03-27T23:00:21.041841+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-27T20:57:04.587000+00:00 +2025-03-27T22:15:17.717000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -287112 +287120 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `8` -- [CVE-2024-55070](CVE-2024/CVE-2024-550xx/CVE-2024-55070.json) (`2025-03-27T20:15:27.247`) -- [CVE-2024-55072](CVE-2024/CVE-2024-550xx/CVE-2024-55072.json) (`2025-03-27T19:15:48.330`) -- [CVE-2024-55073](CVE-2024/CVE-2024-550xx/CVE-2024-55073.json) (`2025-03-27T19:15:48.437`) -- [CVE-2025-29306](CVE-2025/CVE-2025-293xx/CVE-2025-29306.json) (`2025-03-27T19:15:49.290`) -- [CVE-2025-30093](CVE-2025/CVE-2025-300xx/CVE-2025-30093.json) (`2025-03-27T19:15:49.677`) +- [CVE-2025-22739](CVE-2025/CVE-2025-227xx/CVE-2025-22739.json) (`2025-03-27T22:15:16.590`) +- [CVE-2025-22740](CVE-2025/CVE-2025-227xx/CVE-2025-22740.json) (`2025-03-27T22:15:16.747`) +- [CVE-2025-26733](CVE-2025/CVE-2025-267xx/CVE-2025-26733.json) (`2025-03-27T22:15:17.003`) +- [CVE-2025-26873](CVE-2025/CVE-2025-268xx/CVE-2025-26873.json) (`2025-03-27T22:15:17.150`) +- [CVE-2025-26874](CVE-2025/CVE-2025-268xx/CVE-2025-26874.json) (`2025-03-27T22:15:17.293`) +- [CVE-2025-26890](CVE-2025/CVE-2025-268xx/CVE-2025-26890.json) (`2025-03-27T22:15:17.440`) +- [CVE-2025-26898](CVE-2025/CVE-2025-268xx/CVE-2025-26898.json) (`2025-03-27T22:15:17.573`) +- [CVE-2025-26956](CVE-2025/CVE-2025-269xx/CVE-2025-26956.json) (`2025-03-27T22:15:17.717`) ### CVEs modified in the last Commit -Recently modified CVEs: `103` +Recently modified CVEs: `88` -- [CVE-2024-32894](CVE-2024/CVE-2024-328xx/CVE-2024-32894.json) (`2025-03-27T19:15:47.943`) -- [CVE-2024-34952](CVE-2024/CVE-2024-349xx/CVE-2024-34952.json) (`2025-03-27T20:15:26.297`) -- [CVE-2024-35504](CVE-2024/CVE-2024-355xx/CVE-2024-35504.json) (`2025-03-27T20:15:26.493`) -- [CVE-2024-36070](CVE-2024/CVE-2024-360xx/CVE-2024-36070.json) (`2025-03-27T20:15:26.677`) -- [CVE-2024-36735](CVE-2024/CVE-2024-367xx/CVE-2024-36735.json) (`2025-03-27T19:15:48.147`) -- [CVE-2024-39848](CVE-2024/CVE-2024-398xx/CVE-2024-39848.json) (`2025-03-27T20:15:26.860`) -- [CVE-2024-4059](CVE-2024/CVE-2024-40xx/CVE-2024-4059.json) (`2025-03-27T20:15:27.037`) -- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2025-03-27T20:15:27.833`) -- [CVE-2024-5687](CVE-2024/CVE-2024-56xx/CVE-2024-5687.json) (`2025-03-27T20:13:57.260`) -- [CVE-2024-5692](CVE-2024/CVE-2024-56xx/CVE-2024-5692.json) (`2025-03-27T20:07:17.167`) -- [CVE-2024-5693](CVE-2024/CVE-2024-56xx/CVE-2024-5693.json) (`2025-03-27T20:02:24.947`) -- [CVE-2024-5696](CVE-2024/CVE-2024-56xx/CVE-2024-5696.json) (`2025-03-27T19:55:20.653`) -- [CVE-2025-0185](CVE-2025/CVE-2025-01xx/CVE-2025-0185.json) (`2025-03-27T19:18:14.417`) -- [CVE-2025-0285](CVE-2025/CVE-2025-02xx/CVE-2025-0285.json) (`2025-03-27T19:15:48.520`) -- [CVE-2025-0286](CVE-2025/CVE-2025-02xx/CVE-2025-0286.json) (`2025-03-27T19:15:48.663`) -- [CVE-2025-0287](CVE-2025/CVE-2025-02xx/CVE-2025-0287.json) (`2025-03-27T19:15:48.793`) -- [CVE-2025-0288](CVE-2025/CVE-2025-02xx/CVE-2025-0288.json) (`2025-03-27T19:15:48.933`) -- [CVE-2025-0289](CVE-2025/CVE-2025-02xx/CVE-2025-0289.json) (`2025-03-27T20:15:28.127`) -- [CVE-2025-2857](CVE-2025/CVE-2025-28xx/CVE-2025-2857.json) (`2025-03-27T20:15:28.440`) -- [CVE-2025-29483](CVE-2025/CVE-2025-294xx/CVE-2025-29483.json) (`2025-03-27T19:15:49.380`) -- [CVE-2025-30363](CVE-2025/CVE-2025-303xx/CVE-2025-30363.json) (`2025-03-27T19:15:49.877`) -- [CVE-2025-30364](CVE-2025/CVE-2025-303xx/CVE-2025-30364.json) (`2025-03-27T19:15:50.193`) -- [CVE-2025-30365](CVE-2025/CVE-2025-303xx/CVE-2025-30365.json) (`2025-03-27T19:15:50.297`) -- [CVE-2025-30366](CVE-2025/CVE-2025-303xx/CVE-2025-30366.json) (`2025-03-27T19:15:50.427`) -- [CVE-2025-30367](CVE-2025/CVE-2025-303xx/CVE-2025-30367.json) (`2025-03-27T19:15:50.537`) +- [CVE-2024-28154](CVE-2024/CVE-2024-281xx/CVE-2024-28154.json) (`2025-03-27T21:15:47.183`) +- [CVE-2024-28156](CVE-2024/CVE-2024-281xx/CVE-2024-28156.json) (`2025-03-27T21:15:47.350`) +- [CVE-2024-28613](CVE-2024/CVE-2024-286xx/CVE-2024-28613.json) (`2025-03-27T21:15:47.510`) +- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2025-03-27T21:15:47.700`) +- [CVE-2024-29419](CVE-2024/CVE-2024-294xx/CVE-2024-29419.json) (`2025-03-27T21:15:47.877`) +- [CVE-2024-29754](CVE-2024/CVE-2024-297xx/CVE-2024-29754.json) (`2025-03-27T21:15:48.057`) +- [CVE-2024-29855](CVE-2024/CVE-2024-298xx/CVE-2024-29855.json) (`2025-03-27T21:15:48.220`) +- [CVE-2024-30614](CVE-2024/CVE-2024-306xx/CVE-2024-30614.json) (`2025-03-27T21:15:48.323`) +- [CVE-2024-31142](CVE-2024/CVE-2024-311xx/CVE-2024-31142.json) (`2025-03-27T21:15:48.497`) +- [CVE-2024-33307](CVE-2024/CVE-2024-333xx/CVE-2024-33307.json) (`2025-03-27T21:15:48.650`) +- [CVE-2024-34004](CVE-2024/CVE-2024-340xx/CVE-2024-34004.json) (`2025-03-27T22:15:16.257`) +- [CVE-2024-34899](CVE-2024/CVE-2024-348xx/CVE-2024-34899.json) (`2025-03-27T21:15:48.820`) +- [CVE-2024-35362](CVE-2024/CVE-2024-353xx/CVE-2024-35362.json) (`2025-03-27T21:15:48.987`) +- [CVE-2024-36306](CVE-2024/CVE-2024-363xx/CVE-2024-36306.json) (`2025-03-27T21:15:49.143`) +- [CVE-2024-37032](CVE-2024/CVE-2024-370xx/CVE-2024-37032.json) (`2025-03-27T21:15:49.287`) +- [CVE-2024-3787](CVE-2024/CVE-2024-37xx/CVE-2024-3787.json) (`2025-03-27T21:15:49.447`) +- [CVE-2024-3823](CVE-2024/CVE-2024-38xx/CVE-2024-3823.json) (`2025-03-27T21:15:49.600`) +- [CVE-2024-4009](CVE-2024/CVE-2024-40xx/CVE-2024-4009.json) (`2025-03-27T21:15:49.760`) +- [CVE-2024-4372](CVE-2024/CVE-2024-43xx/CVE-2024-4372.json) (`2025-03-27T21:15:49.937`) +- [CVE-2024-4750](CVE-2024/CVE-2024-47xx/CVE-2024-4750.json) (`2025-03-27T21:15:50.083`) +- [CVE-2024-4886](CVE-2024/CVE-2024-48xx/CVE-2024-4886.json) (`2025-03-27T21:15:50.223`) +- [CVE-2024-55070](CVE-2024/CVE-2024-550xx/CVE-2024-55070.json) (`2025-03-27T21:15:50.390`) +- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-27T22:15:16.430`) +- [CVE-2025-2361](CVE-2025/CVE-2025-23xx/CVE-2025-2361.json) (`2025-03-27T21:15:50.553`) +- [CVE-2025-24662](CVE-2025/CVE-2025-246xx/CVE-2025-24662.json) (`2025-03-27T22:15:16.890`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8704887d907..3ea8e8a659d 100644 --- a/_state.csv +++ b/_state.csv @@ -112163,7 +112163,7 @@ CVE-2018-11083,0,0,6c9f081406c952b27efd360ec315477b2c0c4b05e6ad906a3d70311377b64 CVE-2018-11084,0,0,3f101f7ed7fcd4f425f14f39601cf7c8a3ad3d314dbd7002aa33f775307aec25,2024-11-21T03:42:38.857000 CVE-2018-11085,0,0,e985c0bb0f66c4ba2e2d957cf6137285cd4df64149c10027ccca81f13acf1af5,2023-11-07T02:51:37.240000 CVE-2018-11086,0,0,73249b24d26341aeaddf7bf0713310028982280eeae9213432bd28474f92aef7,2024-11-21T03:42:38.987000 -CVE-2018-11087,0,1,d287ae2b3b0a94bc8a9a06b75ce4feb57674fdce87f7493f73c304ea75887186,2025-03-27T19:56:20.387000 +CVE-2018-11087,0,0,d287ae2b3b0a94bc8a9a06b75ce4feb57674fdce87f7493f73c304ea75887186,2025-03-27T19:56:20.387000 CVE-2018-11088,0,0,d2fbfd763b7998ca890da18e030f0234631b644957d98a9fd3cd85db01b8a1ae,2024-11-21T03:42:39.213000 CVE-2018-1109,0,0,ef43569e876ccfa3c2246a2d23b49237679d2a8bfb0612930bcdf26e58fd3e2f,2024-11-21T03:59:11.973000 CVE-2018-11090,0,0,41c6b522da1e54aa451ce2eb16958fd691df2bdb4b0b3f3560b4af734b3b4e09,2024-11-21T03:42:39.327000 @@ -152818,7 +152818,7 @@ CVE-2020-2039,0,0,ce74b88071e1e235c2bf8ff0e6026f22bada17dfa8a0d1924b592dc9309915 CVE-2020-20391,0,0,1c18c6fd4b153c4c0045e9156603796477de927a114f62f8a1a810778edca787,2024-11-21T05:12:03.003000 CVE-2020-20392,0,0,c1cc6e397813c43d7df08385213415163fccfbceabac88e9cd5d031de3952e38,2024-11-21T05:12:03.170000 CVE-2020-2040,0,0,6ece132bc203fa2ecbb9dd58883322db53ac1af47df43337a84f4aca9ad810f5,2024-11-21T05:24:31.737000 -CVE-2020-20402,0,1,9d15ab3682de146470f001b9a702a13f8d626c5f75b369644f510d7a00d8eec1,2025-03-27T19:15:41.530000 +CVE-2020-20402,0,0,9d15ab3682de146470f001b9a702a13f8d626c5f75b369644f510d7a00d8eec1,2025-03-27T19:15:41.530000 CVE-2020-20406,0,0,0d0c0801f0b93125afe461fe90fcca22ea973e6d317bfb2fb360bd5737e92323,2024-11-21T05:12:03.483000 CVE-2020-2041,0,0,970deedc477beef1d9c35f672e6deaf16c3a48aba43d62a7024978a3fb962f55,2024-11-21T05:24:31.973000 CVE-2020-20412,0,0,225ba4fe9f25c7021650006518d59af9acdd0b0c0e080b06aa180ac7bab2eb1d,2024-11-21T05:12:03.637000 @@ -177931,7 +177931,7 @@ CVE-2021-34386,0,0,0ca90a45ac4ab1097fdcfb985886f7ced6e4b27d9f0af34306afce634a019 CVE-2021-34387,0,0,9ef2f47bc40f5fc96ed3079101df66cae5a7e3676e7a1db374f313cbf229babd,2024-11-21T06:10:17.500000 CVE-2021-34388,0,0,c72b613a09fdae98a96cd3ae4fe3525546138d1e8d6db94bd6af07727e44a753,2024-11-21T06:10:17.633000 CVE-2021-34389,0,0,a4d4036d45bf54b51ee8159b0bcadb049f7efee454aece812efc73ff654ff351,2024-11-21T06:10:17.770000 -CVE-2021-3439,0,1,ac605795ce441aefbec942c78ca30e46ee0bc7f5f88024b7238f223e5d6ec127,2025-03-27T19:15:42.473000 +CVE-2021-3439,0,0,ac605795ce441aefbec942c78ca30e46ee0bc7f5f88024b7238f223e5d6ec127,2025-03-27T19:15:42.473000 CVE-2021-34390,0,0,f1db55d7bf120d6a5cf20ba5a85d84c80c3bb232e4156df9595be3f6c6ecdc89,2024-11-21T06:10:17.900000 CVE-2021-34391,0,0,0c501c74872759230961c2b524ce88b3c1dbc02a06d6fdb3896ed2852ebcd93f,2024-11-21T06:10:18.033000 CVE-2021-34392,0,0,6af82815ffd1f6775c658de0bf5ce9e5d57bee657003eb90ae364a7e7bbc0543,2024-11-21T06:10:18.177000 @@ -180668,14 +180668,14 @@ CVE-2021-3804,0,0,deec5b8a43605594e740f1f6bd3fdf2069c826d5618532c73fc1451d43750a CVE-2021-3805,0,0,2324f1cffea0ff6b3f6b6957e3a7f3f11b66bcf6ec08ba26afcf133bbbc8c0f9,2024-11-21T06:22:29.180000 CVE-2021-3806,0,0,5f9bf2ed6ba6a533e3448b51b0bc4075f9ad1422939e24e55197d0aa2cfc8125,2024-11-21T06:22:29.337000 CVE-2021-3807,0,0,bbfa970a43a6316bbde251e924a5f372d93a1ce52e785afccf8e766599f90f49,2024-11-21T06:22:29.500000 -CVE-2021-3808,0,1,1356a1a252b3462313d6ed88c91b57981d16975a3f58195ed50402789ec5a8e9,2025-03-27T19:15:43.113000 +CVE-2021-3808,0,0,1356a1a252b3462313d6ed88c91b57981d16975a3f58195ed50402789ec5a8e9,2025-03-27T19:15:43.113000 CVE-2021-38084,0,0,b837a4a275d526dce2f7e2efbb401b09f2014451f72aef08c27503ad763b962b,2024-11-21T06:16:19.787000 CVE-2021-38085,0,0,4e7b450497d43c315ada97b7054b6bb9e6aea8a86aa4c3a871bad9c5b42226fd,2024-11-21T06:16:20 CVE-2021-38086,0,0,7f5475b0ecb6fd46f8978f201bc0f772caa0b99637683854663d05764da32b63,2024-11-21T06:16:20.210000 CVE-2021-38087,0,0,7da3b26d12e61b6b2f5bd963ea0808d540d01dea8b441334a9540d0e626e8cc7,2024-11-21T06:16:20.400000 CVE-2021-38088,0,0,a206fbb54195317ea8d2dc46e2f032aae9f0dcbc0513339c3e384526f236ecc9,2024-11-21T06:16:20.583000 CVE-2021-38089,0,0,9639805b365b9b7e33a7f4dce5da677a6e2ecae008c678348b0f757cfbbe89a5,2023-11-07T03:37:12.337000 -CVE-2021-3809,0,1,21039a7a0ba269028d1f07a5d3c04219cd5e36b850d9a6efbe258a92555acb9e,2025-03-27T19:15:43.480000 +CVE-2021-3809,0,0,21039a7a0ba269028d1f07a5d3c04219cd5e36b850d9a6efbe258a92555acb9e,2025-03-27T19:15:43.480000 CVE-2021-38090,0,0,8efbc7d91d559422dc15a9a5d15a98dcdd99d817bbc9961cfcdb3ca6dca9ebd0,2024-11-21T06:16:20.773000 CVE-2021-38091,0,0,70c9fe2b7c375119bba32b59642b3e6c01b504b1781b4b2531be631cf5df651a,2024-11-21T06:16:20.950000 CVE-2021-38092,0,0,4059168251091f8e43daaac25d7ce55a4343e13dfac875ee10cd92a451ee3278,2024-11-21T06:16:21.140000 @@ -187452,7 +187452,7 @@ CVE-2021-47152,0,0,cc45d42756a373b4bd8b8dcdfbf262bfffe4241ca17ad16a9f3219337ce74 CVE-2021-47153,0,0,260606bab9da10bc37c6a771a09090eb2a34f97840760e3f4668cb5a77ebf62d,2024-11-21T06:35:30.260000 CVE-2021-47154,0,0,988b6fd8faeda57b55960c9599be36bc61efb2a0e91c807b5d63ee1849b13ae6,2024-11-21T06:35:30.437000 CVE-2021-47155,0,0,2831790c23d19e97bebb1b3fab90c94ca0cdbf54a49034e555978f9dc08ef6d4,2024-11-21T06:35:30.647000 -CVE-2021-47156,0,1,f21b5986f5e2fcbe7ef18504c8bb7019e3d012c87734c3a2839e67eefbcbcd00,2025-03-27T20:15:16.147000 +CVE-2021-47156,0,0,f21b5986f5e2fcbe7ef18504c8bb7019e3d012c87734c3a2839e67eefbcbcd00,2025-03-27T20:15:16.147000 CVE-2021-47157,0,0,b5ab5d34e525bd174cdd6ed5a8278bfcffe5a485711834ebea5f73fe8429ce89,2024-11-25T21:15:04.560000 CVE-2021-47158,0,0,00fd76ecb8f0868da4bf1c1d8a978541b4347175acebcca59e35d1ed8b6f1786,2024-12-12T15:50:01.087000 CVE-2021-47159,0,0,0f4360e93888800dfa2f84323e7c856f9d0fa92616b37aaa510ccc8a8f65d097,2025-03-13T21:24:10.130000 @@ -187497,21 +187497,21 @@ CVE-2021-47197,0,0,ff278b57005be39a605158e468d07f7b771efffd46ad329ea80d3d03fead6 CVE-2021-47198,0,0,b993f750c37c4c38f432a1fa687c613c700df27bc966490e10b5bbb5b658e377,2025-01-10T19:05:47.023000 CVE-2021-47199,0,0,b54d7d4593bdaa1296c80c94872766f0aebb031e426176cb727724e16ea27e3b,2025-01-14T16:40:06.220000 CVE-2021-47200,0,0,f7d0a9f6d9d00fe034547827f9d38362c4dd747ef6c9609a6880de97be1ec3ee,2025-01-07T17:12:06.773000 -CVE-2021-47201,0,0,f594e5bce4641cd740c824e9d9a7ea0d02ff351f9106a29553691cc83597e7b3,2024-11-21T06:35:37.100000 +CVE-2021-47201,0,1,54de1120fc9fdb3601acc431f0154fc87a819de27867f178a33889ea7eb2e57a,2025-03-27T21:15:23.443000 CVE-2021-47202,0,0,f71fdf699570077845ea4020f7dda9b1b42ec5830520d11735bde0982f5ac699,2025-01-14T14:42:43.193000 -CVE-2021-47203,0,0,ad76e3e9d79c0d771b72bd8b99f442691366bca4e5881c560344e9c98df7f37e,2024-11-21T06:35:37.340000 +CVE-2021-47203,0,1,23ecedf5c87bed8a26460406d75448c16071a6195e5aa863e7a7c6bbe8684914,2025-03-27T21:15:41.670000 CVE-2021-47204,0,0,d855ea7a1c34fec98e08b6ec6fc4b87aa056a23800ca368fb608f86f4465fa84,2025-01-14T14:35:39.270000 CVE-2021-47205,0,0,549c8ae254d28d7ac269df29364fd85d999eba14823bb753afbe9412e13374e4,2025-03-04T15:27:32.420000 CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000 CVE-2021-47207,0,0,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000 CVE-2021-47208,0,0,1530409a9601a0907c9eb35e42d9ec9620e69106ced76ea9e3ebfe673f296458,2025-03-20T14:15:14.867000 -CVE-2021-47209,0,0,66c8bb1bbbbabb612aea95c8acbab82e4d517f231624f1fda55939a18d2cee2c,2024-11-21T06:35:38.130000 -CVE-2021-47210,0,0,fcfe01bd853d89eb09f7208e49d5a773d2f7687981403b46e6d2d624d108c374,2024-11-21T06:35:38.243000 +CVE-2021-47209,0,1,1fb01f5344d3d29206a007393a44ba7c69513264da52a0f08264eb7fc98cf747,2025-03-27T21:16:39.163000 +CVE-2021-47210,0,1,40fd39aaeeaa307db4cc5aede6277cfa48581cbeeabe52118b0087ad7959911f,2025-03-27T21:17:41.257000 CVE-2021-47211,0,0,c3bfb66ece2fcfaecd7a9c09b11fb23218079e6a89ad9ae3b4e7290a749fa7ef,2025-01-14T14:43:27.637000 -CVE-2021-47212,0,0,9674a4e23372c0a452e940f9cca5e246bd8e4559a1fb3d78464657b136f1a497,2024-11-21T06:35:38.460000 +CVE-2021-47212,0,1,a4ef5c545ee675258b29137f7c62508ef50f001e36505f1adcf136e53c88ab98,2025-03-27T21:02:03.497000 CVE-2021-47213,0,0,245ac7a9225a365f5c662ae6caf0adb8cd59aebebb5b4d7c789ce306b6d785a3,2024-04-15T09:15:07.570000 -CVE-2021-47214,0,0,240fb8c219587107367483aa8292796805850539ab128167d0e3b6f6a1ea724b,2024-11-21T06:35:38.583000 -CVE-2021-47215,0,0,061150f04e35de0511f542178ef3b0375b5d7d8f4925ec7cbb4e58248ef0b80e,2024-11-21T06:35:38.693000 +CVE-2021-47214,0,1,f150c2636889580ef8d53ccd1154b8060b897436aa4c96d2aea4f4759e2e9907,2025-03-27T21:05:27.253000 +CVE-2021-47215,0,1,c85e565b0341874f7942802893aff71248ad89f071ee29569b0cc37c4dc94f6f,2025-03-27T21:05:34.560000 CVE-2021-47216,0,0,7b28f4a443e8cdf94e80536f7a879b2105949aecec684610de3f50e588e6c23c,2025-03-18T17:01:47.293000 CVE-2021-47217,0,0,0a489705239b1608b1dac0f9ef137450310d629ac310e04d5fbc0878960cf64a,2025-01-14T14:44:11.917000 CVE-2021-47218,0,0,cdeb5c7e6dbdcca4a12e7f3fd8c0c1023ff2d2f036ea1b66236860ff4b09a050,2025-01-14T14:44:55.610000 @@ -189096,7 +189096,7 @@ CVE-2022-1238,0,0,d63394dcb4ef11cfc6d423a18172c728594824feb8b943055d353facf14cd2 CVE-2022-1239,0,0,f12b3f9d4357ca6d33ce6c39d86fbe18447eb7c43c3776b8265eddd486b9cc30,2024-11-21T06:40:19.367000 CVE-2022-1240,0,0,11d19d2461122d055d17c8b78dbd2a9a418498614d46dcac335a75beb7fb8279,2024-11-21T06:40:19.473000 CVE-2022-1241,0,0,673c1b757ab6edd381e368028fd46ae2fbde04d6f255356e581d5638dc032a2e,2024-11-21T06:40:19.600000 -CVE-2022-1242,0,1,8649d64db81ee73cc6b7547bd9cd094adf3f6bfdb5858052792a0af157a41664,2025-03-27T20:15:16.430000 +CVE-2022-1242,0,0,8649d64db81ee73cc6b7547bd9cd094adf3f6bfdb5858052792a0af157a41664,2025-03-27T20:15:16.430000 CVE-2022-1243,0,0,c2ef34d7a4096e4c1ca5e1b1702b10916426d430c6145e0af182dc81ae75ebf2,2024-11-21T06:40:19.820000 CVE-2022-1244,0,0,0a2cfb189cf94a20e54f8df0c3defbfab7a162ceec95cd66d690396b83850b8f,2024-11-21T06:40:19.933000 CVE-2022-1245,0,0,5e45d08cac6a518015ad0df0cd44afa19aa4a0a8a755e99fdae23beea7aad545,2024-11-21T06:40:20.053000 @@ -192807,7 +192807,7 @@ CVE-2022-23083,0,0,ec6bad714e416fd4fa01316b700a1866735ae342f05ea3fa3974cc27ef000 CVE-2022-23084,0,0,6a2ae41871be721436e219d7e0389dac1fc31c85838d980f693b5dba1832693e,2024-12-09T17:27:41.437000 CVE-2022-23085,0,0,6412c8372d862dcc0a3cf5bd7c1efba690d9a88863c7674f559c75ca93e49e66,2024-12-09T17:27:22.803000 CVE-2022-23086,0,0,9eb758d3b3f002e65dc4f7fa151bd7eef0a9a77d4095c5f040d86603a18d59cf,2024-12-09T23:24:03.727000 -CVE-2022-23087,0,1,f5c20b4d02f108f337dd632dae4a5ffc6be3ceb3ac9cea5b8baf4ea214f6bd86,2025-03-27T20:15:16.600000 +CVE-2022-23087,0,0,f5c20b4d02f108f337dd632dae4a5ffc6be3ceb3ac9cea5b8baf4ea214f6bd86,2025-03-27T20:15:16.600000 CVE-2022-23088,0,0,96df8466b71abafc68549d82f55f9d21c7bbe6efc6480be8b6ca9237a7fa59a8,2024-11-21T06:47:57.560000 CVE-2022-23089,0,0,20f8fd7f414cf14ddbd3199fc634f925e6dbc123a2057444394303f9b33855fb,2025-03-13T22:15:12.373000 CVE-2022-2309,0,0,c1e27ddb7db8d117df512ea1a0dccd33df5b4b4a4eb6a99e7d3dae6a4563a3fc,2024-11-21T07:00:44.473000 @@ -193104,7 +193104,7 @@ CVE-2022-23451,0,0,2070bd15bccba485d7ca6f81e31f4fc1db28cb472f7d1db61fe2add854c04 CVE-2022-23452,0,0,f1fa8727a7bb8eb2da4fdf5ffedee3e79a7dc451ee710ac7e1fde3d0e751f1bb,2024-11-21T06:48:35.107000 CVE-2022-23453,0,0,995c66ae896c9dcd23d00973dea8cb14f29115435d41d6111ce575691859959b,2025-03-27T16:15:15.710000 CVE-2022-23454,0,0,8a11ddba35f88f02dea7f8a7d63a4e91d1aefc3622eca3fde4a3f03235ae714d,2025-03-27T16:15:15.970000 -CVE-2022-23455,0,1,279a176939a3e54307c00d7dab81e05eed4a9aed1a24e9bbd38cb63ec7ddd0c4,2025-03-27T19:15:43.817000 +CVE-2022-23455,0,0,279a176939a3e54307c00d7dab81e05eed4a9aed1a24e9bbd38cb63ec7ddd0c4,2025-03-27T19:15:43.817000 CVE-2022-23456,0,0,3c3ae7870712718c071efc1ed74aeeffff6504f8aed9bd8cb32517d631266ba0,2024-11-21T06:48:35.643000 CVE-2022-23457,0,0,6923186de06ff55aba9c9cc4cf061e0903b3154387ccf3662749823a0f175507,2024-11-21T06:48:35.780000 CVE-2022-23458,0,0,fc1f1a597178d5392a7a517489c76dbefc8092b98248bc6a71bd00bab1957be7,2024-11-21T06:48:35.950000 @@ -195318,7 +195318,7 @@ CVE-2022-25929,0,0,1d9905bcd703302f166b0c3ed7ad3be6299caf01f5b2009ef30806d9dec0a CVE-2022-2593,0,0,ba97683c62c13c2f704fdc1e9dcbe51ea1ec5b87f4464d6cb5aa69a20368e091,2024-11-21T07:01:18.877000 CVE-2022-25931,0,0,794e60e7f350d4d8daa4f904a3fe92cd837e47f38aa2bd7b5b638dcdd60f2190,2024-11-21T06:53:14.467000 CVE-2022-25932,0,0,1c7380def966d7a21fa440572bf7a4214d0c842e447910e9847e59a789b58387,2024-11-21T06:53:14.567000 -CVE-2022-25936,0,0,b41cc5ef5bde88986b62384d02ccd6e97c190e75815a7a1fa1d66e0930075977,2024-11-21T06:53:14.680000 +CVE-2022-25936,0,1,dcaa086f04833dc72e3a47b541001489e20e78bf261d859736828560b153d817,2025-03-27T21:15:39.147000 CVE-2022-25937,0,0,bfb35ef3012ee1f29c7eb4322f0448db834460a2511e09971cc9e3e81d30356a,2025-03-21T15:15:37.517000 CVE-2022-2594,0,0,7642116e54f9a2fd855aef58e1ce7a9a73b0fd8e114d407bd60c3a2c56bad224,2024-11-21T07:01:18.993000 CVE-2022-25940,0,0,89d1dff1f90916ce131570b4b5cdf8e81dc97dd0103927cd58c3d672283a45d0,2024-11-21T06:53:14.910000 @@ -195334,7 +195334,7 @@ CVE-2022-25959,0,0,c54c13c61750ec3a29825244a1699cbefd0803c7618bcc954c98486dc9e75 CVE-2022-2596,0,0,8c1430ae366e9383c2418b01d75054460e70fc4287b03254fe53c2821f66faed,2024-11-21T07:01:19.243000 CVE-2022-25962,0,0,fdf48408b4aef3f45104be3ab62b7be17f27c7871b5c65b937688ece6d56aedb,2024-11-21T06:53:15.883000 CVE-2022-25966,0,0,e9b7c020f78bb99143891bbf6c7519699ec558ccaef0f2db67f0eb1f5a0c81f3,2024-11-21T06:53:15.993000 -CVE-2022-25967,0,0,d5f7d02de55f1eb8310d1f45b62d57d0c7813d4b09c1c648bd851ebf972eb761,2024-11-21T06:53:16.090000 +CVE-2022-25967,0,1,ed712bfe4f4fa13559388707149d80887eff279622a3f679ef0966e411043e67,2025-03-27T21:15:40.110000 CVE-2022-25968,0,0,832c7e911d43d56eb3ffd2296f3840e96174c3c048f985046c511c1083e39fa1,2023-11-07T03:44:54.053000 CVE-2022-25969,0,0,ea2357ae0fcc227ccfae22690ef0d2982d6e924b545f73f79fc1dc15c730107a,2024-11-21T06:53:16.210000 CVE-2022-2597,0,0,c0482aad432cc06867515a47814a0a90f15c285b9c7ba0a6382e06feb82bd8cd,2024-11-21T07:01:19.377000 @@ -196568,7 +196568,7 @@ CVE-2022-27534,0,0,3495c84f8ca87538fa395aaad43067c7ce76b8490bfe2895dc6d48f074132 CVE-2022-27535,0,0,1cd6253a7592e69bce8f5422a0f47245fc510e8ea772b035a7451e9ed1d4f9d6,2024-11-21T06:55:53.923000 CVE-2022-27536,0,0,68d5018ea0b495266f2ee0d5eb27a828a98d13012d37fb7e54356414e829f58f,2024-11-21T06:55:54.037000 CVE-2022-27537,0,0,e33138ba605f95efff1403371012f556a92daa3324c8e9133fb53cd0c0037617,2025-03-27T16:15:16.130000 -CVE-2022-27538,0,1,826826638383acf1757a7282bd5d9fe239ab298c299af298f83ded52812ecd58,2025-03-27T19:15:44.003000 +CVE-2022-27538,0,0,826826638383acf1757a7282bd5d9fe239ab298c299af298f83ded52812ecd58,2025-03-27T19:15:44.003000 CVE-2022-27539,0,0,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000 CVE-2022-2754,0,0,5fd204098138c7c579a0e559edbbb117b8423f6089a27ae9bbe02e85b1b02437,2024-11-21T07:01:38.577000 CVE-2022-27540,0,0,7b937f21398b8778219a017044700af59f5e3b174221c511754c41d0c25a2e92,2024-11-21T06:55:55.787000 @@ -198928,7 +198928,7 @@ CVE-2022-30414,0,0,a5b5e938f903187b259c4d482c428573b586a20faf8f2166e0d93a5c019d2 CVE-2022-30415,0,0,f43b01a2cf75fff2fc6e6cd9b8eb67056709ebcd3b06239fbf28d23646554551,2024-11-21T07:02:44.200000 CVE-2022-30417,0,0,8a10bd5ff0b726770ea0c92aa491bf7d76173376dabdb9d641effbd3774c55da,2024-11-21T07:02:44.340000 CVE-2022-3042,0,0,8d6d3d0be62fbbd429668b0b5f3d69438bae974433b6feed9be6c9c7a6cabfd1,2024-11-21T07:18:41.947000 -CVE-2022-30421,0,1,fb5f5da42ca3392899992ca82b0043d17ca9793cecd34465a4a9d6ada9d23690,2025-03-27T19:15:44.737000 +CVE-2022-30421,0,0,fb5f5da42ca3392899992ca82b0043d17ca9793cecd34465a4a9d6ada9d23690,2025-03-27T19:15:44.737000 CVE-2022-30422,0,0,419025f16fca943fa78bd2dff924ab43cb163f8127c6750af219c7a25891ba48,2024-11-21T07:02:44.623000 CVE-2022-30423,0,0,480005bf69f33387bebe6673f00b37e90e80c2db4437dd1abd795d6b5e428f1e,2024-11-21T07:02:44.760000 CVE-2022-30425,0,0,adbe5144e81c083252654230490ca3d11b47f216498fea91f04698b9bdb3d10a,2024-11-21T07:02:44.893000 @@ -201150,7 +201150,7 @@ CVE-2022-32978,0,0,120ec7c3fe6916d5585046d5915fb94ea7e7ac263a6ef892db83ba808eab8 CVE-2022-3298,0,0,3cc5aa57603c64276abc21d35637a63c6173b06602cdfb8af285cf8f586fd12b,2024-11-21T07:19:14.750000 CVE-2022-32981,0,0,32f58ce3763fb31a9d372fbb1fb0136f7f5fa41103556c78189baa060e305b58,2024-11-21T07:07:21.067000 CVE-2022-32983,0,0,ae8119664a3dfc34319b72f81fc99e412f2eaf4fcd6e5dc24741ffe66b33e31b,2024-11-21T07:07:21.230000 -CVE-2022-32984,0,1,d586b3a9773e0af28aad2d7ba9f1c0e5aa2fa7ba1d75b0a6fc0aac6f0c9dc178,2025-03-27T19:15:44.950000 +CVE-2022-32984,0,0,d586b3a9773e0af28aad2d7ba9f1c0e5aa2fa7ba1d75b0a6fc0aac6f0c9dc178,2025-03-27T19:15:44.950000 CVE-2022-32985,0,0,89aede82f60b8ba11d664d600ac50e13d29b605b2333266f57857b6745098923,2024-11-21T07:07:21.563000 CVE-2022-32987,0,0,0b43ea2c61bde7fc2f65e0b52a3c4993a15b05bfa09111070ae02ba96a7636bb,2024-11-21T07:07:21.813000 CVE-2022-32988,0,0,092a81cb8e0e47e148c655bc6be32e5089605bd5ea3650893fa9d7d997369eb0,2024-11-21T07:07:21.980000 @@ -204370,7 +204370,7 @@ CVE-2022-37015,0,0,31337c1238328f6eb531b69004d903ad15053d693a75c8db560fc909b519e CVE-2022-37016,0,0,c300b00f7807f4187c52ad2f41ab6184598635cf77fb55342750004c96299519,2024-11-21T07:14:17.323000 CVE-2022-37017,0,0,9a3859410af7dc9e98130d0e85829dd5ed49d7ecf7403b1b97d4754e7ac2a7a2,2024-11-21T07:14:17.443000 CVE-2022-37018,0,0,544e7310640522b7554172e7430aac7ff76d42a847593e68b8e594e1d76583fe,2024-11-21T07:14:17.557000 -CVE-2022-37019,0,1,555057828e4e99a927a41276a8de6345c04d0463234be51b4c86a4e63ab32226,2025-03-27T20:15:16.800000 +CVE-2022-37019,0,0,555057828e4e99a927a41276a8de6345c04d0463234be51b4c86a4e63ab32226,2025-03-27T20:15:16.800000 CVE-2022-3702,0,0,99c297db7e9abd8f53105161c5d27129319fc3edd31de131811ce9efb355a713,2024-11-21T07:20:04.040000 CVE-2022-37020,0,0,06bd309c84ffe1715bca759dcd8497b63c042c35538814afcf221600ba3b485c,2024-11-21T07:14:17.930000 CVE-2022-37021,0,0,e5c2a062086934db7f728ce884f93207fc8418e859a660c7ee1012b266eb15cc,2024-11-21T07:14:18.117000 @@ -208139,7 +208139,7 @@ CVE-2022-42002,0,0,60a1d367508daa19c510f856ac49d3a6964f06c02193cac300e039e575d79 CVE-2022-42003,0,0,9f64427bf16386d7f768f8013141fd445526bd8d0f9336c3c8d22e102226b4c3,2024-11-21T07:24:15.093000 CVE-2022-42004,0,0,4607ab139b899537b7893546ebd11acdedbd58d3e80b5927b621f0aa69060174,2024-11-21T07:24:15.277000 CVE-2022-42009,0,0,3ac6c1e4ffbacc19430447849a492e12fdb2611e2b162074fa332f0fcb17ef3e,2024-11-21T07:24:15.440000 -CVE-2022-4201,0,0,495b88fd12f6cf3deb2e5ba5117731015bdb6abbef66f77883287be23eb366cc,2024-11-21T07:34:46.233000 +CVE-2022-4201,0,1,b95a677bd3f9a512b46fac64584bcded452220420cb6353adb5b4ed82a74ccf7,2025-03-27T21:15:40.680000 CVE-2022-42010,0,0,13d3ab027050ab3ff3a6f19de3e46c0835657701d24719fe02cd5abb6f75eaa9,2024-11-21T07:24:15.583000 CVE-2022-42011,0,0,437cc95c7bd8393f41e51422a111af68c582ce6ec59c6c8a1e00ba71e6843690,2024-11-21T07:24:15.753000 CVE-2022-42012,0,0,a0334381948b066d92f6a35db146d578a370dee828eeb14eaed44b3102d40563,2024-11-21T07:24:15.933000 @@ -208159,7 +208159,7 @@ CVE-2022-42043,0,0,1b51443ece4dfde737b521577d49f701611603ea6b4ff4950a7b342458945 CVE-2022-42044,0,0,4b003b79d52c535b15980d22035b09add42a881d46b97e131b92acf23be4c665,2024-11-21T07:24:17.700000 CVE-2022-42045,0,0,fa00602f5cacf506918aa2a538c073f64bc94c453b34f187b7f24627ad627bc3,2024-11-21T07:24:17.850000 CVE-2022-42046,0,0,4ab7e65b1b6db3af6601b015cfe7f4c7fd94214eb3606900a374a03c67ae0d57,2024-11-21T07:24:18.023000 -CVE-2022-4205,0,0,d7dd50464e36a0db46c889b79ee3711a7e97bca4de3e8ec3ae663835cc98b26b,2024-11-21T07:34:46.597000 +CVE-2022-4205,0,1,e891f9dad69dda63da83ad9de4923fd4fbc6a08687e2f527445106dd9a27f918,2025-03-27T21:15:40.837000 CVE-2022-42053,0,0,f84a20c57a710046a5921125f009eeb322bba75b83b8298d0d45d35581efe069,2024-11-21T07:24:18.170000 CVE-2022-42054,0,0,1fbb4b57f03684db196fe4e0f7bcc23fb563b88cf54c3ba3d883f33a3d523443,2024-11-21T07:24:18.310000 CVE-2022-42055,0,0,a8ed70eb089ad7ed9ddaba439a26deb8a495368153eed37543d58dae4755494a,2024-11-21T07:24:18.450000 @@ -208921,7 +208921,7 @@ CVE-2022-43050,0,0,30e2140395a3d4298dfd847548c710b1b100394302aacd669070f8565671a CVE-2022-43051,0,0,ab29a54b266079967e584701dd2f1a8fbf52de3672fe6d9f416d5f10b1447b17,2024-11-21T07:25:51.980000 CVE-2022-43052,0,0,30e1816df4543b5750d28f3cdb2108c4a8b93b3b986e4d49bf9ae9c791cf0b02,2024-11-21T07:25:52.130000 CVE-2022-43058,0,0,f0621e53ea917b96d54574c141275a4e2b87fb573e84ae925fff1b2652f11b68,2024-11-21T07:25:52.303000 -CVE-2022-4306,0,0,4afdc0208505dd21fe04cea6ed3a65b54c2d0a4bd7a40b928eb6cb83427afd0d,2024-11-21T07:34:58.863000 +CVE-2022-4306,0,1,07e7b045aa9d351a1667711ad59312eae63454cf96522fe976d913693e8cd1f8,2025-03-27T21:15:41.030000 CVE-2022-43061,0,0,21636194f05015143101e566d89de120ee0f9dbb82a364a4b05fb64562ee16cd,2024-11-21T07:25:52.480000 CVE-2022-43062,0,0,325c47f4838fb09572118b0df9f0323027737718e58af747cd3d3a3d606fc6d8,2024-11-21T07:25:52.653000 CVE-2022-43063,0,0,148371e3c9aa92a6176069faf7aef5d4aa68eff35d5ab75edc74d524f5ec3d91,2024-11-21T07:25:52.840000 @@ -209640,7 +209640,7 @@ CVE-2022-43946,0,0,cd4cbbd03b194a23c4cb89423961adf48afe204ea0c605234a644d3d92826 CVE-2022-43947,0,0,e0f2c5ae57f9bdeaf76762be8e3d57b10c5ed9db9457890644ddfcebf808df7e,2024-11-21T07:27:23.687000 CVE-2022-43948,0,0,2ad6d57342e04b939dcb8bc732882e5480bf112b78eb769d72503c72a1ab5c4a,2024-11-21T07:27:23.800000 CVE-2022-43949,0,0,5d19c9a7fab74476363445f67c1bcef56ceb8f9a3c6ff52aed96e5b980233189,2024-11-21T07:27:23.920000 -CVE-2022-4395,0,1,c69da8826995c960a6ae8f6bc833d62b503b84efd7dc76b1845f0d01f452df26,2025-03-27T20:15:17.083000 +CVE-2022-4395,0,0,c69da8826995c960a6ae8f6bc833d62b503b84efd7dc76b1845f0d01f452df26,2025-03-27T20:15:17.083000 CVE-2022-43950,0,0,973dd169a9740cb0a6d2c7f88efed01dbc5aded5556c824b0066a874eb1f2a49,2024-11-21T07:27:24.033000 CVE-2022-43951,0,0,917c5c78e6af115a4733620a3d8754b0154c8921d0522e288097f462c8e865a4,2024-11-21T07:27:24.150000 CVE-2022-43952,0,0,c70390b279d9f07f5dc7d942a60544c4f657ec881bf696379a764c4062ef2f3d,2024-11-21T07:27:24.260000 @@ -210407,7 +210407,7 @@ CVE-2022-45168,0,0,b0a486b109d813939513df116af869c3560d5ff540cd808ac9e39a949a4bb CVE-2022-45169,0,0,49fd5b1282b55f2e7a1728711aeb6c0fb2c685d264aef938798f28623072ebc3,2024-11-21T07:28:53.087000 CVE-2022-45170,0,0,ba7e2539132e45a02558bf903be508187722ba0d3611c7fbe35c88eafe0226cc,2025-02-07T17:15:22.343000 CVE-2022-45171,0,0,32f0351cfb375ad29beaf0754526949d74a2995a055928d7183bb684bd351098,2024-11-21T07:28:53.450000 -CVE-2022-45172,0,1,cb7d1746ffd708b08a0202c8cb5438df9dbe30410dfb2261e8cf69aa7db3da48,2025-03-27T19:15:45.440000 +CVE-2022-45172,0,0,cb7d1746ffd708b08a0202c8cb5438df9dbe30410dfb2261e8cf69aa7db3da48,2025-03-27T19:15:45.440000 CVE-2022-45173,0,0,ef103cd3d21923b0226e46c8095eac833f6c6c2f33732bba023cec324be70bfa,2025-02-07T17:15:22.550000 CVE-2022-45174,0,0,2d3fa80de772d8d09cb9182c1903b102e7360c3dd4aadb4161dfc338be831dcf,2025-02-07T17:15:22.743000 CVE-2022-45175,0,0,30a61c8362a73e1541914725c54ffc87135818cfb078974970c7cf9fb5590f2b,2025-02-07T17:15:22.940000 @@ -210472,7 +210472,7 @@ CVE-2022-4529,0,0,73d86ea07f92fe9aed29f4c17a645378f54f5f52a7e890a330add94dbc7e4b CVE-2022-45290,0,0,8ef93646a752d2a958272beba8293842dad04fa4caf40b62f54882ca3ed906e6,2024-11-21T07:29:01.157000 CVE-2022-45291,0,0,d9909270b62142c50308c3eb149a50b1a329045ec3a822d4ceb3a0b7f0a9538d,2025-02-04T18:15:32.290000 CVE-2022-45292,0,0,a220ce37e6b06145d6ba2bed95a11aee334f62ffbf11064d0502f0ea55146423,2024-11-21T07:29:01.463000 -CVE-2022-45297,0,1,c3d40692f2eb008a64501f776ffefb318506ed5f4f8f6afcf25ee9a4b43f6c16,2025-03-27T19:15:45.603000 +CVE-2022-45297,0,0,c3d40692f2eb008a64501f776ffefb318506ed5f4f8f6afcf25ee9a4b43f6c16,2025-03-27T19:15:45.603000 CVE-2022-45299,0,0,181887097dc285b724f72adfc41f11ef23349941f589389318b8817eaf9dedb5,2024-11-21T07:29:01.777000 CVE-2022-4530,0,0,cf8765ea8602d8dec88060a36fdc1b0bde04159fab852625f65a01f5454769e4,2024-08-30T20:15:06.780000 CVE-2022-45301,0,0,7f21a6a89058d69c22a2f6146a515a15fceca6c3b69b098486015a26d4dab81a,2024-11-21T07:29:01.920000 @@ -210643,7 +210643,7 @@ CVE-2022-4549,0,0,29a77c828f103b00373068334fe812fb343c6e19b5d4cd3519a61082451b09 CVE-2022-45491,0,0,4e624a14be160f7b9ac37bf9996037a7edd6d1e4ede0039a653385e6ca66671d,2025-03-26T19:15:18.880000 CVE-2022-45492,0,0,be61a73bebc11dc54d2ce18380eae1e1f4a3a0f74e909c36e1621302822298e7,2024-11-21T07:29:20.193000 CVE-2022-45493,0,0,88355351e568c54fca58a7d3eb129da7a9bbac3b38822108e44035efba5db975,2024-11-21T07:29:20.327000 -CVE-2022-45494,0,1,a52d21bc1879ec5507641487d87469c9308554975c9417cf5d6e9b2234191cc7,2025-03-27T19:15:45.827000 +CVE-2022-45494,0,0,a52d21bc1879ec5507641487d87469c9308554975c9417cf5d6e9b2234191cc7,2025-03-27T19:15:45.827000 CVE-2022-45496,0,0,7a7d209dfa778c61885ce8b532b335ba94289eab971efead0348075058f7d5f3,2025-03-26T16:15:15.743000 CVE-2022-45497,0,0,39dfe8eef99e8d3c410610743a5d8278a9861cc90b9b95aa616a7f2df09a5abc,2024-11-21T07:29:20.730000 CVE-2022-45498,0,0,8515281443317ef9de343bce9fddd4918576238ffbb7e875eba96a93c7c23145,2024-11-21T07:29:20.863000 @@ -210668,7 +210668,7 @@ CVE-2022-45516,0,0,50a5b5c0bce84589ceff877d9edf288eaa191c98d5403ad781bd6779d888b CVE-2022-45517,0,0,5579b60b83974989541c0d1617c977e754ff2f828aa55d86b2188196f0af6aef,2024-11-21T07:29:23.053000 CVE-2022-45518,0,0,1c22af889cc525029d5f9c1f5be95e78f41fb46dcf089f3e001f966b40cee78d,2024-11-21T07:29:23.180000 CVE-2022-45519,0,0,45df75b77f13b424e3c76de7906acfc44f8bb4045ba0db53e90230abd3df7ed0,2024-11-21T07:29:23.307000 -CVE-2022-4552,0,1,10ddd9fd20163811de39591ee417a9310fd7fe6ebe7df9fa086aa132598f3ea0,2025-03-27T20:15:17.350000 +CVE-2022-4552,0,0,10ddd9fd20163811de39591ee417a9310fd7fe6ebe7df9fa086aa132598f3ea0,2025-03-27T20:15:17.350000 CVE-2022-45520,0,0,33de6343f3c762e7d7de03c1a41f197d86a9337805b16e4f20843652b2cd38f0,2024-11-21T07:29:23.433000 CVE-2022-45521,0,0,aaebaca779263c0d2e55c3cf4308437ed4ef27d4df1b37f63e4c48143186e46c,2024-11-21T07:29:23.550000 CVE-2022-45522,0,0,832b32d9e3eb45e09d864a9bf23178fee053af524077dc802fd2844ad5ffb003,2024-11-21T07:29:23.677000 @@ -210678,7 +210678,7 @@ CVE-2022-45525,0,0,dca9ca212f4586c0d96a732b3002a995d8f13f766f5e2930c0b28fcc15455 CVE-2022-45526,0,0,b8c87827a3ceebf201b68f46666510aa2c4180c3d5b23c657861eb17e7bd6185,2025-03-25T15:15:15.677000 CVE-2022-45527,0,0,62d18ee6ddcdae5a65810a9b91c9a6b337423d63cc19d777685022976af01154,2025-03-25T15:15:15.877000 CVE-2022-45529,0,0,b3386b3f191b8850c8f626c5c21486b55ca721ad49cbd0960b36670b31965997,2024-11-21T07:29:24.457000 -CVE-2022-4553,0,1,9ed4806ed7e3908505e5be76e2948e005ae9f1103ceb96eaa0927ee172c9689d,2025-03-27T20:15:17.530000 +CVE-2022-4553,0,0,9ed4806ed7e3908505e5be76e2948e005ae9f1103ceb96eaa0927ee172c9689d,2025-03-27T20:15:17.530000 CVE-2022-45535,0,0,6992fc67dd8d64bc4ed985d32a3a1950bf9bcada4bd65217371eeb1ca99dad75,2024-11-21T07:29:24.593000 CVE-2022-45536,0,0,2bfd1f621568ae2eaceb65439ffe8f9d5adb0db740966db2b4b0589705fd26fc,2024-11-21T07:29:24.723000 CVE-2022-45537,0,0,e82adf2349103be3e3c75b0caad52675d26d8df68cd1cb4a661a3d2a79becb99,2024-11-21T07:29:24.847000 @@ -210711,7 +210711,7 @@ CVE-2022-45588,0,0,f73a9d164d884c9e184c23e9f1b2caf4962f54ec2e689bf695f72ed05e415 CVE-2022-45589,0,0,8ad6b6926bd203eccdcbbcc9c5785c01c7d73d4d8f47e6433fe66ede08a2ea79,2025-03-26T20:15:16.603000 CVE-2022-4559,0,0,3edd289e50a04a6ce45932a9d361eae123cc1d9b5b3d9fadc6d754bcc210ceee,2024-11-21T07:35:29.397000 CVE-2022-45597,0,0,0a63846daabfdbe9d684b85a7b644ab1ceee9656440de011a6048cda3954416e,2024-11-21T07:29:28.240000 -CVE-2022-45598,0,1,dc375843d9550ecf481f359e7b0316067f89f9afa11b8495c8716b42077eb420,2025-03-27T19:15:45.993000 +CVE-2022-45598,0,0,dc375843d9550ecf481f359e7b0316067f89f9afa11b8495c8716b42077eb420,2025-03-27T19:15:45.993000 CVE-2022-45599,0,0,02a7707b87783b97e24f7a17fe50377a36a6ef4f0f72ae8bc7aea7f1c085d90b,2025-03-17T19:15:14.610000 CVE-2022-4560,0,0,0e11ff69f9a0e32903cd534b58a4b6d5f5858d1fa11382434c1bb83d9d09ad5d,2024-11-21T07:35:29.530000 CVE-2022-45600,0,0,99231a92a00df74c331415b49861375d3afaf6ac2bcfaf7f632e00a83dcbd2f4,2025-03-17T19:15:14.840000 @@ -211455,7 +211455,7 @@ CVE-2022-46666,0,0,ae1cbd205840ce56a0d0648f0b87c2fbcb080c25614c9b8e09f5ebdd1d66c CVE-2022-46667,0,0,97ed49e9654aff2c4aa9cd4ff36ece4eb5ed101e4e07a762c2e5e533711a9ef0,2023-11-07T03:55:44.913000 CVE-2022-46668,0,0,a9633ff68175e38c5c9e6c90b414d49a2e6b29a095a0a2f98af94a7079af2449,2023-11-07T03:55:45.307000 CVE-2022-46669,0,0,e3a83f2ae8ec99c2ce5d12d82131509d5855828a8e837cfeccf234422d92de99,2023-11-07T03:55:45.677000 -CVE-2022-4667,0,1,cced2350cb6564eae3653cf6597cbce39366cc3916af0410acb05da8d23b569c,2025-03-27T19:15:46.710000 +CVE-2022-4667,0,0,cced2350cb6564eae3653cf6597cbce39366cc3916af0410acb05da8d23b569c,2025-03-27T19:15:46.710000 CVE-2022-46670,0,0,54ed06a7d924b0c6f4f98ce5c794923bab0141975614afe3d63c10cc4a1f13e3,2024-11-21T07:30:52.580000 CVE-2022-46671,0,0,371d72a4b5d5a652948c6ef1acb2d42d8f3997ba9cb800575aaa1ea10007af0f,2023-11-07T03:55:46.260000 CVE-2022-46672,0,0,96c257290952bb9e5e4515f95105030382b238d711535bb42c79c47151c81a06,2023-11-07T03:55:46.650000 @@ -211572,7 +211572,7 @@ CVE-2022-46796,0,0,d7d0664f27a2d4e020f3df85ebf84ed2cf7aa36cb78fe5cc6eaca3f6dc69b CVE-2022-46797,0,0,11e94650e67aefd4d4c9d91ae389080cc2a1a67411c907558f061b256d7b3e2a,2025-03-12T14:33:36.913000 CVE-2022-46798,0,0,edb402d1037f186ac36156aa877429e774451b1436eb07c9ba245e9e109cd1ec,2024-11-21T07:31:03.853000 CVE-2022-46799,0,0,9d13b88c2dfc97559068fe46d2601f81c3255970508f568e0eea09976ae264bc,2024-11-21T07:31:03.987000 -CVE-2022-4680,0,1,32864e00c5e72deef3243020b69b5c05e95064f81199a4c9f76fc34d0a1b6001,2025-03-27T20:15:17.680000 +CVE-2022-4680,0,0,32864e00c5e72deef3243020b69b5c05e95064f81199a4c9f76fc34d0a1b6001,2025-03-27T20:15:17.680000 CVE-2022-46800,0,0,f9c4a9dfb929f7df88ff733a62bea117c86b3437e87b4ccfc630222f94e54be2,2024-11-21T07:31:04.110000 CVE-2022-46801,0,0,a9cf2580d426790a4e47434774be3217825cfa010a338c531696a5eac8ee6519,2024-11-21T07:31:04.240000 CVE-2022-46802,0,0,bd0fae3f6a942b4e2f912c2fa3dfd08ae31b2512c8d6c5f274765607c9d29561,2024-11-21T07:31:04.373000 @@ -211714,7 +211714,7 @@ CVE-2022-46968,0,0,c503254a3e5c4d42a758af6f17024297295ac5fa736be3573aab667842fa9 CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000 CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000 CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000 -CVE-2022-4699,0,1,cf922a2126df12c447f79853b0f8261295119cfa3c73deb357289b0fea07ec16,2025-03-27T20:15:17.840000 +CVE-2022-4699,0,0,cf922a2126df12c447f79853b0f8261295119cfa3c73deb357289b0fea07ec16,2025-03-27T20:15:17.840000 CVE-2022-46996,0,0,984b54bc9341b35701fe20f31b56222296aa8090a9e5105f4e5975e85a224e16,2024-11-21T07:31:22.417000 CVE-2022-46997,0,0,d6b3106b43331cebd5b1808146e05d47adf2d8cd5cff8a2c65ce6c9922721726,2024-11-21T07:31:22.603000 CVE-2022-46998,0,0,7650348f47d1da0f0cdbe34cfc08aa292bb06012b3f4b0c73d53c0a944b099a5,2024-11-21T07:31:23.300000 @@ -211739,7 +211739,7 @@ CVE-2022-47028,0,0,8743caf558bced9253b1d6fe585a169d132e10709f3dbe1b3c63bc6a2ed35 CVE-2022-47029,0,0,7ffd86dd844d2bbf6073c4d8484396f95be11aaf967a8fb2357c820db9e08fa1,2025-01-14T17:15:08.233000 CVE-2022-4703,0,0,8418de99397416353d089f7c77b9c96fa373aaed1a282f808118fe4bbfc22d5d,2024-11-21T07:35:46.020000 CVE-2022-47034,0,0,d25a04b3a1502e7df47f968ee6208cb2988d766a3dcdcbbfe4d37795d671b6cf,2025-03-21T19:15:40.310000 -CVE-2022-47035,0,1,b2b5cf731b4cb97074b1d90051898d83680b29a44780b2475be5d011bda4068d,2025-03-27T19:15:46.220000 +CVE-2022-47035,0,0,b2b5cf731b4cb97074b1d90051898d83680b29a44780b2475be5d011bda4068d,2025-03-27T19:15:46.220000 CVE-2022-47036,0,0,92d073aacd563b837bb6f4112fc8cb3bfadc129362ce76304b1813bb1fcdc7bd,2024-11-21T07:31:26.190000 CVE-2022-47037,0,0,b7fc609d451bfda6f878d24ea2fdc9eadc19765ba7400d2dc9ea6aab83d4277d,2024-11-21T07:31:26.417000 CVE-2022-4704,0,0,437cb5c92631f3b77fb3fa54c5eaf4edbfa992bb1c25546876f80193ccb58891,2024-11-21T07:35:46.137000 @@ -212067,7 +212067,7 @@ CVE-2022-47486,0,0,16c88cf26b6dc32923811585704a2b8521c7471c6728a414e2a58ac5c4fde CVE-2022-47487,0,0,a8a5d05393e4580b5b3e8b869c299ab47395e2c6a52e0296f36bf76d5a24c145,2025-01-28T22:15:12.087000 CVE-2022-47488,0,0,a0b696160186495d6c12a013fdf9f6bd37bbf2fd11611b1b2cb7d16ed94c6d36,2025-01-28T22:15:12.250000 CVE-2022-47489,0,0,5e3c68ad7132c0474291500a52c6f078ed00a39388d28edf9b0a8b796fbd0dd9,2025-01-28T22:15:12.410000 -CVE-2022-4749,0,1,1747cc932ceffede30682cec8b19c767e98a1b6f5b60e96b9897c69314ca79fe,2025-03-27T20:15:18.010000 +CVE-2022-4749,0,0,1747cc932ceffede30682cec8b19c767e98a1b6f5b60e96b9897c69314ca79fe,2025-03-27T20:15:18.010000 CVE-2022-47490,0,0,173a87b7f4c954b6484889057d4590c904193d1b6f5ce24936446855f118f063,2025-01-28T22:15:12.580000 CVE-2022-47491,0,0,416b17b90fb1d2ceff983aa0c1097cfd23a28db36928f575bc3ff66f7c2a976d,2025-01-28T21:15:10.910000 CVE-2022-47492,0,0,d5088934cec8ae48796f1c8b991534b7f0d9a73ae66625114623e002536c2f47,2025-01-28T22:15:12.743000 @@ -212183,7 +212183,7 @@ CVE-2022-47636,0,0,b07a1c8d06db24ce1a2d9323a7a8ab240c0a66f31681ec68f64ee32b04fad CVE-2022-47637,0,0,b03a705756c454664a612aa05106714ea0c33f68e9da483399a1b7c374ddbbc7,2024-11-21T07:32:18.167000 CVE-2022-4764,0,0,24d9d66268b4fe72f3548481de46dbe0c85930be76d4d1d3af57d3eb5641907b,2025-03-12T21:15:39.713000 CVE-2022-47648,0,0,3ba71905c7fd4a09c1ca2497d201baf27e1fc3e4f8b9a565aee7836443116b8c,2024-11-21T07:32:18.357000 -CVE-2022-4765,0,1,fefa5ad012cdc162e185c6cc3a5f7ba1c9da385f5a333cc0709cfec07db8ffcd,2025-03-27T20:15:18.177000 +CVE-2022-4765,0,0,fefa5ad012cdc162e185c6cc3a5f7ba1c9da385f5a333cc0709cfec07db8ffcd,2025-03-27T20:15:18.177000 CVE-2022-47653,0,0,321c6cd6d410886660d6a3766c607822c5758acf3a23b9bab39153570f2615b3,2024-11-21T07:32:18.553000 CVE-2022-47654,0,0,6fdb421cdead1d06066b38e7bdf181080b8f5af324456d5256628afdec2bd1c5,2024-11-21T07:32:18.740000 CVE-2022-47655,0,0,02737a990d497d9ffcc7fcb78716506f644d63a192ee03a45e0e978150b658b5,2024-11-21T07:32:18.913000 @@ -212204,8 +212204,8 @@ CVE-2022-4768,0,0,6957e3cdf4174c08f5a6c86aa2a134dec1508a1480840d7b83763fcbbe37d4 CVE-2022-4769,0,0,cab2778b1b200842403935d511fb94146717490fb4e74f853b52b944d42747a0,2024-11-21T07:35:54.330000 CVE-2022-47695,0,0,7c414d51e20022f4fbf389ad674c5597d8c6dfb3b23510fccae0ee1b384090d9,2024-11-21T07:32:20.780000 CVE-2022-47696,0,0,175c06286078073a63f3a54d6c148e96ad870e3146fe69f4cfafcde90e1813b7,2024-11-21T07:32:20.953000 -CVE-2022-47697,0,1,572b275a7358b665310040a5fbb1671ec39782020261c35785598e631341f513,2025-03-27T19:15:46.397000 -CVE-2022-47698,0,1,a89a5871000ece8e5a0362876dea873418546b2dc6da66f6705ddb353c1fe824,2025-03-27T19:15:46.560000 +CVE-2022-47697,0,0,572b275a7358b665310040a5fbb1671ec39782020261c35785598e631341f513,2025-03-27T19:15:46.397000 +CVE-2022-47698,0,0,a89a5871000ece8e5a0362876dea873418546b2dc6da66f6705ddb353c1fe824,2025-03-27T19:15:46.560000 CVE-2022-47699,0,0,4d93be2061d212bed8d4112f42dcfa1bb097d1d30fba1f6146b77b55afe76da7,2025-03-27T15:15:38.733000 CVE-2022-4770,0,0,bfd3b6c4f33757f6336e311372b02202386421c8f00d94be9b4682081cb2b063,2024-11-21T07:35:54.500000 CVE-2022-47700,0,0,02d2444b7f7ef8275873a12037c422b8e477473ccf8aa5346a3268225effb500,2025-03-27T15:15:38.913000 @@ -212225,7 +212225,7 @@ CVE-2022-47747,0,0,40393540ec46b2bc787cbeaa5f4efda5f0457da0d6a2cb6501ac7df104e98 CVE-2022-4775,0,0,9e62ee99d802f700b843df7d1a80082cd009e26e49581b83d1a914c9a225542d,2024-11-21T07:35:55.117000 CVE-2022-47757,0,0,4903a03437750951ce1d4fcc01dd1c47204f157cec0a9a5a334395a7e0ce28db,2024-11-21T07:32:23.040000 CVE-2022-47758,0,0,28b333cedb54a49619fbfe3356af321c7ebc0d9c87592aa87d0898f8ee90482c,2025-01-31T20:15:29.623000 -CVE-2022-4776,0,0,7a1b14db56944379f456965c364dc113820844cbb2758f3ade4c4b307e09a008,2024-11-21T07:35:55.227000 +CVE-2022-4776,0,1,49a3e6d6ed8ead8d5014949b9e18febdef5bc9ca437cb7191aba836ca8caed2c,2025-03-27T21:15:41.193000 CVE-2022-47762,0,0,2a590b239c2be678d58bcbab97792edb5802d25a1359f27efa716930218d8f3d,2025-03-26T19:15:20.193000 CVE-2022-47766,0,0,763e81f1cc0cccea475848aa233a70de5a6e8cd550c4c48bd552b46b24e326cf,2024-11-21T07:32:23.707000 CVE-2022-47767,0,0,1713ff3c2a0889817ced29b4101751eaa659eee8c3064d65915b9243fb62020f,2024-11-21T07:32:23.860000 @@ -212254,7 +212254,7 @@ CVE-2022-47862,0,0,4f62e4eae8cfc17f23981bbd5ea802d5aa256e8975289fb788391fe366a02 CVE-2022-47864,0,0,bd4bf5cf2559a82f35df0b50621009b0f1b2a2a7bc4ebce497e713b24b780f54,2024-11-21T07:32:25.783000 CVE-2022-47865,0,0,1fc190f14cc2a4b5cb3c4e1466ab699996108432048cd2b23dce10cc59ede32a,2024-11-21T07:32:25.920000 CVE-2022-47866,0,0,cc7d167190a995286487ab86106725535f18aff8036741687a7c79aa3722e3f1,2024-11-21T07:32:26.060000 -CVE-2022-4787,0,1,f5fcb6fbd5b4ae6d98ad34ae280ca082cde795fababba287d2c0b6db4580dd5e,2025-03-27T20:15:18.343000 +CVE-2022-4787,0,0,f5fcb6fbd5b4ae6d98ad34ae280ca082cde795fababba287d2c0b6db4580dd5e,2025-03-27T20:15:18.343000 CVE-2022-47870,0,0,1d6dbe1e91ba599fee5280d7df331ac4b345a170a64cf66c4fdb8600a1f9a2a1,2025-02-14T19:15:13.597000 CVE-2022-47872,0,0,7a9e6d48be86642f6e906833e9f14f87dffb1d01d7055f7b112279fc89dc4045,2024-11-21T07:32:26.340000 CVE-2022-47873,0,0,c6db98c09f7359cc82af7a009e44cd5aed1611d5fce80cccdb9bcd6442cc1260,2025-03-27T15:15:40.257000 @@ -212281,14 +212281,14 @@ CVE-2022-4791,0,0,88b9947b01451fd3199741332dd29f64d60311438560ac69ed2ca7cc399201 CVE-2022-47911,0,0,5a5c6b2be806b95cc36a7c96c07829d5157384b8f475ad1624f858bb54bf06f2,2024-11-21T07:32:31.320000 CVE-2022-47915,0,0,a5f9213bbcf2bb98ed3dfe4d8654563d17cbaa172bedda24b64a3b730184be14,2024-11-21T07:32:31.490000 CVE-2022-47917,0,0,f2ceac1005866817845123385e6cff4a40de626e8a479202d8911ed95836d056,2024-11-21T07:32:31.657000 -CVE-2022-4792,0,1,8a68b7e39c2bc7081c1e5785899083df37df9ed2dc29c07e463ede969ceefd1d,2025-03-27T20:15:18.517000 +CVE-2022-4792,0,0,8a68b7e39c2bc7081c1e5785899083df37df9ed2dc29c07e463ede969ceefd1d,2025-03-27T20:15:18.517000 CVE-2022-47924,0,0,c376096147afc4276748c64a5358831d282c0e13aa1e9627b371fb823fb32a20,2024-11-21T07:32:31.850000 CVE-2022-47925,0,0,3c4aa65890b2d4b2655588fba8d970251832319df447501dee67e1c780551a67,2024-11-21T07:32:32.057000 CVE-2022-47926,0,0,6fb9eeaf9bce7c0718734ae3534265d12ffcd4adf936dec7fd38521c5d5e583e,2024-11-21T07:32:32.243000 CVE-2022-47927,0,0,dae418bbe446bfb302132c725462cbf389cffc32bc8aed5619c8b790dd1df9d3,2024-11-21T07:32:32.463000 CVE-2022-47928,0,0,bb1f9509023e24d36d79fffee2d16ac8507bcf41ac832c4875a26f9520273dc1,2024-11-21T07:32:32.790000 CVE-2022-47929,0,0,c105528129c1ad3adf3ef95655112a0b94c7c2f1052bf2658939ef1f14203edc,2024-11-21T07:32:33.047000 -CVE-2022-4793,0,0,a6d04485c5737445d4d6a7917664666f4a5f154d269223ff3a9dbfd5b67bef99,2024-11-21T07:35:57.187000 +CVE-2022-4793,0,1,6d1e9f792a7838bd1432d3121154a424b060cc0460b4dd4afad72cec1a43b138,2025-03-27T21:15:41.340000 CVE-2022-47930,0,0,e03c019ed7e8773170fcede93134398df90255663b9481165646fa65240a5bfe,2025-02-05T15:15:15.867000 CVE-2022-47931,0,0,cbed6b57082cfcf48b426e4fbaadc4b3cc5aadef9d07d5df31e008cf13647219,2024-11-21T07:32:33.570000 CVE-2022-47932,0,0,04473a142685fa421cd99b8d78e80597d269e671d491d38412418d38f69c1357,2024-11-21T07:32:33.767000 @@ -212482,7 +212482,7 @@ CVE-2022-48260,0,0,e7e60af9c858f5b5288b0031686d03e5e613b16cb37780d86f8482f3a3060 CVE-2022-48261,0,0,8fec913aab803791099630bb3b4add731b2952c5677136c8ab14d8481622c16b,2025-03-11T18:15:27.267000 CVE-2022-4827,0,0,95bbafc4819182c39fedfb5540a6f96a8876fa0ac713a3f4bb759af67856e443,2024-11-21T07:36:01.460000 CVE-2022-48279,0,0,394a4cbaf8fbdce41d3050a1e26a58576ff47efebe84a5d9ad6373aca9d9d413,2024-11-21T07:33:04.490000 -CVE-2022-4828,0,0,235f187e2b91cfcd70cdeacb644cab1113cdec289fa0dbdee23237ca20e95e63,2024-11-21T07:36:01.580000 +CVE-2022-4828,0,1,f9377bb9daa067b01cffcf1f42848ce8342ba75803a1ce5ee33b3c860a178da6,2025-03-27T21:15:41.490000 CVE-2022-48281,0,0,921437fb5b4ca63fdc6056e8918de8f66577a88cc04b59d1f2bfa89e0ac19104,2024-11-21T07:33:04.657000 CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b9fa,2024-11-21T07:33:04.807000 CVE-2022-48283,0,0,182b0c7b39d6bfcfce2462a72a2584378b317a2b7a0366549b6291e2e1e78698,2025-03-11T18:15:27.463000 @@ -212507,7 +212507,7 @@ CVE-2022-4830,0,0,12658cd6b6ffbcd22db77a170be79d07a2c3d3c7035194bc1c81b720212452 CVE-2022-48300,0,0,68b27ae46c5a1b653b78748c906ce35b14b41d4024811dd4e426156a847dc039,2025-03-24T21:15:15.473000 CVE-2022-48301,0,0,43413c08af045380c7771c2e1b9b9656942d4cc9df33bd10b6b03d3a4fdc0cfd,2025-03-24T21:15:15.633000 CVE-2022-48302,0,0,af31353fbf2d77593295d4766da6e07119e97b8ba6d5504d13405cfa9f2cbd09,2025-03-24T21:15:15.803000 -CVE-2022-48303,0,0,23fa42a26e031df9d7a365b89a32378ccfd1e8e4f3e37623749555f9ccd22acb,2024-11-21T07:33:07.547000 +CVE-2022-48303,0,1,e12cedcf499a2196fdb844f25f403c386e3ff24ca38a1a261682d06ef82c5a57,2025-03-27T21:15:40.483000 CVE-2022-48305,0,0,82b72b33de095e268c209f9adba2dd712c757d4a50881d06a01057b452c88bc5,2025-03-11T18:15:27.867000 CVE-2022-48306,0,0,581b3f7c6835b19483e20918c619e2cba46939dec937a9438624500a1e126768,2024-11-21T07:33:07.820000 CVE-2022-48307,0,0,1ab0e87cdd229f5260ebf07c4929c512268971855b184c130be6112c737aaa70,2024-11-21T07:33:07.950000 @@ -212544,7 +212544,7 @@ CVE-2022-48336,0,0,ba0217a40cc917b7cc43ebc898c8823e30e848f10286e73d38b211541025a CVE-2022-48337,0,0,e10025007eabb6b44845155875b8036b7cd258476065a31f0db5b947ea578d80,2025-03-18T16:15:14.647000 CVE-2022-48338,0,0,eeffc00e354f6c3096eb8907d8f2fb2801a51f3a1e0efea7301efc2e80d0cccb,2025-03-18T16:15:14.863000 CVE-2022-48339,0,0,dc47bbca04a3bb680ca1a557835b58dd411f30b2efb4a8941274b15529ef4eb6,2025-03-18T16:15:15.070000 -CVE-2022-4834,0,1,a334ca82467062e65c486dad878af7a92cd886a133be2d5efd6f8ff8eefd70bd,2025-03-27T20:15:18.677000 +CVE-2022-4834,0,0,a334ca82467062e65c486dad878af7a92cd886a133be2d5efd6f8ff8eefd70bd,2025-03-27T20:15:18.677000 CVE-2022-48340,0,0,8e0f0fc27a6560aab5a7afbc3723b56256dd2045311fab0ac518ac28afdad99b,2025-03-14T19:15:40.370000 CVE-2022-48341,0,0,48aa520d98f65b45ae85915415cbb085208d85ef4d6403abeca4de4ebb7550af,2025-03-12T15:15:37.443000 CVE-2022-48342,0,0,5b58cdbdb63ee3a2390229ad8bdfdbc38cdb4d31963cb45a1024022af163ef9b,2024-11-21T07:33:12.713000 @@ -212555,7 +212555,7 @@ CVE-2022-48346,0,0,e9a6fca484067f694b4295c67382bb27add976e780c49b7a6de551ef92454 CVE-2022-48347,0,0,2a2a2e7682966e3b51f22fc18957ee285c28256a87b17e92c00e8dd8185e131a,2025-02-19T19:15:11.850000 CVE-2022-48348,0,0,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000 CVE-2022-48349,0,0,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000 -CVE-2022-4835,0,1,9767dce25e0abb511ad0042bee58f33257eb177388ac38d47ba8364a650383ea,2025-03-27T20:15:18.847000 +CVE-2022-4835,0,0,9767dce25e0abb511ad0042bee58f33257eb177388ac38d47ba8364a650383ea,2025-03-27T20:15:18.847000 CVE-2022-48350,0,0,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000 CVE-2022-48351,0,0,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000 CVE-2022-48352,0,0,d86867be797a1b5b2dd8a70bd1cbeb2c21eccf0ad77186550568b0580b01790a,2025-02-24T15:15:10.903000 @@ -212577,7 +212577,7 @@ CVE-2022-48366,0,0,40b8dcee156b44165a66a59dac89249a9f52ab12258de1e17f30c4c54cdff CVE-2022-48367,0,0,d82067646b346a8279d79bfe5c8a110a939fc1772a639bf1a5605ff44510a41c,2025-03-04T17:15:11.203000 CVE-2022-48368,0,0,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000 CVE-2022-48369,0,0,54899196847c57d74a4cd598c1dede975771f962361a60ace2f6c23d87bd0a2b,2025-01-28T19:15:10.660000 -CVE-2022-4837,0,1,f72f8b3c3c47c24521f466a568032f87bcb87edce90f1ea582835bfd36ea2696,2025-03-27T20:15:19.003000 +CVE-2022-4837,0,0,f72f8b3c3c47c24521f466a568032f87bcb87edce90f1ea582835bfd36ea2696,2025-03-27T20:15:19.003000 CVE-2022-48370,0,0,e52f6ce1025b703fa07b1d91079e4e082c808ff0743ca27417eb52c3734175f3,2025-01-28T19:15:10.870000 CVE-2022-48371,0,0,a463a72667e09565998c6cff8e92196ff6d2cf0b44fb388fd0c2580dbbc84031,2025-01-28T19:15:11.250000 CVE-2022-48372,0,0,cee9e4f50c2de00fb1bd4bf85525c958e40829d57632d79830560c7c3825d513,2025-01-28T18:15:28.183000 @@ -212874,7 +212874,7 @@ CVE-2022-48716,0,0,f27a2156bb6379d407ec84f56d1b8f7df26a9cf53b0bba61b16172565a529 CVE-2022-48717,0,0,b3b08bd8e722ce2459091035138c2b5548df0105d024b90098827376a629e5a1,2025-03-05T19:17:58.723000 CVE-2022-48718,0,0,56ecf471bcba13fb47d5f3ace85ade27dab5f6ff3be1a1b50c6e21a26de8e9b1,2024-11-21T07:33:51.233000 CVE-2022-48719,0,0,1ec83493267c5a3396d0c5845cc4a1abca73ebaedabef02e084a478b98384c5a,2024-11-21T07:33:51.357000 -CVE-2022-4872,0,1,bd983ec589fb7247ee85da696c8ec022ec1972c4ac97eb49f86975fc0bb5edee,2025-03-27T20:15:19.160000 +CVE-2022-4872,0,0,bd983ec589fb7247ee85da696c8ec022ec1972c4ac97eb49f86975fc0bb5edee,2025-03-27T20:15:19.160000 CVE-2022-48720,0,0,02e5440d2e129c68f87d38267ca9ca83cd0afc56b4b54b23445fe006f4c6f951,2024-11-21T07:33:51.487000 CVE-2022-48721,0,0,967e29fd0b047b476de3f9448a7d389cd6087a6dab62f90e0f76d2c83be4b608,2024-11-21T07:33:51.597000 CVE-2022-48722,0,0,215b1205f4274d0ffbe393d1a6191f0fc84e22ccad7b073333434dcdc127f13d,2024-11-21T07:33:51.730000 @@ -214079,10 +214079,10 @@ CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed00 CVE-2023-0068,0,0,9a8a74364602aa47803b0fc5b3d404e3784fcede87a606edad0e86bb382aa06d,2025-03-06T15:15:13.520000 CVE-2023-0069,0,0,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000 CVE-2023-0070,0,0,b0c884747610581841dc93e26a5e2ee1d4765fe47e00b4585b794b367d40e426,2025-03-25T21:15:39.840000 -CVE-2023-0071,0,1,fac2054c56e2eedb755983eb9f7969399996d6e1886205d449868fb84a2b6019,2025-03-27T20:15:19.327000 +CVE-2023-0071,0,0,fac2054c56e2eedb755983eb9f7969399996d6e1886205d449868fb84a2b6019,2025-03-27T20:15:19.327000 CVE-2023-0072,0,0,0dfb1c385d55844d9cc3653e0cef06cc39b0d24dad8279460a81b412b8934918,2025-03-25T18:15:30.107000 CVE-2023-0073,0,0,2c46cd6ad420bcb7fdf527980b197915cf634a6f47b2c3aed9852a043de04203,2025-02-27T16:15:35.380000 -CVE-2023-0074,0,1,2764cc74c8e93e9da9c5d5d1864caae348d4722d2607bc1de1e0cfb9147235a2,2025-03-27T20:15:19.490000 +CVE-2023-0074,0,0,2764cc74c8e93e9da9c5d5d1864caae348d4722d2607bc1de1e0cfb9147235a2,2025-03-27T20:15:19.490000 CVE-2023-0075,0,0,5bea0ca2d7a224094f3104798bafe63aeb2f84f2af4765fca40a30a6227f504c,2025-03-21T20:15:14.390000 CVE-2023-0076,0,0,a78e9ecdc4cb9cf0c285f6cb0f6ce5ab64c97f1efb57fe80772751b3c2fb5e79,2024-11-21T07:36:30.493000 CVE-2023-0077,0,0,54cf430de37e8e17358d3d6a767e8ac261826291e3b749985a0330380add3044,2024-11-21T07:36:30.600000 @@ -214105,7 +214105,7 @@ CVE-2023-0093,0,0,6f9c485568e18c814878943071f2c40f2d18b208ad6ee0a728f8e8b358afc8 CVE-2023-0094,0,0,a89a17929970dc13f48dcdcd5ee44efd0ad1698543e99f1c3440861d97b08758,2024-11-21T07:36:32.463000 CVE-2023-0095,0,0,95331a65733d40509d23e0a524199932ed5a35586b68a91ed182c14e85fd3144,2025-03-25T19:15:40.323000 CVE-2023-0096,0,0,20d4bbb0d4b3c8cec5a54a800fcc8ef5c57493d1fa668a58228fa517a3bd0bae,2025-03-25T18:15:30.383000 -CVE-2023-0097,0,1,2aafb09e6ed3a25f5d99f995ce3140cd623ab100943383bbaccd3444bd543057,2025-03-27T20:15:19.650000 +CVE-2023-0097,0,0,2aafb09e6ed3a25f5d99f995ce3140cd623ab100943383bbaccd3444bd543057,2025-03-27T20:15:19.650000 CVE-2023-0098,0,0,64d9a48c59592ba6536ba071a89952613e0cba793eb9d6e3814b0950162e46b5,2025-03-21T20:15:14.540000 CVE-2023-0099,0,0,1256f8563bc74dbe1844e1d08de72388e7f62a118f65c56a7d3cff8e675139f0,2024-11-21T07:36:33.060000 CVE-2023-0100,0,0,e4c750e104019521d9a5f27283d4c5dda7e61f8ece2e20cfed11554ccf39edc1,2025-02-27T15:15:35.703000 @@ -217993,7 +217993,7 @@ CVE-2023-22319,0,0,f9dc12dbcea0f7dd031b848dd22cf831216224b2927968b4b9926439cb620 CVE-2023-2232,0,0,1a9bc3dc667f2d32d85cb5c0fd16326f2f1a44f6ce62c458139f15bd04d8230d,2024-11-21T07:58:12.217000 CVE-2023-22320,0,0,1490e1a0bc30f60ed3cf477f5e002d0271f868f08c13d6423b385e47dddbaaad,2024-11-21T07:44:31.407000 CVE-2023-22321,0,0,b6b427a124fd3635c61cf3ca11dd7049df41ff1111d08752a99f6deded7d9037,2024-11-21T07:44:31.517000 -CVE-2023-22322,0,0,0af8f2d5729a1a375f779207e2932d61a1e33b9188ac0a83ed92bc7a5e9a33af,2024-11-21T07:44:31.633000 +CVE-2023-22322,0,1,73e6da4b2e93cf5dafd49a0d7d2fe8f5e94d1245561177b15224f176531f8ca1,2025-03-27T21:15:41.690000 CVE-2023-22323,0,0,07c49ab1fca51a9ec6367b94f86b19d2bc9fffc54259f852693eb5bde5e66b72,2024-11-21T07:44:31.740000 CVE-2023-22324,0,0,30d8117079140c7a1ae9f0e15bdf38893847f6feca6dcf6b3c8c75528c833c41,2024-11-21T07:44:31.870000 CVE-2023-22325,0,0,c137aef31be38ff81d8119e0632a1dc6f32b6d01fd9edca7544c48a1859fb730,2024-11-21T07:44:31.983000 @@ -218608,7 +218608,7 @@ CVE-2023-23014,0,0,9cd6e8d6016047fb1ae99e666271de44606868b3f06eb3aed8e4261524f99 CVE-2023-23015,0,0,d0df99d21d959de5ef6ca5ef41519474b95948e67493f30a62f330b9252515f8,2024-11-21T07:45:48.207000 CVE-2023-23019,0,0,6fa0f085d84aa642703ad0112ad1d5d370abb78a90a932c7ada8d2b4a972061c,2024-11-21T07:45:48.347000 CVE-2023-2302,0,0,34ef982b498e7430ee832284943c8a861cec9e7cabdf617316655fb267a14723,2024-11-21T07:58:20.680000 -CVE-2023-23021,0,0,af65000cf9cdf3a306277ff48c020a44996e20883779be140c18bf95be70ca60,2025-02-21T18:53:16.480000 +CVE-2023-23021,0,1,de796f515282cac2f3c80318876a1fc888c5c6b9fd9235d041bc60c7ca86bac4,2025-03-27T21:15:41.857000 CVE-2023-23022,0,0,8d160fd47bc2d83557961bce73412bfc4fd56a6cb0dc5f780f17d7483ed39a5a,2025-03-26T21:15:18.500000 CVE-2023-23024,0,0,838283ba567bc9263f7dddf82097b0db2f7d4a69538d24890a976311d9b10f81,2024-11-21T07:45:48.837000 CVE-2023-23026,0,0,4fdc1a06c97613dc44df7ca61e875a99d577333e1b9ea2c67dfbd1ac2a90b747,2025-03-25T15:15:18.513000 @@ -218712,7 +218712,7 @@ CVE-2023-23327,0,0,608b9a4add436041417cbab32eafb701aa970f9e7b4e878dfae91fbe6a9d7 CVE-2023-23328,0,0,93bd54281b2a6b33993da36fd1ee5c9aba3043faf08f089dbbd35a213677db25,2025-03-04T22:15:35.720000 CVE-2023-2333,0,0,49815d35ba5652045e1256f3d4e37c7e202552cb53ecfa1b0d6fb27fcb89f551,2024-11-21T07:58:24.400000 CVE-2023-23330,0,0,4d49459152c00a8d0e982eb0ce8f3681dcb11541a12b5dcd275f47bba39075ba,2025-02-18T21:15:14.247000 -CVE-2023-23331,0,0,b84a1a7634d01037bc3f1c88ee1e839a2ef2a60e14da401de106f78681906d84,2024-11-21T07:46:00.377000 +CVE-2023-23331,0,1,c8cd4ffa400e5800d79826d047998943ad9fd9806b8332a3c4872ce23faa2112,2025-03-27T21:15:42.077000 CVE-2023-23333,0,0,751f15753260050fd73792dc283863a28ac75a4ca88698a62afade697ab5ce12,2025-03-26T19:15:22.803000 CVE-2023-23342,0,0,6041b2327347e8a0859a99cc54655a1332e9c4445afe08d5de6bbb0b69aae26a,2024-11-21T07:46:00.660000 CVE-2023-23343,0,0,bb3022548a9a04ccf780ceb8f604c70dbaec538d4eacc84e9d57190e0f294b2d,2024-11-21T07:46:00.790000 @@ -219424,7 +219424,7 @@ CVE-2023-24057,0,0,2feb3fd496256b9f20278087e7dcdc922617089eb07e5782b164f0d2a1edc CVE-2023-24058,0,0,6d5e32e79e025fb393a1a293275112f3a5bc7d674573e2a138e60bfb55fb6d8e,2024-11-21T07:47:20.983000 CVE-2023-24059,0,0,95b2954083591b890387cff80611929ced52d21b8bd0dd3a4ee38ad4c8bbaa77,2024-11-21T07:47:21.137000 CVE-2023-2406,0,0,1c8d9123ea28fc718e69f3085d16c1bbc9aa6c6acfd323d97cfe54ffc11168fe,2024-11-21T07:58:33.177000 -CVE-2023-24060,0,1,9f22102b3cecfd70cc788c7c9875e7a1141618884af2c27424251feefdf06547,2025-03-27T19:15:46.877000 +CVE-2023-24060,0,0,9f22102b3cecfd70cc788c7c9875e7a1141618884af2c27424251feefdf06547,2025-03-27T19:15:46.877000 CVE-2023-24062,0,0,d2f5a93bf7dc1e49a8b689f32f43e7d262343479e601f04db90b39ed876f6972,2025-03-18T19:15:41.127000 CVE-2023-24063,0,0,91c0bd66efb4c4cc0ced958b18d29cddd5fbad4075264869aafe0b56f9fbcd24,2025-03-27T16:15:18.810000 CVE-2023-24064,0,0,7bdb354760226c2d2e74a93d79fcc6ec58b75f5bfa6556fb6667234425e37981,2024-08-19T19:04:26.627000 @@ -219737,7 +219737,7 @@ CVE-2023-24491,0,0,343c894eabead267dfbaf53d0d3d496c9367c22b164d1eca3becb37dae86c CVE-2023-24492,0,0,47a5e3a9bcff7b705c65ada8806d4068ca0966f82e9a8b2a24f0d52a4dc0b556,2024-11-21T07:47:58.317000 CVE-2023-24493,0,0,c01626a1c7b2367dfb38b1b946fbb0a6b9d1d93c1b08d0a6510fb0c1dc095526,2024-11-21T07:47:58.450000 CVE-2023-24494,0,0,1fd541bd4860e72072e7e2faf71f443148b674550973d50026e566883eba5ea7,2024-11-21T07:47:58.563000 -CVE-2023-24495,0,1,46c778049fbeb866d5e98eeb871be7d2b463b0ae33df5a6f13057b9a312d5ae2,2025-03-27T20:15:19.880000 +CVE-2023-24495,0,0,46c778049fbeb866d5e98eeb871be7d2b463b0ae33df5a6f13057b9a312d5ae2,2025-03-27T20:15:19.880000 CVE-2023-24496,0,0,02a951c17bff9498ed83686dbff963322ee771b055324a8b164eb4fece0465f7,2024-11-21T07:47:58.877000 CVE-2023-24497,0,0,180759a420bd41aa2b76b952f5d77cca91060437840879f45dfb99bbf7431c58,2024-11-21T07:47:59.500000 CVE-2023-24498,0,0,e14661a95b82ba61b2d6ebf51f43c3ea526f2c51dd10e773ff4939b7ccf19059,2024-11-21T07:47:59.617000 @@ -224388,7 +224388,7 @@ CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd CVE-2023-30300,0,0,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593772,2025-01-30T21:15:11.870000 CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000 CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000 -CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000 +CVE-2023-30307,0,1,770feea52682071fcf9018307b3ce7e46516bce082cff0011f0f356dbe14eb7a,2025-03-27T21:15:42.407000 CVE-2023-30308,0,0,fd87c6a0d0962acbd3b78c36844649609644f0a499e688bdd567d9a916d40e5d,2024-11-21T07:59:59.913000 CVE-2023-30309,0,0,2cdb0b35bc7b2187cd19c0e7e68b673c6877674a4011bbc11b115c8364b54f7e,2025-03-13T18:15:35.737000 CVE-2023-3031,0,0,e2aec5206e5a0daa8d7b6f1685928c6f3be4a3f9026fd0ab515b66968c1ed2b4,2024-11-21T08:16:16.910000 @@ -227030,7 +227030,7 @@ CVE-2023-33538,0,0,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c128 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 -CVE-2023-33548,0,1,2a9ea367ba1eeefb9766c976c37f178b01a7182ac9a7d3fee8a9409abd33abf9,2025-03-27T19:15:47.060000 +CVE-2023-33548,0,0,2a9ea367ba1eeefb9766c976c37f178b01a7182ac9a7d3fee8a9409abd33abf9,2025-03-27T19:15:47.060000 CVE-2023-3355,0,0,66c43df3dd0ee91c832932172c9cb5c8a55655cbcbf5f77d9dc727f70b08e4ec,2024-11-21T08:17:05.290000 CVE-2023-33551,0,0,a4dfddb59ce749b636114722bc7e227dadd5beadd604ec4bebffa41debf639f0,2025-01-09T19:15:16.993000 CVE-2023-33552,0,0,ee1087ccfd9a3e3baacbad0d60bd717ae7303666f219bedcf581fc6b1a61de5e,2025-01-09T17:15:10.250000 @@ -230623,7 +230623,7 @@ CVE-2023-38299,0,0,721a56a8a8bed33cd1e34034d3a441d6fa41c6abffb245ba03bd35b5452e2 CVE-2023-3830,0,0,dd1dd7ebfff920ce047c06cfe8f1302499ae4c9aa15502eb023a2658bab5e82e,2024-11-21T08:18:09.973000 CVE-2023-38300,0,0,01d5a46ec445518dfec47f45e9544533e3da7e9a5b599a1257679eb1b45276eb,2024-11-21T08:13:16.320000 CVE-2023-38301,0,0,a6096e14beb75277cb13ff355de67f50a271b9aec11a275c1e3feb781584b128,2024-11-21T08:13:16.527000 -CVE-2023-38302,0,0,2c53341c5b17e250068a510a58808175d3acda4aeff6c3eddcc831eb916b8ea4,2024-11-21T08:13:16.783000 +CVE-2023-38302,0,1,eccbe55efee1d1c3a9dabe9e9193a1079b8bf582745718987d26035851c6ffe3,2025-03-27T21:15:42.617000 CVE-2023-38303,0,0,8dd2eaffbac854176a2667a2f564c98b65abb452d3f64fcb49bfc08b61e0e10d,2024-11-21T08:13:16.927000 CVE-2023-38304,0,0,ab388b165fcd3ff9f1a0cc8154baacd06714ce82736137b09c13def8ac0e3dc6,2024-11-21T08:13:17.080000 CVE-2023-38305,0,0,2323b8851c5e104c709f642fd35a8711e8f47594579b69af0282462874b6c0fa,2024-11-21T08:13:17.233000 @@ -230873,7 +230873,7 @@ CVE-2023-38547,0,0,2b2d99dc0b12a17e84ec9c9cf2241317051c7fea7f54e71bd1cddbbb60e52 CVE-2023-38548,0,0,94a619ea0c0739293919cd8abcc38048ec1910e65463718b4b27b4b29ad08636,2025-03-06T16:15:42.350000 CVE-2023-38549,0,0,223f4da3ef138e6118d09094cdb53d07b647a42b8ce5c54b50f75768a9451617,2024-11-21T08:13:48.593000 CVE-2023-3855,0,0,3fa7c2c96667132385f9e93f131c3f823b77b6bf879f2fd372afb1b648775efe,2024-11-21T08:18:13.613000 -CVE-2023-38551,0,0,192d3411bb909e5538c7acd67c719431efc5fafe865c7e56d0ec31d44c3f71bc,2024-11-21T08:13:48.717000 +CVE-2023-38551,0,1,fa3a8e4ecee9bcecc3d6cf297d301bb64d0a4536ae222b7d1c5550caf2efaef9,2025-03-27T21:15:42.800000 CVE-2023-38552,0,0,313a13cb7d16abda4ef89339251740dbbe8bdd8ae532f15ed39fcad2eb342b7e,2024-11-21T08:13:48.830000 CVE-2023-38553,0,0,3d837dab0bf61b4ca5171b4a3e8514370673bc12afeeb265357341967cf0bb73,2024-11-21T08:13:48.977000 CVE-2023-38554,0,0,2a4ddff4759ed897b41283f7af4e7d3b96a0ab5a4df3f784ba0ae3a2ebed1e00,2024-11-21T08:13:49.107000 @@ -231387,7 +231387,7 @@ CVE-2023-39219,0,0,b97c27b4ba6e9f84a742e99300720b42ef90354e53e6c62bcba7cb52fd1f0 CVE-2023-3922,0,0,8220e82dc614ee3ea4ee4cb43c1099e63720133076a67f32f354d59747371095,2025-03-20T16:59:56.803000 CVE-2023-39221,0,0,263056c5c53fb97f2bda582e043759e8c45fe675fe559b32415ac03b261c0b85,2024-11-21T08:14:56.590000 CVE-2023-39222,0,0,ba914cf3602b383cdfdecd81d6bb270a3b0187d60557df2f9e99375390214213,2024-11-21T08:14:56.730000 -CVE-2023-39223,0,1,b06cde28c2d8a74be14161db1b80bf096a93cd8e2bbe042152046511592fd522,2025-03-27T20:15:20.060000 +CVE-2023-39223,0,0,b06cde28c2d8a74be14161db1b80bf096a93cd8e2bbe042152046511592fd522,2025-03-27T20:15:20.060000 CVE-2023-39224,0,0,ec04654a1e41850a13ba960b217dff365646bbd3525d21936a97b06f2f89bb25,2024-11-21T08:14:56.990000 CVE-2023-39226,0,0,f16f5605a3b26654d0ca89bf5f7801e2552a360160c925ae33bd573c01fe46bc,2024-11-21T08:14:57.117000 CVE-2023-39227,0,0,45c79f0c5a572bccbb57291af720254e6e8d4b3995b298e038410b536708465a,2024-11-21T08:14:57.243000 @@ -234368,7 +234368,7 @@ CVE-2023-42949,0,0,ce2fdf2e1e165c9a9ee012246e15f0d5ed35db7d927a6163e1359acc9a27a CVE-2023-4295,0,0,a3c60f19374ba368bfa5b688dace5c532b63c70c1cecce4722b34824aec8780a,2025-03-24T16:15:17.463000 CVE-2023-42950,0,0,186b120c42d16f43046ee6f072fbe7644cd28e6168a9032f4076b275ba82cedc,2024-11-21T08:23:35.033000 CVE-2023-42951,0,0,121a5c0c1d17502bed7317173a1705a78522289256ce9a61da10683dfe7402d1,2024-12-03T20:26:23.957000 -CVE-2023-42952,0,0,6891ee256bdc72cf6a4c57b42f33beb2238326aae5a4615a12a4c5ea4a2a6b07,2024-12-05T19:56:22.987000 +CVE-2023-42952,0,1,84497093c11e581d94c37b61624df96247c534594b5196ec3466abb038b89e4f,2025-03-27T21:15:42.933000 CVE-2023-42953,0,0,be651a2585df3a4d1b6fbc44895268b21cb745aefd4866e02b3d268354be1ed1,2024-12-05T19:52:16.060000 CVE-2023-42954,0,0,ef997ec1b7ae2a871a1cb4c336cacfe0db7dc99e6ab84fea7160916f83ee81b6,2024-12-09T16:39:29.457000 CVE-2023-42955,0,0,9a7093b162a5952b346cc7d639d97cf55b5568f8e8b96b082cfb333a701e54cf,2024-12-10T17:35:05.937000 @@ -235767,7 +235767,7 @@ CVE-2023-45203,0,0,891df09f143ea604e797c853d9f488d58453ed02263d5fb559ec5a27a3f02 CVE-2023-45204,0,0,e03b890a9ef8b79ed9d4d4d669521f79bab42731027f11abc64c1103157aaa4e,2024-11-21T08:26:32.767000 CVE-2023-45205,0,0,d512b3f441e34aad2b103f02bb9fe7488f12c6322890c1016e426f614cb4181c,2024-11-21T08:26:32.897000 CVE-2023-45206,0,0,8aec752b9e92419c74ee9c87686f15e2ae298162134722773a47603a33e00a5e,2024-11-21T08:26:33.030000 -CVE-2023-45207,0,1,f53d4edca75b8a587cf996a1f460cd439712f153f6422509804887b351006914,2025-03-27T20:15:20.233000 +CVE-2023-45207,0,0,f53d4edca75b8a587cf996a1f460cd439712f153f6422509804887b351006914,2025-03-27T20:15:20.233000 CVE-2023-45208,0,0,44e1c54e9761208375886aa6c551e84dca2a1307ce97c1ae6d312d0ae0167552,2024-11-21T08:26:33.397000 CVE-2023-45209,0,0,2eeea9e1951668e3a3ccb86bb2f86e011b97491c0d8252d44cec81492a8fdd1d,2024-11-21T08:26:33.563000 CVE-2023-4521,0,0,12d7baa68d09259d1c53243c2570a3d9d75c151bc1456c29997313b48f95c25d,2024-11-21T08:35:20.500000 @@ -235964,7 +235964,7 @@ CVE-2023-4554,0,0,1dabbd1bc56bfdd63e88ebf8290f2e78ccba5cb7cb09e490a55815e32eacd3 CVE-2023-45540,0,0,76296c335c286b5e0de38535f901a05edab8c009dd99c935256f3a3fc6c16e49,2024-11-21T08:26:56.987000 CVE-2023-45542,0,0,f8c12d64f8b0c31ce5413c67054db16178c8c89e08f2f277462cb8813fc16866,2024-11-21T08:26:57.140000 CVE-2023-4555,0,0,e0e6bf6ce1f936495f491312928c2bf0307c20b47bebc17045a2568a8b1232a6,2024-11-21T08:35:24.710000 -CVE-2023-45552,0,1,95d625e19b14c68b5197f6d131b954ce2b7baf21cfbcc835d8a108167758c781,2025-03-27T19:15:47.350000 +CVE-2023-45552,0,0,95d625e19b14c68b5197f6d131b954ce2b7baf21cfbcc835d8a108167758c781,2025-03-27T19:15:47.350000 CVE-2023-45554,0,0,3b0b16921f63b1269252720c6dc4d88c721707015d813ea50b04bb949e42347f,2024-11-21T08:26:57.420000 CVE-2023-45555,0,0,718a497417d8eb484622bf8d9402f96540d4022a2f9bb228126de3fa8bdec796,2024-11-21T08:26:57.643000 CVE-2023-45556,0,0,036e3f485ca723c298407660cb9b641339813d940bd6d0f367172dfd68f6770a,2024-11-21T08:26:57.797000 @@ -236374,7 +236374,7 @@ CVE-2023-46055,0,0,bf442d3f0a401380929c55930b18abd6aa0fba3de92c00bf71a3a30b3b2fd CVE-2023-46058,0,0,a98b2c81afde25938df924883c9238f7784c6735e3a09a494bfe7b327e41a92a,2024-11-21T08:27:49.553000 CVE-2023-46059,0,0,b9ae5af95b67d70ce92de19f994d8910c354c35fe571f4985aa19eebec43a288,2024-11-21T08:27:49.710000 CVE-2023-4606,0,0,1da32fa9c9b6c11d8ed347831055f0bf158f76827d2350899fcd6d15fd031c56,2024-11-21T08:35:31.833000 -CVE-2023-46060,0,1,934e7bd83c4b0b76b7edd9938c46e17f2e09ddbc848554cd18d22cad97d8cbc3,2025-03-27T20:15:20.477000 +CVE-2023-46060,0,0,934e7bd83c4b0b76b7edd9938c46e17f2e09ddbc848554cd18d22cad97d8cbc3,2025-03-27T20:15:20.477000 CVE-2023-46066,0,0,b18a576d57d8eda7a7fe84d3b2c583166a1007c89a02d1b95f3e203714cf89f2,2024-11-21T08:27:50.080000 CVE-2023-46067,0,0,e69dfb30f8597e90628929153953d5ad2983f170563d84db0e6921e69636434c,2024-11-21T08:27:50.233000 CVE-2023-46068,0,0,2fbf57c7f357b6364b026e5eb1ba045d09f8d16b074a69bc624451bb24aaf47b,2024-11-21T08:27:50.373000 @@ -239664,7 +239664,7 @@ CVE-2023-50377,0,0,2e55e5dd0b9ea749ddd96251ca5ab5ff90e2e8f4b180745130261f7bd6023 CVE-2023-50378,0,0,0454eb883a7466b810642c469a3a15f6ba9e92155bb9f1e7524280e2f82c443b,2024-11-21T08:36:55.923000 CVE-2023-50379,0,0,fd3adb905092852181e8bc67a6b8793f0092968b26eb04852eaf4a74f32379b4,2025-02-13T18:15:50.790000 CVE-2023-5038,0,0,4c238d283e75a890575a8cc3d86d933745aabcc98fceb1d1036e6b25ebb71346,2024-11-21T08:40:56.980000 -CVE-2023-50380,0,1,22ea67bbfb6fe4bd890c3541f6887d3849c816f11e865289aef2de22a157f913,2025-03-27T20:15:20.650000 +CVE-2023-50380,0,0,22ea67bbfb6fe4bd890c3541f6887d3849c816f11e865289aef2de22a157f913,2025-03-27T20:15:20.650000 CVE-2023-50381,0,0,ee7d57e36ca60df4250d44e574938eb8ddcf3bd310f31deb1c9d78f7fa4c00b0,2024-11-21T08:36:56.433000 CVE-2023-50382,0,0,cbcc81630f09b2c4cfb0c22d8dc9844a60d0e20289efc5af82ef418493cd09c9,2024-11-21T08:36:56.563000 CVE-2023-50383,0,0,e859d76f4d38e71520f31d9bb502fae7a56c4ad7c8e60650734d136fd3214959,2024-11-21T08:36:56.687000 @@ -241014,7 +241014,7 @@ CVE-2023-52347,0,0,8bf6e45b2291e9e73c85e0a82d3361086ac887f755cb13f43fea82d95581a CVE-2023-52348,0,0,5f04e1f05e51744a0d9165420731ac8898eb65f248e2819996b7d916b127991c,2024-11-21T08:39:36.970000 CVE-2023-52349,0,0,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000 CVE-2023-5235,0,0,d60cb063c431e16d154938f787c88edea25158e6f998bdc8d307504da3640982,2024-11-21T08:41:20.830000 -CVE-2023-52350,0,0,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000 +CVE-2023-52350,0,1,e787bfdf9b7404a4d4a55cfbc0df63ebaa45aa0cdebb3ad698e5d43e8f92d6c6,2025-03-27T21:15:43.130000 CVE-2023-52351,0,0,ae1c357072e2a7ac4c35aa6825d034c9b3b811bf80ab16d77d3472c073d508d1,2024-11-21T08:39:37.373000 CVE-2023-52352,0,0,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000 CVE-2023-52353,0,0,bedecbaa24cc0b1421885a5f0c9ff34c4b2ec5cab8318d49ac216487970f2120,2024-11-21T08:39:37.730000 @@ -241023,7 +241023,7 @@ CVE-2023-52355,0,0,299969b0386a5d4e00a55f41710eef8d0aae6cae26e8c4438026b903ba2e0 CVE-2023-52356,0,0,e2b4173e3711dff29cdbafe3aee754b4ad46c795b37babed1ee8e0680c17799b,2024-11-21T08:39:38.163000 CVE-2023-52357,0,0,c90b8cf2c9fd4f0bd5f3a1801bd62383f3576028919c434b9e3c4930a49535c4,2024-12-06T19:31:16.340000 CVE-2023-52358,0,0,caff3a3cceeaa9f53391afabc8456e4d7818c60c58df2a6f9a8d9ac878bf0536,2025-03-13T14:47:46.747000 -CVE-2023-52359,0,0,8ae1056b22034998b04b67b0579601edf1e0c814a8ae597fc84e8da5336dd7a2,2024-12-09T18:03:10.427000 +CVE-2023-52359,0,1,d111661793c7321f70f0dc313319112ada0d9977237410299ea5e29f987c203b,2025-03-27T21:15:43.330000 CVE-2023-5236,0,0,fae9024cc39ccab3805ebac406973d2b89825794dc9b312a2a604ded9d2e85e7,2024-11-21T08:41:20.950000 CVE-2023-52360,0,0,226e23600ef295082458c88722bbff585b570a1b29c169a33a3ea276579c74b8,2025-03-17T15:15:39.547000 CVE-2023-52361,0,0,e8145c184aa1d630e38e5e391cbf0efb13b269936042053c6de8ae608f61a2a3,2024-12-09T16:15:19.790000 @@ -241039,7 +241039,7 @@ CVE-2023-5237,0,0,bf8b863edcb3c5dbd4e829c0548224833a285d1d6a3f96c65fa64c47ca318a CVE-2023-52370,0,0,94fc14502a4d082ed0023df02f476a1a9de326e52ea2553a92d94d30b52b29ce,2025-03-13T14:49:10.850000 CVE-2023-52371,0,0,7531a56783aeb5263b0586630fda68511b4faa53430d233bc0eb23a33226c58c,2025-03-07T15:43:42.530000 CVE-2023-52372,0,0,200d9d0ce452463a2949081bc20e21a2e11f1eb6431715b24267f517e2f492ca,2025-03-13T14:49:30.230000 -CVE-2023-52373,0,1,914600e3bf2f385966d0f47756004b495c9fa7d8c2d171a6911b840082860952,2025-03-27T20:15:20.857000 +CVE-2023-52373,0,0,914600e3bf2f385966d0f47756004b495c9fa7d8c2d171a6911b840082860952,2025-03-27T20:15:20.857000 CVE-2023-52374,0,0,f7c7dc71aae61c7a49af2689eb99a7f9557001d39fc73c8b81aff8a5927066a7,2025-03-13T14:49:42.830000 CVE-2023-52375,0,0,de141ae0ea0ebdfb003fbfd21b542696405d88af0d6f1aaaf9b9b4f29e3ec6ed,2025-03-26T21:15:20.220000 CVE-2023-52376,0,0,468bf51b3f2afd752595d6c4bec28b1aa22ac2920b422019f22cf051f9676692,2025-03-13T14:49:57.373000 @@ -241053,7 +241053,7 @@ CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89fe CVE-2023-52383,0,0,0896518fe62d2dc21b46faade65b82e8d6a73652f759d7c438873c636b9520f9,2024-12-09T18:08:08.193000 CVE-2023-52384,0,0,a0858fe822f434a91ee109c6736810d86d6ed12a68ddf9d7a7cedbb99a49feee,2024-12-09T18:06:50.143000 CVE-2023-52385,0,0,a8ba9055d678e96920d26246714cf8e05dd12770af0fb3b9b8fbfc7ad2fcf1c5,2025-03-13T15:53:40.423000 -CVE-2023-52386,0,0,7667d0ab20f6db0a1dbff02109554234cfbd5a2bd822ae87317ffa5d39405d9c,2024-12-09T18:01:30.060000 +CVE-2023-52386,0,1,b6faa22f88b3183698d8dba844fff0c3949954f6036d51408b71c3b3bfdedde7,2025-03-27T21:15:43.500000 CVE-2023-52387,0,0,ef0eb299f7e076fc894d1ea342ec3ec51360bb75a186d1678156a8f6a09222f4,2025-03-27T15:15:47.827000 CVE-2023-52388,0,0,3a8c131ee16337972ffdd152217cef4373a34ef7e8fbe53e5f6eb3c31ec4a600,2025-03-13T17:15:24.977000 CVE-2023-52389,0,0,cdd27d39a980c988360dc5cb35d2c141be31c7b4daaa5d3516a0d3bc5bb502c5,2025-01-20T17:15:07.527000 @@ -241304,7 +241304,7 @@ CVE-2023-52639,0,0,579dbcdfbd6af13a51f85bf72840c1b4fc290f95ccccb50fdb9da28a6c9e0 CVE-2023-5264,0,0,3e616cabf1a089b6e6cdd95ca27e570fd2ac3366b640b4e1c4e5769bd4fd0c47,2024-11-21T08:41:24.370000 CVE-2023-52640,0,0,8ab36630cf2f06b00061ad38b52fee04b65f9a53ce446d61a91aac4f6928b553,2025-02-27T22:02:14.217000 CVE-2023-52641,0,0,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000 -CVE-2023-52642,0,0,0849231b5f49f1582907dc9506d58475c9d2e27f67b2f48d0ab5d7548fdb7d36,2024-11-21T08:40:16.077000 +CVE-2023-52642,0,1,33eef23bffa3de9152ad66e1c6bf2b14f1390a574a7a5763ee95794ef05d26a3,2025-03-27T21:05:43.420000 CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000 CVE-2023-52644,0,0,b760bca40d9b70b85571c34d8b346c4edc36411799b1c246512f50487abbe354,2024-11-21T08:40:16.333000 CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000 @@ -243549,7 +243549,7 @@ CVE-2024-0018,0,0,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed3 CVE-2024-0019,0,0,1a2ededa1eb1dbcaa0bc1c1d84127480128e02c1cf238c266ddf5fd5d1d39ff4,2025-03-13T15:15:39.900000 CVE-2024-0020,0,0,21a32907b1564d9154c7d4ff0db8ff8780ea7a747120fe57f3cbe387673b9075,2025-03-19T14:15:34.860000 CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 -CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000 +CVE-2024-0022,0,1,c872374b67bbe6efa4202e79118e08e8c8cbd47646de291906cf2977747d99cf,2025-03-27T21:15:43.683000 CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 CVE-2024-0024,0,0,a2d109221364312c807d7475e5eb704274bae4708e2b0502b6787d8f406a89fa,2024-12-17T16:48:14.057000 CVE-2024-0025,0,0,773977a25e23767e6123822557779cc3fb2142579915e770376287955fd10cca,2024-12-17T16:48:34.537000 @@ -243667,7 +243667,7 @@ CVE-2024-0145,0,0,7d01cb77c5d157bd7abc17279e81a20c5c2c78a8e9874d3f3a50cad415c9ff CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000 CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000 CVE-2024-0148,0,0,2a89f4eab8868e793fcc1d57971f0539f43e40d46615bff4106e8db8b0d25b2e,2025-02-25T21:15:14.700000 -CVE-2024-0149,0,1,c1fceaf029a28e1780f55f47f2d78af4423162b2c00148c6cb1b2f8200b0eeb4,2025-03-27T20:15:21.053000 +CVE-2024-0149,0,0,c1fceaf029a28e1780f55f47f2d78af4423162b2c00148c6cb1b2f8200b0eeb4,2025-03-27T20:15:21.053000 CVE-2024-0150,0,0,a0819331f8fcd2317c8b0a40ccdebab71000a4816dfe15eb899f5f94179926a1,2025-01-28T04:15:09.877000 CVE-2024-0151,0,0,47427b70774487ec12e517511137a7ffbbb3bc25062c399b4c4cdc16ab998934,2024-11-21T08:45:56.783000 CVE-2024-0153,0,0,10e06947828f7bd4a4b70390242301f7e57408fb24d0d2d1c57daa18df3af5c4,2025-03-27T17:02:49.117000 @@ -243894,7 +243894,7 @@ CVE-2024-0394,0,0,33f678379ce4dda5d7d36acf798fd3656df13a3d2d3b49b3ab7653be71454e CVE-2024-0395,0,0,d15fe2b1f51b19968c48a28eea8138c91ece05366453d27247985892e7aca48a,2024-01-10T14:15:44.970000 CVE-2024-0396,0,0,b8fec668f3bad11fa8d995814f4099bb56bb10a9fd800764640d541722b77ded,2024-11-21T08:46:29.587000 CVE-2024-0397,0,0,72c90134cb4e100c7d48eb715f6b286cb6cbdc43115d6238b71656e1c9cc31c1,2024-11-21T08:46:29.733000 -CVE-2024-0399,0,0,ef6f301a7d07ee391e6aeb2c5caa25edfaa38ea0ec5bb660619c57b97298e12f,2024-11-21T08:46:29.970000 +CVE-2024-0399,0,1,944991349cc3e26dd3d313cc75bcc2fee0d7e46f56d3598834e9efd63497c507,2025-03-27T21:15:43.857000 CVE-2024-0400,0,0,d53ab5ef2a2202e9503db19d78333617c67c35adacd04c47616906e17a6a08d8,2024-11-21T08:46:30.080000 CVE-2024-0401,0,0,0823df990368b4b050577e6bc5b48e2ef1b07328db0e6b9bddf77162cab73776,2024-11-21T08:46:30.213000 CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecdb5,2024-11-21T08:46:30.360000 @@ -244239,7 +244239,7 @@ CVE-2024-0753,0,0,e52718dd101f2efb35f6b07ee2ebf588b7dcb9e4bc3d55b776298b889af61f CVE-2024-0754,0,0,25ff4f9a8cee0c15cab6f719d9bf308f0a9fe0424e74cadf0c66c17e84a5192e,2024-11-21T08:47:18.093000 CVE-2024-0755,0,0,6d0822b953773faae30b0621d4bdbbae07c3bb5a3b47f595baf288ae2398a521,2024-11-21T08:47:18.213000 CVE-2024-0756,0,0,993cb8b8fe6b06b2e129344b5fa8b12cf5cfac31df95f7db26c17acfe05fdbb7,2025-03-13T18:15:36.437000 -CVE-2024-0757,0,0,946a152258210ddf800742de2d2343ce7559594b796f9e76d968aa0487d9bd5e,2024-11-21T08:47:18.487000 +CVE-2024-0757,0,1,f816aaa61d3b112229e4bae892875184a7c196cbed8ea8ef7347cd4faace37a0,2025-03-27T21:15:44.050000 CVE-2024-0758,0,0,e2cbb6a743b0f38d8763d67905dd1888ec1c82e9f64e59374dd3f997e1e4d7e2,2024-11-21T08:47:18.590000 CVE-2024-0759,0,0,99b9eb8ee7043f71b6949c108b98a1a65f3d27bc16c58f4c0db3736fc042324b,2025-03-04T14:34:52.510000 CVE-2024-0760,0,0,28b1688290a8429996cb15aa4a590dfc852aa2c256b386e9997c92991939332f,2024-11-21T08:47:18.850000 @@ -248328,7 +248328,7 @@ CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda395 CVE-2024-1398,0,0,9645ba9f8586ede4d8e9304631788266d0cde74989f61af36e6ddca7859998d4,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 CVE-2024-1400,0,0,bac94fa923e5d8ff034c18d15cece1c7c0b0b8e72e665f80cf1c9da5ac122607,2025-02-05T20:56:20.887000 -CVE-2024-1401,0,0,aacd439a69914554cbcd89a76778f88178b8f02575b95bb844c89b14ab015b63,2024-11-21T08:50:30.317000 +CVE-2024-1401,0,1,b23d762f1d910c69059dcaeb908b81ee887d8a9ab721644c2f1ebeb0bb57e287,2025-03-27T21:15:44.207000 CVE-2024-1402,0,0,c16a2bb5e28338a9b7a8e909fd1180bd46f3314048e1fd4a395f2a2357ace438,2024-11-21T08:50:30.447000 CVE-2024-1403,0,0,586131040c12c42e3d4d259065af315a9ce447a030f9164bd11968bf5202492a,2025-02-11T17:40:59.267000 CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af3816,2024-11-21T08:50:30.790000 @@ -248469,7 +248469,7 @@ CVE-2024-1546,0,0,20b46b0886050374983872f3e9f415862bc23b6e822591c4a69cc101004371 CVE-2024-1547,0,0,3326f00a3c44c7c5bbdd8b0fa2e0164e2326f4a9489951bec76323437a1a6ddc,2024-12-10T15:22:44.033000 CVE-2024-1548,0,0,264db1df1b6d7476f78c58dda928373e915822324621603a4da251137925913b,2025-03-27T14:36:57.067000 CVE-2024-1549,0,0,b1f44a3f7e4fd21183f36330b29b0a99d461fffeabdba35d5079e5742e472f71,2025-03-27T14:37:40.907000 -CVE-2024-1550,0,1,0252307c7b2723f339e37dc53f606f594d87234a6dc1d1efcefda9847721501c,2025-03-27T20:15:21.197000 +CVE-2024-1550,0,0,0252307c7b2723f339e37dc53f606f594d87234a6dc1d1efcefda9847721501c,2025-03-27T20:15:21.197000 CVE-2024-1551,0,0,287dda421e1eaaa9cc09294bce356e9e64e9825417508ff13ee29c792f89d66f,2024-11-21T08:50:48.600000 CVE-2024-1552,0,0,30c96bcfb84c7461bd42e95971b8dc42930c486c7512a99bf79568bb90d5a9b0,2025-03-27T15:15:48.760000 CVE-2024-1553,0,0,71440071da73726c9b03b544e59562525fc7d18417e201e9c167f5b1692db063,2025-03-27T14:39:22.487000 @@ -248565,7 +248565,7 @@ CVE-2024-1654,0,0,54b765485da31e34b294f618921ee811c38caafb34113ca3e291e29f9af89f CVE-2024-1655,0,0,73472418806d29e6d771b815384afb3f8654a25ef96081ba479a56044724fb2f,2024-11-21T08:51:00.953000 CVE-2024-1656,0,0,e243f4b9296b3740f96ff646ddc835ed81a3996419b970e73520fbf18022e5c0,2024-09-11T16:26:11.920000 CVE-2024-1657,0,0,9d0dcabd947122c0ce24953e05521475a0c3a91683a93bec3c9f2dddcfbfd885,2024-11-21T08:51:01.173000 -CVE-2024-1658,0,0,960277ea2699040edb030b04e49c74c0567b890abcadb9ec96265f8f00a5022b,2024-11-21T08:51:01.347000 +CVE-2024-1658,0,1,1481067e3d66f4003021d97bea32ce6df51d1d48c930745370797032923c0d86,2025-03-27T22:15:14.193000 CVE-2024-1659,0,0,89ae27a5a9ba7c42d9a91c4b580358dd8ae6b774fde1ed1f21377fc24269979e,2024-11-21T08:51:01.463000 CVE-2024-1660,0,0,0b36a025a7cf15647cb940ade020894d26d5070278e93d1cba73cc4d9e477666,2024-11-21T08:51:01.610000 CVE-2024-1661,0,0,57419dfac19fc8b1117ab03280b3c2a88810749b66775f5fc9b43a910e481cd7,2024-11-21T08:51:01.803000 @@ -248576,7 +248576,7 @@ CVE-2024-1666,0,0,089335f87a6dcbe16f454cd776a838285b6d754521e9a0f8137d17bef352cf CVE-2024-1668,0,0,fe6b0ccebc04a53251191ba8b135acc78bdfc1e7ee08a3bf262e8391ed2b55f9,2025-01-31T13:48:12.577000 CVE-2024-1669,0,0,67b8eec966ddacedd4e70201d9e33c690767f007ef44b6e221a074947960a93a,2024-12-19T17:32:13.720000 CVE-2024-1670,0,0,e643325c520a7a851aaa6d5c5034d3498bbfacaad698e63e558de9d2308fc412,2024-12-19T17:33:44.580000 -CVE-2024-1671,0,1,15cbaa8e0a277119f7125c3485bb38f131d19fc9804ed64e43651cddab9957af,2025-03-27T20:15:21.390000 +CVE-2024-1671,0,0,15cbaa8e0a277119f7125c3485bb38f131d19fc9804ed64e43651cddab9957af,2025-03-27T20:15:21.390000 CVE-2024-1672,0,0,a400dfb45976314f12cfa537274bc886172b15de0b2a1765521de83af338f943,2024-12-19T17:53:20.020000 CVE-2024-1673,0,0,6164a803e9507fc575ed2827a4461e4a60cb6f46604a08c2b79c354e0c9fc3b8,2024-12-19T17:54:58.023000 CVE-2024-1674,0,0,4ba13d339c0085a8c6736e2e58ccbdd34850427ed620a2dbb72ff03c39afc724,2024-12-04T21:15:21.223000 @@ -249678,7 +249678,7 @@ CVE-2024-20933,0,0,af7e2c6ae091b6b3568ab36265d3ae229c6833dd800da30fdeca3e4ea1d96 CVE-2024-20934,0,0,b65f965737a3e2891245c60dbd96bbfcead55912ea958deb1745b6d679d34da3,2024-11-21T08:53:27.817000 CVE-2024-20935,0,0,fb50273773637c8237056a5f8a044f59613cd802e29e7214b39fb546dc6c5406,2024-11-21T08:53:27.937000 CVE-2024-20936,0,0,5d4df234249aa2ab491dc91aa6c10f33af2a50a73812483f6640ba4c5e8d786f,2024-11-21T08:53:28.060000 -CVE-2024-20937,0,0,9f7a5f5a131093c9b119dbd0de8a4ddc6a0c065a2d2291ce3b1d58ce46223d58,2024-11-29T14:08:17.250000 +CVE-2024-20937,0,1,4f80cbff14ef8426eb8cf91f72aa46b1043ddf88995f5ff9ae93fc2ea4552248,2025-03-27T22:15:15.273000 CVE-2024-20938,0,0,6fe21b52aad41d5c17bb42ae4439eea9ca26609905457e042a739e5c570e5ae2,2024-11-21T08:53:28.290000 CVE-2024-20939,0,0,a61ef26bf2d0edb06b899a122ed306c452492ece485364c57e14dc58ca287a91,2024-11-29T14:08:10.783000 CVE-2024-20940,0,0,2eef388a674fa50646c1a9e94e9cc85f45f15970a44431d112399a9bcd04b4bd,2024-11-21T08:53:28.510000 @@ -249703,7 +249703,7 @@ CVE-2024-20958,0,0,149419b060759246d6cae1e43624291d74b0b1d5abd88c07c297c6d3a8b4e CVE-2024-20959,0,0,f9b90a5eedf73ddb81fa34757772f993fdd64f588a1c2172c0c5c9aa8fae9959,2024-11-21T08:53:30.730000 CVE-2024-20960,0,0,d96161a36e34d00aab601e4b7363fe712ba73f2dcf4593d1140b753634c58939,2024-11-29T14:06:46.623000 CVE-2024-20961,0,0,51a4970131e834b5c0d1ee774c4d82e066339eaf1025448371f6c8154077a2c0,2024-11-21T08:53:30.967000 -CVE-2024-20962,0,0,621606931ffe92a0bc87053003a3c9f036f3f6379d513f0fb3b5978fd5f41ff9,2024-11-29T14:06:30.670000 +CVE-2024-20962,0,1,6ac675b3baf771c4c59a3107dd162fe53c6e747acee6ab03c29c3e15753df374,2025-03-27T21:15:44.353000 CVE-2024-20963,0,0,3d2bf247f783cf9c0e047a28f06b813ad770513ab8871e6187920473d61d18fb,2024-11-21T08:53:31.213000 CVE-2024-20964,0,0,bc2bba70a27171b1c7c5317d888c62c740d29c39706c575eb601e53eaadee2bd,2025-03-27T16:15:21.633000 CVE-2024-20965,0,0,c5e310a631c3aa9eabcd76268666e50a45b0a79fedba7e8717da2cbf6a098bce,2024-11-21T08:53:31.440000 @@ -249784,7 +249784,7 @@ CVE-2024-21035,0,0,d2fbfaedf089554ebd136e895cb65baddcf16dcbad1772b825817ddc3620a CVE-2024-21036,0,0,9716f0e635448b3b06bae092630560368788e8a689f20c314603ce7bafdfd005,2024-11-21T08:53:39.773000 CVE-2024-21037,0,0,a8caed0e50af2140b886ac5f1eadaf5f49badf0ba61ff6a2935a3c296d30e46b,2024-11-27T16:29:55.693000 CVE-2024-21038,0,0,1adb7ff5f6fe0a529caab26fdcf2f8ea4f4c32a167db3ca11674bb9926af08c9,2024-11-27T16:29:46.520000 -CVE-2024-21039,0,0,9e849f2e997482adfd295f815712b8e6ac601092b901788e4865133c50fa396f,2024-11-27T16:29:33.007000 +CVE-2024-21039,0,1,76214cc3ee1496cbcbb57921e70f884c9853bc6bae842054da929c5469ae1cfe,2025-03-27T21:15:44.493000 CVE-2024-21040,0,0,070905331b2c836df4c3b8ea412ab635548fa6214034105f7e7164064c7484b8,2024-11-21T08:53:40.223000 CVE-2024-21041,0,0,f2b1782dbda5c6362f51de8f8f731f3a42af2ad638813bee05ae28e16bb5fab2,2024-11-21T08:53:40.343000 CVE-2024-21042,0,0,753e95ccf1859b7bc2caf7e3c33300377ad4a1ff83aef47f19a9c97145cf1810,2024-11-27T16:29:25.637000 @@ -249820,7 +249820,7 @@ CVE-2024-2107,0,0,f6b06b3b7d2a7fd14939cc7b98294c66c6c74558e1f24a1569c0e585aca9e3 CVE-2024-21070,0,0,8c69e86f327387e344a4a157732398076b6e10c698da182731e3238f871e4c5d,2024-12-06T17:08:50.733000 CVE-2024-21071,0,0,98ba86ec23aa4448542dbb9694cad9a5d659dff1a698e451bd9de1002956c26d,2025-03-26T15:15:48.580000 CVE-2024-21072,0,0,3ac71ebde404278590ff522ceda3046ad4c8241198899f7a8f9724077bcc2ed1,2024-12-06T21:13:10.447000 -CVE-2024-21073,0,0,c01b594eaa263591053056bfcee1edb91ed63f3e7bf68e343858996c63ec24ff,2024-12-04T16:28:30.120000 +CVE-2024-21073,0,1,bb4c474e21341190c88d59cd70b34901988a8cb6d5c2d4fea460d7d93091521c,2025-03-27T21:15:44.640000 CVE-2024-21074,0,0,8f4ec5b658a02500412292af4ee9e452284eb8282a132a7fe81ca7b52c84d377,2024-11-21T08:53:44.187000 CVE-2024-21075,0,0,f8ce27f6f43e3061475952b24b2ffcffc8fa2843e7c29c98632b3c35f19adbec,2024-12-04T16:28:44.167000 CVE-2024-21076,0,0,8f1c149af81a6e1c7bfc33075425aa7a08c3baef744f1a856fdd70254c60f506,2024-11-21T08:53:44.397000 @@ -249862,7 +249862,7 @@ CVE-2024-21108,0,0,0aa73826356529169ca32161f3148e64f89898c133699dc5c1f7375bf2d91 CVE-2024-21109,0,0,cc4f1adc4745c06ca7a7a281d0022f50da47ffa469ecf384bdeb4475a6299c21,2024-12-05T15:16:07.703000 CVE-2024-2111,0,0,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5b6,2025-01-08T18:23:37.207000 CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000 -CVE-2024-21111,0,0,ce04902122edd823f80a1fc79ecddd6498bfae611dda514cff0b08c3d5f73631,2024-12-05T15:16:10.643000 +CVE-2024-21111,0,1,85e2f52425c28e0c62da6f146a926d9294b9d91dde4d1c9fd98a8331db596932,2025-03-27T21:15:44.783000 CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f6d9,2024-12-05T15:16:13.397000 CVE-2024-21113,0,0,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000 @@ -250455,7 +250455,7 @@ CVE-2024-21720,0,0,fb67e72ba582adcc0c5e5d3a9e98cab75db5f6134d2b15bd6a10b63688338 CVE-2024-21721,0,0,6410e381c95c472dc089a2773dc0abc68f1f222dbf9d3db9afe0135917afba85,2025-01-01T00:15:37.987000 CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d39652bb,2024-11-21T08:54:52.290000 CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000 -CVE-2024-21724,0,0,6bdb2572da490900c4e7fbfeb0ed627aeb6ea812d8bb609f7e848cc10f6a5438,2025-02-14T17:24:52.837000 +CVE-2024-21724,0,1,90f98621740411a24ebbbb514a7d09daacd8a8ba2b0e4725c9049c1cb50630e3,2025-03-27T22:15:15.453000 CVE-2024-21725,0,0,102bc48d163faec6cc11fa8ada828cb863fe99c32c41e6fe5250a9d25bfe5aa9,2024-11-21T08:54:52.683000 CVE-2024-21726,0,0,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000 CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd484,2024-11-21T08:54:53.040000 @@ -250733,7 +250733,7 @@ CVE-2024-22050,0,0,e1cb308d379dc9b0fd0d21838c350f2334d03c72b5ac66c2e1a1d1fd634f4 CVE-2024-22051,0,0,75b6c443eda23ec7c8c394f9eb758dceb0558efa279bf487d8d0429231c0f89f,2024-11-21T08:55:27.970000 CVE-2024-22052,0,0,fb73937d7972ce431af34c9c065dbcdabf7e31300916b9f35e3aabe9a5b95c49,2024-11-21T08:55:28.100000 CVE-2024-22053,0,0,6223f7c4e20f4a3638f13269fe1da50479ec1f14fc3364892d43d4a908a5a57a,2024-11-21T08:55:28.270000 -CVE-2024-22054,0,0,b092baf4fbc36aacc19ee17878290470df7e4d78193d037ba3b0c1afdd4ad57a,2024-11-21T08:55:28.447000 +CVE-2024-22054,0,1,1f9589abcdda5305056d2853de64c41b95564aaa3a394ea1566bc77c27d24a07,2025-03-27T21:15:44.933000 CVE-2024-22058,0,0,c6e909191e931132825391684a21578f710eeae7c6f43cb60340156746910da0,2025-03-17T16:15:21.007000 CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6396,2024-11-21T08:55:28.760000 CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000 @@ -250919,7 +250919,7 @@ CVE-2024-22247,0,0,98551df5e52ed97248ab470679d67b187ff4dc2bf422d4a17c411b750b658 CVE-2024-22248,0,0,7d11e6f20b6e40a0e1b3d2474db81de7a92f55a017f57048c4c374e5a84d824e,2024-11-21T08:55:53.237000 CVE-2024-22250,0,0,40db3fb51052a18ec19cf444cfe62376d1b552d431677cfcf8f3962e85474381,2024-11-21T08:55:53.373000 CVE-2024-22251,0,0,7962e8c1073d0793f33908f5af22b8fc0809c0ba75822692ea4b295588a7524f,2024-11-21T08:55:53.500000 -CVE-2024-22252,0,1,f5949bf1f821b4b0a30bff45e5e17fba5e511d8e2938928ceac12ac2a4f6fc6a,2025-03-27T20:15:21.593000 +CVE-2024-22252,0,0,f5949bf1f821b4b0a30bff45e5e17fba5e511d8e2938928ceac12ac2a4f6fc6a,2025-03-27T20:15:21.593000 CVE-2024-22253,0,0,b50aabf6eb2ec6f9d4f741174d0b5159ccfe7acd1b46f4546735214781343c2c,2024-11-21T08:55:53.773000 CVE-2024-22254,0,0,2fe0462c8eff093e322a6ddd02c09b1d23f8f94e5337f30d36595c1b2c8402e5,2024-11-21T08:55:53.910000 CVE-2024-22255,0,0,d960bb32026f52cbb91b98955eb040cf83d5638234fbe58082db83cc49b3ce64,2024-11-21T08:55:54.043000 @@ -250932,7 +250932,7 @@ CVE-2024-22260,0,0,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c CVE-2024-22261,0,0,46d669194198080bacc4599579892d52d349bfce87a7598545a77f0180f961cd,2025-02-27T15:14:51.320000 CVE-2024-22262,0,0,c6cba0eaa82aa4b35f3e73f09e60a77ab1893f065fbc1843c84c2a7ba444c92b,2025-02-13T18:16:47.980000 CVE-2024-22263,0,0,6b57c165ae6f4f24efbe95adbce97de5c609eb29ccf1915937950705d9f78a34,2024-11-21T08:55:55.223000 -CVE-2024-22264,0,0,578dd8660fc7c0fa6384213c2b7962834c168b36b5ef92fa90215ef8713df428,2024-11-21T08:55:55.360000 +CVE-2024-22264,0,1,41cf9408b734afbf4c752259ac6ee58534aaed593aedeaa9456d16bebd1e98a7,2025-03-27T21:15:45.093000 CVE-2024-22266,0,0,5a01c6e98b30179eaa3c94d91a1ca14baf1020518f14d649701450e7ae82dd1c,2024-11-21T08:55:55.490000 CVE-2024-22267,0,0,104400d906916687382e6059349a61fee72323b8edae8c01227a38e83f6cb1bc,2025-03-14T15:15:39.803000 CVE-2024-22268,0,0,bc1e6e036ca5b6fa9995e3668ab5416b25db7e7589d663e8e27f39530c1b1891,2025-03-27T15:15:49.787000 @@ -250943,7 +250943,7 @@ CVE-2024-22271,0,0,75c1718838fa265bf8dac6e03c9384a09b6896e0d07a3322cc92b020117c5 CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 CVE-2024-22273,0,0,57d23372dcf9fbefdc38d1098eb55f47fbc7c3b9c8cc29f9336c883da00fab81,2025-03-26T16:15:19.423000 CVE-2024-22274,0,0,568316e85d4cace1f65225c3627bf29b9b513721d081155f7f0f0f60375a00ad,2024-11-21T08:55:56.530000 -CVE-2024-22275,0,1,a375c4bbe70082e63d9c996f63c20fc8049ce852908c730d1e75be1db1947603,2025-03-27T20:15:21.773000 +CVE-2024-22275,0,0,a375c4bbe70082e63d9c996f63c20fc8049ce852908c730d1e75be1db1947603,2025-03-27T20:15:21.773000 CVE-2024-22276,0,0,a04a9e6d0ae5e9d579794d26ed880a69b39cf873a295c44f1908b9c4201e03dc,2024-11-21T08:55:56.780000 CVE-2024-22277,0,0,376495165809b03ebca40ba54a28c4d471c752a1c0a49fc842e80dd53971070e,2025-03-13T17:15:28.503000 CVE-2024-22278,0,0,40d737bb4572ae1d0ed91059153dd48f12812df7d0f0e4389bb7eb783d65b4ea,2024-08-14T22:15:04.253000 @@ -251150,7 +251150,7 @@ CVE-2024-22519,0,0,38f56a3b7ded2ffb1bab003dcf200417a3dae8200d59446ad00f1831179ae CVE-2024-2252,0,0,f8b57c312f6f19268d4bca869e740a5fbb6730c139364507b27b9b965c25ea87,2024-11-21T09:09:21.180000 CVE-2024-22520,0,0,4ecf73bd6016d922ba8ef18264df5f5d1f20d231962fb990f30db04c87007cdd,2024-11-21T08:56:23.890000 CVE-2024-22523,0,0,6e5964ba2742903a94d6ed6e7d813b2cb962e78d9d72ebf5a21537964e4c33d8,2024-11-21T08:56:24.053000 -CVE-2024-22524,0,0,5e8c8b8781d382aa9b0ca8659ecdc6cede8fd32e37d6b6765507f3668082e44e,2024-11-21T08:56:24.203000 +CVE-2024-22524,0,1,8852239bf4d21781171a67a8f716aa5208e8958cf6064743f39cd80dce1ba0c9,2025-03-27T21:15:45.220000 CVE-2024-22525,0,0,648e518c38d5bf43c132d3a4d8a8ea349898dca3d1c6692489faad9d15749e02,2025-03-18T16:15:20.850000 CVE-2024-22526,0,0,be0cd17245feb37010512e9e801fc3cf88fa259a228b2653acad22a5e1382569,2024-11-21T08:56:24.543000 CVE-2024-22529,0,0,b7de2a86923a330de5341c28dc3bd65e868ea4c1ee03bdb9090fc1322f705131,2024-11-21T08:56:24.773000 @@ -251341,7 +251341,7 @@ CVE-2024-22957,0,0,0b4733c79e5e1be4ed27841aeb5f878228f183de770bb18355158b67c6f75 CVE-2024-2296,0,0,dfd83ad5e58086af63e8c6fc35730f2c6ed8bd58ad06d30fd76fe71f7310d14f,2025-03-06T16:06:41.130000 CVE-2024-2297,0,0,3a62bf9d33e04a2b2a4ead4d48354328d27d50a4ecda4746840937c137d18fc4,2025-03-11T19:39:40.640000 CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000 -CVE-2024-22983,0,0,9c2fcbd2cfc36625422e4d63e9b3ecc1d9162ca561feb4a7596e502793ecaf86,2024-11-21T08:56:50.910000 +CVE-2024-22983,0,1,1b90439e8700c2cb391c1d6ada3037539a1078d92c93c8cec7565e36e9b21aaa,2025-03-27T22:15:15.637000 CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000 CVE-2024-22988,0,0,794767bfe659079c8fad239879c26f911639a8938186caab10358dd1185783e5,2024-11-21T08:56:51.083000 CVE-2024-2299,0,0,76e1268d9e586f7e108759dfb4a3b616648fa75f57f1f685f576ecccc85b8d02,2024-11-21T09:09:27.393000 @@ -251504,11 +251504,11 @@ CVE-2024-23228,0,0,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2 CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000 CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000 CVE-2024-23231,0,0,b345ca2141a2953e4d0d79a4aa59df13df9ec9881922a1f9223058754c5c8dae,2024-12-20T17:09:06.867000 -CVE-2024-23232,0,0,2d4ff156fd4bb5acfd4c77537307a7232bbe750b532071870b7076c67ef970f3,2024-12-05T19:50:23.700000 +CVE-2024-23232,0,1,1e2c782d5f2416be9a02c2719fd9dc1e103d75daec64ec5ae59dcf716f347d32,2025-03-27T21:15:45.403000 CVE-2024-23233,0,0,ba76592c9abd6021c9cd40cd3baae71397fb7de180a79a7079e5b607a05d8d7c,2024-12-05T19:49:55.040000 CVE-2024-23234,0,0,2e6ac2948d5f78449bdbb22421c29ee97772b7e769451de805febffae9b54f22,2024-12-06T02:48:33.647000 CVE-2024-23235,0,0,9a34f8e4ff0503040ce75a38cf6851db6360ff7441289023e99bd8eeda83344b,2024-12-20T17:08:50.517000 -CVE-2024-23236,0,1,bace911a34383f8df89f41807ce6452cf44c0d1b2d06431a5379afb979db4510,2025-03-27T20:15:21.923000 +CVE-2024-23236,0,0,bace911a34383f8df89f41807ce6452cf44c0d1b2d06431a5379afb979db4510,2025-03-27T20:15:21.923000 CVE-2024-23237,0,0,8a182875978108e784c82ad5cc0e0a008b37b77c55a88f092cea8c2f0343335e,2025-03-25T17:15:50.063000 CVE-2024-23238,0,0,e055da92b65437a98bc321c417e70a8f6a5157addb3c81c8dcfe9f4937312e89,2024-12-05T20:03:43.247000 CVE-2024-23239,0,0,f84277e7149710fb8893d7092d3be7b98a9c7857ae1163bbc5346c7637e966e2,2025-03-13T21:15:38.087000 @@ -251531,7 +251531,7 @@ CVE-2024-23253,0,0,6fee2e03ec17eb24d88c1bed52c44c23ae4ef97327ff874a2890eaaa17222 CVE-2024-23254,0,0,3ad832d7c7a0a8a8df5739c11dd6d63a4415039b0e1baa027b884d9d2dd50195,2024-12-06T02:54:01.530000 CVE-2024-23255,0,0,7bd882417f214059f6dfc15001b2afab0607fe28723d0b0944187e5c1a7be405,2024-12-06T02:51:33.217000 CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f632,2024-12-05T17:05:54.973000 -CVE-2024-23257,0,0,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000 +CVE-2024-23257,0,1,a4e99afd0a36979ac04d4252ee046aaa1fc84bfac602b991690b3ded34edbeb5,2025-03-27T22:15:15.830000 CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000 CVE-2024-23259,0,0,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000 CVE-2024-2326,0,0,929a0db19dfdd6e3c3498b7ab574022873482ae16c923fea11bf69c40088fe80,2025-02-13T16:32:17.897000 @@ -251546,7 +251546,7 @@ CVE-2024-23267,0,0,71b6055812701f0676d9265f03e9ebcd7cdfc1cbf70f65d6cffbf3b0718f2 CVE-2024-23268,0,0,a4c71a604889babee2e216d86343f0529f00ea91abd63d6059a91119c010cb0c,2024-11-21T08:57:21.153000 CVE-2024-23269,0,0,ff17c0eb56233e8c1810d5c7d345cd079818a9bae566e9d38123eb71446315f5,2024-12-07T02:24:18 CVE-2024-2327,0,0,d808ee50b7311490896cd8bdb8756e9f194caa00018a5e3650ac719c80993330,2024-11-21T09:09:30.713000 -CVE-2024-23270,0,1,6f9977a7a2740ccd78640709fe732e820f4018211a8a83527880f7cdbc21f78a,2025-03-27T20:15:22.150000 +CVE-2024-23270,0,0,6f9977a7a2740ccd78640709fe732e820f4018211a8a83527880f7cdbc21f78a,2025-03-27T20:15:22.150000 CVE-2024-23271,0,0,5d71e6f3b33842773f30db60947f5883e7fac8e4209545a57c6e0cff9cef7f50,2024-12-12T14:33:00.640000 CVE-2024-23272,0,0,08c7845c329ebb70a04bd317b5b476df2f47be5440c894d265d78e8332ad9e18,2024-11-21T08:57:21.970000 CVE-2024-23273,0,0,6682ed6ac45cfbaaac0fe8ef6ae5c842d9a8d5e71f5e7eee23e553a23545b047,2024-11-21T08:57:22.103000 @@ -251570,7 +251570,7 @@ CVE-2024-23289,0,0,99ce082a630c26052fbc7b3df93b3152e86ed23c613214fbe1e50792959af CVE-2024-2329,0,0,3203bd0281c331c6b6b1be39e0a442bd6eb3f1b1c7b6982bff94c44ac63be273,2025-02-05T14:14:29.833000 CVE-2024-23290,0,0,5f2cb9f63febc3183c4545b31771397a8bd37a4b321ee9286f926f123fca54d5,2024-12-09T14:51:21.537000 CVE-2024-23291,0,0,d99c154998215bddb9fca72a77eb17762f4b5c062f2ea35eac6a14df0d0810cd,2024-12-09T14:41:40.010000 -CVE-2024-23292,0,0,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381436,2024-12-09T14:39:31.653000 +CVE-2024-23292,0,1,5baee75ed39cf6226336efcb7b74ba751a0674a270522f1e82a3490c398c19e2,2025-03-27T21:15:45.573000 CVE-2024-23293,0,0,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000 CVE-2024-23294,0,0,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000 CVE-2024-23295,0,0,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000 @@ -251862,7 +251862,7 @@ CVE-2024-2360,0,0,72eb16f212792366c82a04edec63da5f77102fcb5d9964442491e4a7f172ea CVE-2024-23600,0,0,f34082bd9192489fa5275f7efc30e7a35fabb02eb0f67563ac353c4e36b0fe1f,2024-11-21T08:57:58.917000 CVE-2024-23601,0,0,5d029a6c9ef4e240b22ebda25d5191273a73dcdf406b7af6128790cc8c8164ae,2025-02-12T17:30:39.290000 CVE-2024-23603,0,0,385cd1da19f9f814b37d46a252792eece53dc5fba36c8bad0a0244cf15993622,2025-01-23T19:52:26.203000 -CVE-2024-23604,0,1,17c7f4fdc448289831f539c5b88668a5d2e193e02e5fe61ab433331b0bd4d8fc,2025-03-27T20:15:23.137000 +CVE-2024-23604,0,0,17c7f4fdc448289831f539c5b88668a5d2e193e02e5fe61ab433331b0bd4d8fc,2025-03-27T20:15:23.137000 CVE-2024-23605,0,0,cd8e3ab40368127668f9babb60974a68fb7e547c58851815f7b8d252542d79e6,2025-02-12T18:53:36.843000 CVE-2024-23606,0,0,29997b26a92eb62ace56664ebd405775eb345e3afd91cb43cd5981d3cb444142,2025-01-22T14:58:56.600000 CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 @@ -252284,7 +252284,7 @@ CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 CVE-2024-24100,0,0,34264a072f2004b323a7d058a42a90facb09cc54d00a117671a0894f9e48f909,2025-03-25T16:15:18.483000 CVE-2024-24101,0,0,8c8c5d78f74164f6c55dbd2d7ee4be4970b1a59ee1d4279b7a0532aeb6a8d129,2025-03-13T17:15:28.980000 -CVE-2024-24105,0,1,aa3f860d6915309f408681b2b3119d25030316f86ea69fb09f732429052412d3,2025-03-27T20:15:23.327000 +CVE-2024-24105,0,0,aa3f860d6915309f408681b2b3119d25030316f86ea69fb09f732429052412d3,2025-03-27T20:15:23.327000 CVE-2024-2411,0,0,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e887412,2025-02-13T17:01:09.280000 CVE-2024-24110,0,0,24e3bfd7edfbdc9c648c149e52de113518ac1893351463aa09c13045ca7b364b,2024-11-21T08:58:55.667000 CVE-2024-24112,0,0,f6f904d56964636026057ec672d9f84ee172228629a02220c0864497bc55f6f0,2024-11-21T08:58:55.863000 @@ -252306,12 +252306,12 @@ CVE-2024-2414,0,0,288cf1f5e7eea41678bd1847649e8873794525f431b2560f43d693c15049f1 CVE-2024-24140,0,0,29cfd5730f6c940766da357cc17453731b14c0d94ee4a51a91667f5e0cc1cebd,2024-11-21T08:58:58.173000 CVE-2024-24141,0,0,d4275df374ffa61e406a6c91398d23ea6118036ae7cb87b160e0f53852e132f5,2024-11-21T08:58:58.317000 CVE-2024-24142,0,0,41d3cb3793bf6ecbc070d52924ee7ece2736cc4ccdd85a5c31bb84e6f2038420,2024-11-21T08:58:58.537000 -CVE-2024-24146,0,1,cd7049f0a8bfa7f96b955d14d2cd851a9bd1a64079470c762ffadc1b38c989a7,2025-03-27T20:15:23.520000 +CVE-2024-24146,0,0,cd7049f0a8bfa7f96b955d14d2cd851a9bd1a64079470c762ffadc1b38c989a7,2025-03-27T20:15:23.520000 CVE-2024-24147,0,0,48e6fc3717ec0bac40b9a12e179d3fcbf366edf67ee3364ba9d746aecbe8a29c,2024-11-21T08:58:58.833000 CVE-2024-24148,0,0,3de3823ab87901c737ba908b33250b7caf946edc72327d35c051b3a6c6de2abd,2024-11-21T08:58:59.053000 CVE-2024-24149,0,0,25185e19a5d74a50e733ccc4c2aaa13e707228e68566784ac21989b8d0b07a98,2024-11-21T08:58:59.270000 CVE-2024-2415,0,0,e3ac62f8cd5ffdefadc686b2f7498541a23744a1036aae7d48882383b1c54711,2024-11-21T09:09:42.320000 -CVE-2024-24150,0,0,20d6f0f6b7277b80f157b4c6aefd41b93488bd10a2227adf78214e76a53a22e0,2024-11-21T08:58:59.480000 +CVE-2024-24150,0,1,93b1f9d85e91713cea8f12effe1eb6f07db8994d3ef3043460efd60cf480f9a9,2025-03-27T21:15:45.750000 CVE-2024-24155,0,0,49ec57e0dd398b5531fdcf2291cb8f1e4145124f3ba1d0286f937c23db066855,2025-01-16T17:51:56.167000 CVE-2024-24156,0,0,3815a9b481e5f67ffe320a44b74580cbc0dc336a73285c0ee4ddc8e2a7e9e3de,2024-11-21T08:58:59.820000 CVE-2024-24157,0,0,e271329d57ef9f03049fa3726b0d00ba3ac51e24491432b12a38e7d11dffcf46,2025-03-25T16:15:18.663000 @@ -252356,9 +252356,9 @@ CVE-2024-24265,0,0,1744b9930a0bd9820192cf71dfc0bf141da3a5aff9ed335eff9617cf6306b CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2f36,2024-11-21T08:59:05.313000 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 -CVE-2024-24272,0,1,11fb412eb83c0a2aa1fd2ad772f5b73042c54fabd3e8078b95ce1c85c48de32e,2025-03-27T20:15:23.717000 -CVE-2024-24275,0,0,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000 -CVE-2024-24276,0,0,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000 +CVE-2024-24272,0,0,11fb412eb83c0a2aa1fd2ad772f5b73042c54fabd3e8078b95ce1c85c48de32e,2025-03-27T20:15:23.717000 +CVE-2024-24275,0,1,3c8aa5e14da0cb646977d6dea2bbdcc1e8a016977bac5e3f5c10f87d01f6c88e,2025-03-27T21:15:45.937000 +CVE-2024-24276,0,1,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909da4b,2025-03-27T21:15:46.123000 CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000 CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000 CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000 @@ -252409,7 +252409,7 @@ CVE-2024-24377,0,0,c3571d591fdd08eb6fe4c53e100023da606530fd66732a886bbbbe622f3d1 CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce96a,2024-03-14T09:15:47.820000 CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000 CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000 -CVE-2024-24389,0,0,3ee02e5a7ab87d9d7f4834c2753b8011f0d6d120489872c3ad496154d02f2176,2025-03-04T14:23:03.773000 +CVE-2024-24389,0,1,2d7ff37174d9dbb9492b1a442673e426580708c5a1303fb8d0266900f0ba1dba,2025-03-27T21:15:46.297000 CVE-2024-2439,0,0,04c5f4fa6f67f489c58ccf593949bf5d9843594145e36bf2723ffa8d15715cec,2024-11-21T09:09:45.333000 CVE-2024-24393,0,0,48dfbe81842a64324199d0bfa1e284aff3b021c9ccffa6b60b0d1cc58917f1d4,2024-11-21T08:59:13.997000 CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000 @@ -252875,7 +252875,7 @@ CVE-2024-25016,0,0,c2c6cce21947c537b1fef23bbb0d32d79c6ac3e36b18ab11955bb1cb06f9f CVE-2024-25019,0,0,a3c0de844d9557e324bc759825ea9728d85c168cca4d9e6a97490915d32203ba,2024-12-11T03:39:50.510000 CVE-2024-2502,0,0,72ec7f237cc6cabf05a2be1c08ff9bec01753e8d18dd8e508e139ce1312cf7a8,2024-08-30T13:00:05.390000 CVE-2024-25020,0,0,7a03d0e4a08fedc8a8f3263d48c47c26f47ac0d170cfa03b31b0721c9fd70d1e,2024-12-11T03:28:15.337000 -CVE-2024-25021,0,1,f936c6ec256b336c70bc5d9756a10c4b57367f6313cab6553731e7a125358245,2025-03-27T19:15:47.593000 +CVE-2024-25021,0,0,f936c6ec256b336c70bc5d9756a10c4b57367f6313cab6553731e7a125358245,2025-03-27T19:15:47.593000 CVE-2024-25023,0,0,29e59a185fc679ff4655e365beef7f6abd2452671adb820d8c52abd842e2a924,2024-11-21T09:00:08.543000 CVE-2024-25024,0,0,0a9c7b6042c87fb28e39517628b2269d9f602d648a419e9d39271896bb6a4aaf,2025-03-13T20:15:17.750000 CVE-2024-25026,0,0,74079194411225ce5765e2042d94b649ab06670251d927c44bd019419925781b,2025-02-27T17:17:14.607000 @@ -253025,7 +253025,7 @@ CVE-2024-25213,0,0,ca21f12e0421b823cb7ed5458fbf83ea1bbf7b5f8eb22ceb5929f6e7b3c1f CVE-2024-25214,0,0,dde369e1e19df3f959878b101178e5ca3ceb19500e29c09a79ce35c083118b93,2024-11-21T09:00:28.497000 CVE-2024-25215,0,0,3380f4e4756998581739c79d00ac06bb668ccae487c27d524d894dbf029e9fb9,2024-11-21T09:00:28.730000 CVE-2024-25216,0,0,19fee1a3101dc9972a1dbc628179e96362d7da9e73cb1e00051b31b2d07b7ab5,2025-03-13T19:15:42.727000 -CVE-2024-25217,0,1,faf9611c24bdf95da52b059df9dbe9b5f36510be58169711d96f24423b4f8eee,2025-03-27T20:15:23.887000 +CVE-2024-25217,0,0,faf9611c24bdf95da52b059df9dbe9b5f36510be58169711d96f24423b4f8eee,2025-03-27T20:15:23.887000 CVE-2024-25218,0,0,65a69cec9172f0b91d4a28cdc33c8b2113064c3d8c4575903ec2bf836a50269b,2025-03-13T18:15:37.923000 CVE-2024-25219,0,0,982e2de4884163c62cd591e4f77c8faf1d13e0f4dd836cf69795446aac29103d,2024-11-21T09:00:29.347000 CVE-2024-2522,0,0,f9eae84fb0dcc3ee6fd99d5192cf2c7be5a0ae9c5f27fc8c68e348524e3c0748,2025-02-14T16:56:41.570000 @@ -253042,8 +253042,8 @@ CVE-2024-2523,0,0,d3ebd7dd87c4d56dd6d177edeaec4b77f9df6d5a6465cc2e2fb88930d1d235 CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1a07,2024-11-21T09:00:31.193000 CVE-2024-2524,0,0,0e5bc8adf2a750b7df87f769e08c6248cfa89324acd88208a520f216dad3cf9e,2025-03-03T16:59:10.290000 CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000 -CVE-2024-25248,0,0,81a8ad990dc45e329a2a406fa2e8862ab2f5c3673d256130877de386ab70b693,2025-02-14T16:22:09.803000 -CVE-2024-25249,0,1,280776b2f87571caab1ffbeab421fc1acf6e14a5a49622226509bdb85c6c8891,2025-03-27T20:15:24.083000 +CVE-2024-25248,0,1,d65faff10eac258b331d9c2cb9cd5b148102f3b8b2f26c280c3571f12af4f866,2025-03-27T21:15:46.483000 +CVE-2024-25249,0,0,280776b2f87571caab1ffbeab421fc1acf6e14a5a49622226509bdb85c6c8891,2025-03-27T20:15:24.083000 CVE-2024-2525,0,0,99775d6d72012c94577ecba939cdf3eab5f27167b4c491987d659d8d12c4d8a2,2025-03-03T16:58:56.110000 CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000 CVE-2024-25251,0,0,6dea5af83ad1e7e7deeb31cb468a1c94ab5c1e06beee69c782e91b5b37b29796,2024-11-21T09:00:32.163000 @@ -253267,7 +253267,7 @@ CVE-2024-25611,0,0,cde677ed5ebe4d43712eddebcd30ecd2f61efb6ed67eed3492ff3e41f2225 CVE-2024-25612,0,0,ec9cb19cb6fef9f5730ac98407ab78035ecdd8500b5dd57529c310a3425ca68a,2024-11-21T09:01:04.860000 CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fcb0e,2024-11-21T09:01:04.997000 CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0350,2024-11-21T09:01:05.133000 -CVE-2024-25615,0,0,50c65986bbb8dc5aafc867c9e37b361b7c08d50d65dd263fb769956dc6ae116a,2024-11-21T09:01:05.260000 +CVE-2024-25615,0,1,3e410c28204b6057b2d87c48f5a6ad0622058c051d2e03679346238c8235ee4f,2025-03-27T21:15:46.667000 CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000 CVE-2024-25617,0,0,32206fb84ae6c779e53188e2391090c1824d28f44711f01759dbaf45469f6e57,2025-01-09T13:51:19.633000 CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 @@ -253376,7 +253376,7 @@ CVE-2024-25739,0,0,6a99384152b88c1f9d7080f227ae879eb998f4c442d2eef859eb38f99a356 CVE-2024-2574,0,0,74d9dcf99ec5971438af93edd8cd7e7874c8c853b8302afd1fc19b0e1e14b1d7,2025-02-20T18:10:50.230000 CVE-2024-25740,0,0,d6d3c8770d2c76a0fc3555da9c432136eb7575e28d8f6e4a82b40609ff87844a,2024-11-21T09:01:18.993000 CVE-2024-25741,0,0,8e40a0ecd3fdfb3e07138587e5f0ac8dde99bb98aeaea59c207ba8e966be039d,2025-03-13T14:15:23.797000 -CVE-2024-25742,0,1,e03e502622e49a106cf8f582c53af061ad0e8832d5d4d2457c850865467a30f8,2025-03-27T20:15:24.310000 +CVE-2024-25742,0,0,e03e502622e49a106cf8f582c53af061ad0e8832d5d4d2457c850865467a30f8,2025-03-27T20:15:24.310000 CVE-2024-25743,0,0,784d4bf2581f95faf5fd728cf1d55df7a2ee830bce87d8a52cc3f325f943e5e9,2025-03-14T19:15:45.770000 CVE-2024-25744,0,0,b136b3d01b604786d3dbfab666ea457af36733ed2726033559248a8a8f7c83fb,2024-11-21T09:01:19.657000 CVE-2024-25746,0,0,2bebc82200877ddd4c3e34fe8e99e4e521ce7a7658f2c70b97cec479bad322b8,2025-03-13T19:34:56.347000 @@ -253874,7 +253874,7 @@ CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917 CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000 CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000 -CVE-2024-26308,0,1,7001fc59560867f9d5c93e0804a88254e83ae0ae2bda835f9568ace092e3a521,2025-03-27T20:15:24.547000 +CVE-2024-26308,0,0,7001fc59560867f9d5c93e0804a88254e83ae0ae2bda835f9568ace092e3a521,2025-03-27T20:15:24.547000 CVE-2024-26309,0,0,00bea15c248e249662bead3afc56845c19345a8a6ff84ebdc44d0c2b2ef87b95,2025-03-26T17:15:24.067000 CVE-2024-2631,0,0,4d5056918273db25c3d5b7f97c66de0ecfcd753023d114661f08ddf45d27fdda,2024-11-21T09:10:10.600000 CVE-2024-26310,0,0,db7bae585cc08bc88730c602cbeb5ade74c1d55da6c344d4a8e2792b715f44b8,2025-03-18T17:39:03.147000 @@ -253916,7 +253916,7 @@ CVE-2024-2644,0,0,4048e8752f27add71acd228a0d07e2962cd563fe85cb710df0b865d642724f CVE-2024-26445,0,0,1e1692a3ab92c100abf93e1b088c041121edd2a6fdb5057ec8a7e9ed1a7b0946,2025-03-25T16:59:36.567000 CVE-2024-2645,0,0,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000 CVE-2024-26450,0,0,44fde4f373d5569241d50bdb30df7d9eed39fdf74554bc5181d04d6ee81e71ae,2024-12-04T21:15:22.447000 -CVE-2024-26454,0,0,321d01563e466eb4bb44077770adb4efe3794d2388e227e244b5e1fbc07fe1bc,2024-11-21T09:02:25.983000 +CVE-2024-26454,0,1,93d261b58112dad16e86223a9d6f0a844734636b7d71120040308b7736330dd5,2025-03-27T21:15:46.810000 CVE-2024-26455,0,0,b602a39340aa0a08d22bea95d20335091929597e145ac5852ed224ca96f28c13,2024-11-21T09:02:26.130000 CVE-2024-26458,0,0,a84cafdaaeb4711178a2af3a2fb066cefb77307207efb491034cc325fa3b809d,2024-12-06T21:15:06.280000 CVE-2024-2646,0,0,04594d9e7c6ca7f1c99b4941a1246a278a20606b81feca73a81bb34fb4ebf02b,2025-01-30T15:34:41.863000 @@ -253933,7 +253933,7 @@ CVE-2024-26470,0,0,5a3a0e9bead74d3ad7a801ce5e989377aa1e8dd86cc9c2c97b389b1c343e6 CVE-2024-26471,0,0,14554bbc2c0b5b2a0502a2d3b4b7bfb2b94c413a02c7f7a3204a15c12b0d588c,2024-11-21T09:02:28.273000 CVE-2024-26472,0,0,886a2fc774cca6e7209753367afa5a190bb62651cd1c25e70722074ee21261cb,2024-11-21T09:02:28.490000 CVE-2024-26473,0,0,00fce609accad83d07750bd45b1342c1c6ea4b9d7793b3dfa144586b59ed3298,2024-11-21T09:02:28.697000 -CVE-2024-26475,0,1,0f1810c6617624f2a0dcf47bbae4bf6fd1fc6081a293a20f9dd895633a730f64,2025-03-27T20:15:24.743000 +CVE-2024-26475,0,0,0f1810c6617624f2a0dcf47bbae4bf6fd1fc6081a293a20f9dd895633a730f64,2025-03-27T20:15:24.743000 CVE-2024-26476,0,0,8d9df15e765bbf5a9750f7a0d9952d7d99b32a5699906b57f431687265856ba9,2024-11-21T09:02:29.043000 CVE-2024-2648,0,0,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000 CVE-2024-26481,0,0,27cd2dd704778bc0c175f0416f8065c950331ff365164eeacdcc041662290a87,2024-11-21T09:02:29.270000 @@ -254221,29 +254221,29 @@ CVE-2024-26802,0,0,7552dc5e76f0f8a51e13f54a8a6eff1b2aa57a89a13cc430ab2d5f5763770 CVE-2024-26803,0,0,de8fd5844f5a006c205a9ca84abe4601629947b01a75f5d3027fb65e766e8e10,2024-11-21T09:03:06.517000 CVE-2024-26804,0,0,90c29bca0add61f216e7402553f0bd0d19eeb58a95157f3891806f7bae1b7b85,2025-03-21T14:58:15.363000 CVE-2024-26805,0,0,79cb532ec4298c5c0bba2b9044190557f61a8afd9bc0a9ca7e0ea7842c75f1e4,2025-02-27T14:36:02.417000 -CVE-2024-26806,0,0,5bc7d786357257883611465c06737a0541ee83050df8cc363ed35df2ab6b84d8,2024-11-21T09:03:07.020000 -CVE-2024-26807,0,0,0b0195abd2fc425eab1cc3ea15fbf46eea0746bc3fcc826ab6e0bceba0d8f5ad,2024-11-21T09:03:07.157000 +CVE-2024-26806,0,1,579c2e5324ce50542c7555728d2532d90229381de0c2df2f7edbc01c0580c27d,2025-03-27T21:30:21.837000 +CVE-2024-26807,0,1,51524658cc01dd1e361a08df9d4605239bbfd0a93db5e3b5c528b738151901dc,2025-03-27T21:35:59.447000 CVE-2024-26808,0,0,32e7e1684e8180e17c00c1a0297443beb6ce1f9164af83c298f9e4ac426327fb,2024-11-21T09:03:07.277000 CVE-2024-26809,0,0,bbd3925ce680832ff739963d7071fb5f911c8e070b89e06a876adb017e20c048,2025-03-19T16:19:56.507000 CVE-2024-2681,0,0,09637121fb785cf682a8dd0ecf80a1c8447b09396e0be9cf76bee7528ea996ef,2025-02-19T18:17:19.687000 CVE-2024-26810,0,0,5b78c798ab699830f25c706791bc5869344bd655b9540ce5b00869b839745e17,2024-11-21T09:03:07.600000 -CVE-2024-26811,0,0,c5eba2e48f4516ada82f3443e565329135500041168dc73c8eb696bba589ac60,2024-11-21T09:03:07.800000 +CVE-2024-26811,0,1,dc3f597a02e4d45f823b41846ed47d9e5bdacf9ae78e65dedf7d0184730be610,2025-03-27T21:37:50.797000 CVE-2024-26812,0,0,902e8fe70f82a1cd9e6e81b66f93f93de8df5bc70a353813308c69ec229ef56b,2025-03-18T17:04:12.737000 CVE-2024-26813,0,0,d5b7f2b6b4f59a7ab93dfaf0cce6b486b64b40821d4f07f5dc544253006ebf3d,2024-12-20T14:30:24.357000 -CVE-2024-26814,0,0,c73c07f4658bec65418e208206b8752e1342e53358bc59eb3a373414ad01ba8b,2024-11-21T09:03:08.187000 -CVE-2024-26815,0,0,53e1e7dab29239fe117fbb33593d2e4304c3b1f128344dc610dc202be45b94dd,2024-11-21T09:03:08.313000 -CVE-2024-26816,0,0,0c657b122b9fb93d85c8d05dc1cf0902a29025ba29bdafb550cc6eaf5b11255f,2024-11-21T09:03:08.437000 +CVE-2024-26814,0,1,55e52d9b7b55c16e7add3429e7acf7026ead6551cc11b456a0ca06b72f32b425,2025-03-27T21:36:57.227000 +CVE-2024-26815,0,1,ad9daab9bca4f48356cbb2be9856ed5e9c82711d06bad3583a80e1a59f67becb,2025-03-27T21:09:57.807000 +CVE-2024-26816,0,1,ad3efd64e643d6213b582c17fea0baa1c24ef6ef61d2163b81f9e2d57f58d675,2025-03-27T21:10:26.187000 CVE-2024-26817,0,0,bcf3e4993b2846eb999e649818459a38330e6fe7890d0a35166117eba4d9bd46,2025-02-03T16:17:45.237000 -CVE-2024-26818,0,0,fc10ee0bdcb485eac0859d5028b86bdb2afb2faf0d62ba3c634a87f5f38ae4be,2024-11-21T09:03:08.703000 +CVE-2024-26818,0,1,cc0db7fb11d79681031d1cf50334b51b08de103e9df4bfed5386af68003e2ba8,2025-03-27T21:07:41.817000 CVE-2024-26819,0,0,7fd084041d87eb100a47072cbbec5abeb37898a239663f98480a9780b081758a,2024-04-18T13:15:17.797000 CVE-2024-2682,0,0,aa9e665d80db3e4952d94d60cbdf33cd7f5b32319199f935014f3272e0b20a07,2025-02-19T18:17:35.687000 -CVE-2024-26820,0,0,bc493245e2441f8afc85a0c7812e74d0f05efb3fa139adefc29361008c13c86a,2024-11-21T09:03:08.843000 +CVE-2024-26820,0,1,9e436f7589bce4e133f307c7a63d5acdc22eee536ffd2b7628175b7d44282acb,2025-03-27T21:08:08.837000 CVE-2024-26821,0,0,2c5ced2017380ef73b87d362d5660557b2e11f2b18fd5217fefe1ed7420c1e79,2024-05-16T13:15:47.693000 -CVE-2024-26822,0,1,c7367f46e9bf5fc6bfc7f1b10c3765a12e05d3ccd36bb49078eeca96fc13c358,2025-03-27T20:43:09.927000 -CVE-2024-26823,0,1,2953139e362f66c52eec7503913ab1087022af9844cab16df2717208d0f69482,2025-03-27T20:53:54.630000 -CVE-2024-26824,0,1,36f11e0915841bb6be3a03d1680ae03124972352335be1bde74ee17b33c70aff,2025-03-27T20:56:14.840000 -CVE-2024-26825,0,1,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cffae,2025-03-27T20:56:39.283000 -CVE-2024-26826,0,1,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000 +CVE-2024-26822,0,0,c7367f46e9bf5fc6bfc7f1b10c3765a12e05d3ccd36bb49078eeca96fc13c358,2025-03-27T20:43:09.927000 +CVE-2024-26823,0,0,2953139e362f66c52eec7503913ab1087022af9844cab16df2717208d0f69482,2025-03-27T20:53:54.630000 +CVE-2024-26824,0,0,36f11e0915841bb6be3a03d1680ae03124972352335be1bde74ee17b33c70aff,2025-03-27T20:56:14.840000 +CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cffae,2025-03-27T20:56:39.283000 +CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000 CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000 CVE-2024-26828,0,0,bd00e52c625d709e58fad6c68a7b5a17f577546fe0f6a4f902334be57e619af3,2024-11-21T09:03:09.600000 CVE-2024-26829,0,0,33b858020b676d55d8dbfd0b8da63d045ba99285dcf6c6b1575c915b01f21130,2025-01-14T14:58:05.850000 @@ -254674,7 +254674,7 @@ CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892a CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000 CVE-2024-27227,0,0,a57e27a505af1e40ade235d0956d26493bc489cd1b55d080b51375747526bb34,2025-03-25T16:15:19.230000 CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000 -CVE-2024-27229,0,1,b790d712dd9c1ace03924cb58b92d92fbed37229050913a9830fb4c340d1bbf9,2025-03-27T19:15:47.743000 +CVE-2024-27229,0,0,b790d712dd9c1ace03924cb58b92d92fbed37229050913a9830fb4c340d1bbf9,2025-03-27T19:15:47.743000 CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000 CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000 CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000 @@ -254885,7 +254885,7 @@ CVE-2024-27433,0,0,6fca3ebad0fb383716a21d9c585d20d4b1f36b0b783ce781ed0f7248dbc74 CVE-2024-27434,0,0,5694b30bd28f0fe9c16395c30a32737d7ac6900aa3f8e3fb7976b0983aedf42c,2024-11-21T09:04:35.973000 CVE-2024-27435,0,0,6dc8bb3ee34c85a8c6dfc8862b9a9e1049341ecc1b661f32e8230a1c343aff9f,2024-11-21T09:04:36.097000 CVE-2024-27436,0,0,713a88796ee4dc48163f026b97ffc79c81e0d3b45ee6235d4ff52cf8ec2e3e87,2024-11-21T09:04:36.280000 -CVE-2024-27437,0,0,30884a8953dcbfe9b58bb84a53aae53d1e2b1f77eecfe460e24b20f1b3d1a07e,2024-11-21T09:04:36.473000 +CVE-2024-27437,0,1,209eb3192ec71504daa2eda9becf70ece581fec90d86a17cc35f43c1e02e19d9,2025-03-27T21:37:24.097000 CVE-2024-27438,0,0,3e15308d6d74345ce7d99b9ef518d03e488c8ee266cb19156b4e2f87fe9f6689,2025-02-13T18:17:31.937000 CVE-2024-27439,0,0,bf70e55b581f82f7468b043b9b647a64b6f90e7d462ac0abeb48e128046a1ae0,2025-02-13T18:17:32.507000 CVE-2024-2744,0,0,59a689a70441f2e8ea6642c225bac4a6728f95ddca27cc831786d2b49868104f,2025-03-27T17:15:55.420000 @@ -254961,7 +254961,7 @@ CVE-2024-27592,0,0,4856715747f7e20c2fb321622fc57fd9edfc011ed7744e2a258f43e955c82 CVE-2024-27593,0,0,92ecd1489d3acc10d1eb18f4eca08862b4e86cc263358f230cf130b24876abbe,2024-11-21T09:04:47.107000 CVE-2024-2760,0,0,f247d3efc0421c7eb31f935977b8c3c26cfc0a17d562839ee78e4c92b4a167a4,2024-11-21T09:10:27.283000 CVE-2024-27602,0,0,635f2ca656f5be7a2a2ef94a7eed70091f4dbaa306ab7a8309551d68cb2118a4,2024-11-21T09:04:47.327000 -CVE-2024-27604,0,0,1fc2e373c44578ae769772869276dba791fc2a9f26a1d310dbbb5e6afae45688,2025-02-27T18:15:41.613000 +CVE-2024-27604,0,1,e95d9356cbafeddb5eb52c6086188204f28188195f283f942f476df65abd41f0,2025-03-27T22:15:16.050000 CVE-2024-27605,0,0,00eaaad5a9f18a3a0bcba4847f88bcaf1c22b764fa6c0a2081627157902fb8ca,2025-02-27T18:12:35.790000 CVE-2024-27609,0,0,e0d5cf97c16d28e3d1b2a8de7800020400e5be5d064b79a2c8845cd4b08e76bc,2024-11-21T09:04:47.803000 CVE-2024-2761,0,0,adee496e3513e93132287faaff0ce6be7096cf9f85fafedfc4238afd9176f9eb,2024-11-21T09:10:27.420000 @@ -255351,7 +255351,7 @@ CVE-2024-28075,0,0,d68959536ff0bf867d6c016385dd50f9328cc1b4a3f14c78d3ac8a0a5f1bf CVE-2024-28076,0,0,bb1bc88bff3ca4378d32e7a30819eaaa191eee01bfee9ad63656d8056db9abd1,2025-02-26T18:45:06.353000 CVE-2024-28077,0,0,ab6e8f4dc04fc1973b120a7e710381163bb4c8657a409fb2b83070ea1d7ab3ff,2025-03-14T14:15:14.653000 CVE-2024-2808,0,0,929e834e70a4305880128a178e107c6fe817020c4a8d1b390bde853ff35341d0,2024-11-21T09:10:34.280000 -CVE-2024-28084,0,0,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000 +CVE-2024-28084,0,1,0eb71866f6bd53d36561071e147b2018d111c6d76bdf2b198d0613135dadf2be,2025-03-27T21:15:46.983000 CVE-2024-28085,0,0,3da950b9a75ec6fd2241d16d485379e7b353a6b1bd707e00202deb8cb179e429,2025-03-20T17:58:00.680000 CVE-2024-28087,0,0,1cf2c29c3a52af51eece9d14d776aa50c22fd39822de195a1746d467e8c2dafb,2024-11-21T09:05:46.523000 CVE-2024-28088,0,0,1cb8a1d0b63338fd18325d3f75eb7b62999e851ce9d7f91a18ce7885b3c5b7b8,2025-01-08T16:13:57.860000 @@ -255424,9 +255424,9 @@ CVE-2024-28150,0,0,eaa0ef1d0452a95b592ba3f449367a6abbbf724cd71275311fa4015466444 CVE-2024-28151,0,0,1fcab3b8206d9bcf898b51b0d809958fb6311e0151756d0716deca3296ac8552,2024-11-21T09:05:54.350000 CVE-2024-28152,0,0,eeb1c1a05bbc4a2e074591366ce1ecb2612911ce441a4ad410fd12a4000edc4f,2024-11-21T09:05:54.547000 CVE-2024-28153,0,0,cf071cbf0912af28a81395f4800a1a23bf47157f0a209eafa2df2f31bced9ec4,2025-03-25T17:15:52.910000 -CVE-2024-28154,0,0,40f4b72ad19063848738c2c5c46f075eb801aa8f54ef158ce502f2b3a7bbffd8,2025-01-19T02:36:34.320000 +CVE-2024-28154,0,1,0da437b6dbbd70711d0d7bd03ec1bfd0d61417dcadc344e6f4bf264377b8bb81,2025-03-27T21:15:47.183000 CVE-2024-28155,0,0,883e1f9e3429512ab5b79d087bf5215b77c44221a95bac36f4732cba523a7f59,2025-01-19T02:29:23.020000 -CVE-2024-28156,0,0,d0da5807bc4c46a60b34d37321439612c75d037680852d780bf6fdab6ce1462d,2025-01-19T02:27:21.977000 +CVE-2024-28156,0,1,837d2db81064912cfc2c400457f8ee22982b902a029885f8d289013289e1472a,2025-03-27T21:15:47.350000 CVE-2024-28157,0,0,e564045109b01f4899c4276b6dfc02ab7291e76081b37136bde916d7cb8ee9cd,2024-11-21T09:05:55.187000 CVE-2024-28158,0,0,f71b00fb00e164c1aea55316523408b66d37b0530518739398503aac7b790d00,2024-11-21T19:15:07.777000 CVE-2024-28159,0,0,eefb6d69dcc74f1b4ceb650733005cc9a79171f0b236a5aa760898858cabe472,2024-11-21T09:05:55.500000 @@ -255524,7 +255524,7 @@ CVE-2024-2827,0,0,108f43f4f949fd847dc01fdc06ae6de6adbe3a6bf6bfa16feeb7fd4bef7115 CVE-2024-28270,0,0,2866dd91b3fc344c785ff572a45a2f8de6284c4f1a7a2856c5b31231f923b8ab,2024-11-21T09:06:07.170000 CVE-2024-28275,0,0,c5cc3fb7fbfd91361a5f008c8aee8de22abb6bd4a8afb50493fd93e94d44bdff,2024-11-21T09:06:07.413000 CVE-2024-28276,0,0,764dd0a3d53a9fa48459f763be74e616bad4078b93b8451c26d3e5b119e1419d,2024-11-21T09:06:07.657000 -CVE-2024-28277,0,1,22f3695f3ef7a6eee36a865e904ba36f875ce11a46525a27c6dc26bb671dd0ca,2025-03-27T20:15:24.940000 +CVE-2024-28277,0,0,22f3695f3ef7a6eee36a865e904ba36f875ce11a46525a27c6dc26bb671dd0ca,2025-03-27T20:15:24.940000 CVE-2024-28279,0,0,d319a63f6e00298232f995867294748fc879ab76ac5b5419e1b9c13ee328b208,2024-11-21T09:06:08.057000 CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000 CVE-2024-28283,0,0,ce7a9c7cebaf258528c4f64296c4349b2ca8196425fb75250670fc71bac6a199,2024-11-21T09:06:08.270000 @@ -255580,7 +255580,7 @@ CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d6 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 CVE-2024-28401,0,0,d5672f1a1c69334e6bf411242cb4e489e187c422a6c95b119e96dcc05eea5ae8,2025-03-10T15:24:10.723000 CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000 -CVE-2024-28403,0,1,a680e4fcc0b3590082231d9bd740544c53f47fb277147ba8b47928e50594e54c,2025-03-27T20:15:25.140000 +CVE-2024-28403,0,0,a680e4fcc0b3590082231d9bd740544c53f47fb277147ba8b47928e50594e54c,2025-03-27T20:15:25.140000 CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000 CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000 CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000 @@ -255605,7 +255605,7 @@ CVE-2024-28442,0,0,39f9ff8978e427c05b79b512e2e774e85082ceb0d52e4ded352ec1fb8b627 CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661838,2024-11-21T09:06:23.270000 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000 -CVE-2024-28456,0,1,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000 +CVE-2024-28456,0,0,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000 CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f7252c,2024-11-21T09:06:24.153000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000 @@ -255630,7 +255630,7 @@ CVE-2024-28551,0,0,eb1a0b4de391a758ad4bd0445572a6bc2698d56affb516209b1bc196b8b06 CVE-2024-28553,0,0,473bfe394494f264c99c0be80f9d31826d163f667d54af41e263c7a1cbc5b44a,2024-11-21T09:06:29.187000 CVE-2024-28556,0,0,e74f6886aff07f31631907b59454a81fb3d4a6e31939b951be04cdcaaddd3540,2024-11-21T09:06:29.997000 CVE-2024-28557,0,0,96de1d2894e1db4134b42d78340ea411f7467b93ae3b017d51c7a18b3ea94a14,2024-11-21T09:06:30.740000 -CVE-2024-28558,0,1,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0cbf5,2025-03-27T20:19:53.070000 +CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0cbf5,2025-03-27T20:19:53.070000 CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000 CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000 CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000 @@ -255666,7 +255666,7 @@ CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 CVE-2024-28607,0,0,2c734bc5270aa8708738cf0bc7bfdeba385db9d597e5a716db5ac732e171f03b,2025-03-11T09:15:23.600000 CVE-2024-2861,0,0,c2d3624bb2be1c2521a84faa67c026ea9a14975ce99e1b76831fa573f79b5912,2024-11-21T09:10:42.250000 -CVE-2024-28613,0,0,a9debc2843d46f7159defc743a6f3b35f25689a1701ff179c47b448e5f7321ed,2025-03-06T15:51:21.690000 +CVE-2024-28613,0,1,302294bf7bca6b3dfd487e785bd70f7706357a0865f57f45cb47b969e4c04e4e,2025-03-27T21:15:47.510000 CVE-2024-2862,0,0,14a1762a6c3e20bf3034d91b1b834706f11e22304545cc9e55cbfbe0c8b435d2,2024-11-21T09:10:42.370000 CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b487224fa,2024-11-21T09:06:41.870000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 @@ -255962,7 +255962,7 @@ CVE-2024-29000,0,0,6b947432a20015a71dcdf63bfd56b73711de87c871ae470f207338a06f8d7 CVE-2024-29001,0,0,6fc82a6f335f3c5662579fa4bd43a81249ae490e4f8e2e26c0e39a12e19cdad5,2025-02-26T18:46:49.623000 CVE-2024-29003,0,0,8eb3860946e379c345ffc0d82ffcc3fa9093dd59c57f1838dd5ab8d2f9a38c1d,2025-02-26T18:46:56.310000 CVE-2024-29004,0,0,8446272ff6c6520c3561fc5cc637690841bb3c06810fde039230c89325966c27,2025-02-26T18:47:06.700000 -CVE-2024-29006,0,1,7c74480a400dfefcbebc7c4e3e07f0bb1e0f4a42614b7bb63ea9809d95f14a79,2025-03-27T20:15:25.687000 +CVE-2024-29006,0,0,7c74480a400dfefcbebc7c4e3e07f0bb1e0f4a42614b7bb63ea9809d95f14a79,2025-03-27T20:15:25.687000 CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 @@ -256105,7 +256105,7 @@ CVE-2024-29142,0,0,82aac69cdad31800230e845af422635fa91f26baa1152ff425d8389f41a82 CVE-2024-29143,0,0,495296ab5472eed75a01ca3cb701b4604466ff96bfdd28176f871d6b42e68ca2,2024-11-21T09:07:38.970000 CVE-2024-29146,0,0,1168e7aeabd57b703ceacd8b5bb4d77d977b02d14695e8276e2a5115c6fc3f9b,2024-11-26T08:15:05.203000 CVE-2024-29149,0,0,b3c85246b85898adcb29f329ade4f57201e226069b4e237b21b9766df25d2d85,2024-11-21T09:07:39.100000 -CVE-2024-2915,0,1,c961888f658f8e44f14764836c2616dc4f52bcedd70b4f8bf7ddae5f5e2aadb9,2025-03-27T19:32:07.640000 +CVE-2024-2915,0,0,c961888f658f8e44f14764836c2616dc4f52bcedd70b4f8bf7ddae5f5e2aadb9,2025-03-27T19:32:07.640000 CVE-2024-29150,0,0,44e3327f8397bc185823399249a820fb50d0ec4b7b78be7a9c916cc812ef8633,2024-11-21T09:07:39.327000 CVE-2024-29151,0,0,06d81edd5b25e7671a9bc9ea7de07b84cb8a664d7adbaef3b2c1db1b4b55c376,2024-11-21T09:07:39.560000 CVE-2024-29152,0,0,903ecbbb0a4e8909497840fc730f1410a2efcc10560f55cfb6b8dd24fe22db99,2024-11-21T09:07:39.783000 @@ -256186,7 +256186,7 @@ CVE-2024-29220,0,0,d56b29bab759f632fe7a8d7605fc23ec1fd1d59c76310b000cb1d69498dd3 CVE-2024-29221,0,0,719f02c93cb7da40e2b1e83286b78d24631abaf4b186686cd86793f230a27b56,2024-12-13T16:21:08.447000 CVE-2024-29223,0,0,4727067d0160fa817bf05389d9d077f4503a87a90b03a79ed32cfe7d23e8e3d6,2025-02-12T22:15:32.433000 CVE-2024-29224,0,0,51a97a451d23c0ecf1555d53913f72b7a59110c340a56174e31f0dd604a53a88,2024-12-17T22:20:34.167000 -CVE-2024-29225,0,0,987e1bbdbd14475e79c4662d58c64e48774254cfe2bcd4f86e976712c6a388f6,2024-11-21T09:07:51.173000 +CVE-2024-29225,0,1,72697bc3b3cd76ad1cd9c210d589e0cf3cece9727509a7812c69881731891f9c,2025-03-27T21:15:47.700000 CVE-2024-29227,0,0,d503753dfdefd49d00f29337074255680223ec38b7b1aff3db71fd996bc8fb08,2025-01-14T20:13:16.757000 CVE-2024-29228,0,0,2dd0863d8f64a92f9425a1fe4144885d37a4b8fe36ad5e989c60669d900afa60,2025-01-14T20:11:42.487000 CVE-2024-29229,0,0,0b666ca1d5fb3561f20fee474f6e4a5a0ffa3c7cc9bb8eb951f44a170de58add,2025-01-14T20:12:23.290000 @@ -256249,7 +256249,7 @@ CVE-2024-29385,0,0,379560aa263a88d8a2172d50f1080a233949e14f3a947946f4ae7f79bb244 CVE-2024-29386,0,0,fd0e19b44781b45be87bf3d1b7742f73d7b3002fe0c467975f0bb9cd268f3f22,2024-11-21T09:07:59.103000 CVE-2024-29387,0,0,0e8b3d9392e8a149d703fb117dbc239c951751286d17b193bb5731f9516c6078,2024-11-21T09:07:59.333000 CVE-2024-2939,0,0,558b843869773db58e41d3e67b617c443849c6f6002b5c0a69358a8665c4a9e3,2025-02-19T18:43:35.447000 -CVE-2024-29390,0,1,62da36fc072ae90418250d6d2d90372d8ae5830e09e71bb4ce33788a35eccf16,2025-03-27T20:15:25.893000 +CVE-2024-29390,0,0,62da36fc072ae90418250d6d2d90372d8ae5830e09e71bb4ce33788a35eccf16,2025-03-27T20:15:25.893000 CVE-2024-29392,0,0,4abff635bd0f0810b369387adfab34d800294f635b1733e7a1daf9c43a853ab0,2024-11-21T09:07:59.790000 CVE-2024-29399,0,0,4d28477f48a6de8c3d91cd71b510eb449e3eed0008fc8bc7752b4a8bdc48d15a,2024-11-21T09:08:00.033000 CVE-2024-2940,0,0,32e376b4d133a298af5c034f36545d941aa0b1c8c39ac6b6cc9bb44a98c8cec3,2025-02-19T18:44:10.760000 @@ -256262,7 +256262,7 @@ CVE-2024-2941,0,0,b12eee0c74cd3197b1ce7b96f3d8a408424a9afc4d2d8c25962410bbd4c55e CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000 CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000 -CVE-2024-29419,0,0,0d9253d420b03071943ee5dd41d934c405f45510dd60f0d645cdf178ca71c045,2025-03-10T15:33:52.230000 +CVE-2024-29419,0,1,4c62de99df4a514a511d1b82bc478159a0061addb7cd9576afcd89e928827cec,2025-03-27T21:15:47.877000 CVE-2024-2942,0,0,3faa457ae8766e8a5734ba932dc7e3b0bed8ea361b59f4a725dd29f93f99933a,2025-02-20T18:06:40.927000 CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000 CVE-2024-2943,0,0,6ef6883685f3911c26da2f30759fad0f66fe553abeedee1eba2540cf69e4da52,2025-02-21T18:30:31.883000 @@ -256385,7 +256385,7 @@ CVE-2024-29750,0,0,995ab301e34bee7f8f991af44137d47469e84f7e1b69880a6bc6b8c52df9b CVE-2024-29751,0,0,cb2009d5d09ee045d0a5002dd4efec70805f7a5e1e79dda027e321bdbb83c5c1,2024-11-21T09:08:14.760000 CVE-2024-29752,0,0,72634631d19e07556dba7788b86d9db60607f1f329529f2bde7c31e67c38dc92,2024-11-21T09:08:14.953000 CVE-2024-29753,0,0,8feee64fb3989b43f499d67d287ada010650e220373b20357ef4936914bceb61,2025-03-25T16:15:20.563000 -CVE-2024-29754,0,0,afcc33f08b5b36a327d79e274d961d620c6f65d7eb28af6324f3f66bf410f9bc,2024-11-21T09:08:15.260000 +CVE-2024-29754,0,1,7c35b400f3f9775c4e9852dfa602402a8903d6ee2a5bc9f44baf1ebccaea1178,2025-03-27T21:15:48.057000 CVE-2024-29755,0,0,131508e7f31b5dd773300df31549782ce0ce017525cc3577b3551d26eabf99ec,2024-11-21T09:08:15.367000 CVE-2024-29756,0,0,e77feac16a93aca73ccbe8dcfafacd1ca46e891f6b1a10023dff30a1bdc4c245,2024-11-21T09:08:15.560000 CVE-2024-29757,0,0,124d4394bf60baca7286917cc012ced055504e094614685b3ee66592f760e706,2025-03-18T21:15:24.640000 @@ -256493,7 +256493,7 @@ CVE-2024-29850,0,0,512d768a26d97e404411177fb276acf78b6a19ce887e30ecd123d89800016 CVE-2024-29851,0,0,236eb2c620cb33d123046abbf085970860d9bb50072796b5275772ae4a5a1a5b,2024-11-21T09:08:28.167000 CVE-2024-29852,0,0,29b0b23a86461f9e60f5579670657e219bfa5a95c00b5c38f171db2eecab3e54,2024-11-21T09:08:28.300000 CVE-2024-29853,0,0,4c9002c0c0fbbb703ad210531603aa769175a9f6320529b3713d1a4749a047d2,2024-11-21T09:08:28.420000 -CVE-2024-29855,0,0,2558e9ead7b22223bbaca2c80294fa2333d58137b1a989ec51a3aa934311e1c8,2024-11-21T09:08:28.550000 +CVE-2024-29855,0,1,6d2becce445fb85d8a3ce03c0a9637f2df05bd300108252c9d25a9447a0302af,2025-03-27T21:15:48.220000 CVE-2024-29857,0,0,d0f8da7d297215a9aa89339fb466a7b41b1ef03fad42cb6defbc9cbd2e5f42d8,2024-12-06T14:15:20.263000 CVE-2024-29858,0,0,aec2f50579c2c9c0915e18bc8f499c1eb170becbbee3541177ee843aa252f26f,2024-11-21T09:08:28.933000 CVE-2024-29859,0,0,37a69adc1b7832a621c361f101a9c8b0ea81feef948392f5a53e4b63ef068862,2025-03-05T18:53:05.750000 @@ -256872,7 +256872,7 @@ CVE-2024-30230,0,0,9ae9ce9e1df99b9edb0b3840d298f6742d8d81c2fa9cbc5be63ce42438c75 CVE-2024-30231,0,0,f4c70af931c4a7dd93f57db08c46f6b181ba6718fd21c7de416dedb13c635394,2025-03-10T17:06:14.653000 CVE-2024-30232,0,0,504c2d526557d8455aaf3a0b19dae7a38c7019be0b80d9ec9ce07532d067d424,2025-03-05T21:15:01.303000 CVE-2024-30233,0,0,81d1f117bd3bababefee9fd012d7f155f07ab08571fe314121e0b75e3dc908dc,2025-03-27T18:56:07.040000 -CVE-2024-30234,0,1,f25d5a0ad1ee024d43f2f2bb40e62db19507e57dac819fc5e44392e4f34e6603,2025-03-27T19:25:19.060000 +CVE-2024-30234,0,0,f25d5a0ad1ee024d43f2f2bb40e62db19507e57dac819fc5e44392e4f34e6603,2025-03-27T19:25:19.060000 CVE-2024-30235,0,0,b2c4f57b4563c0044433cc89cae813d48dc16e7df7e1220a14d67430afee5c8f,2025-02-07T16:54:26.067000 CVE-2024-30236,0,0,402c6598f926ac926a886cdf244ebae292b9293a6f096e880a3ed2db8e268ed9,2024-11-21T09:11:30.580000 CVE-2024-30237,0,0,939a8bcadb7b63965cb9f5b533e4dc6d69106e1beaad0c41f1e0e0db25e59f5d,2024-11-21T09:11:30.693000 @@ -257245,7 +257245,7 @@ CVE-2024-30607,0,0,84c3d9c3166ee7d437f534467f6cd60825c7bba9e0d7bc4d89b477ef09237 CVE-2024-3061,0,0,1259480b9dea28facb7d5e76401d1a90ba7bc3e57be5bc78ff1a0731906b75ce,2025-03-13T02:08:38.823000 CVE-2024-30612,0,0,a6c6607fbecd066c363150271bfa1b80a64a1d27406520f64e7875b3d1f30bee,2025-03-17T14:21:36.410000 CVE-2024-30613,0,0,4af26d39f384fc744be92ee5486ca8569d34c559bc319211a0004dfe1d867038,2024-11-21T09:12:18.120000 -CVE-2024-30614,0,0,28c91df1af346769b88f1309b052a041a0d56dceb4106ef242bd2019619d3e07,2024-11-21T09:12:18.340000 +CVE-2024-30614,0,1,eb7d95778c8418d12e6779237f302edb17d3e329e21d70d6f7d816f139f150a3,2025-03-27T21:15:48.323000 CVE-2024-30616,0,0,4b015292af8508f3d2e0fce4d18d9fb2a626b7d54f1e7875fa72aceb60528a18,2024-11-05T19:36:11.770000 CVE-2024-30617,0,0,1b7a40956a8c5351972a7fab47bd34ec38cb805375ed86bedbc8c427efd4c8a6,2024-11-05T19:36:12.623000 CVE-2024-30618,0,0,0cb798579247cbc339e7707fc94c0c95291fa672823a911d642e010941a4991b,2024-11-05T18:35:07.490000 @@ -257549,7 +257549,7 @@ CVE-2024-31139,0,0,d91f493db8c81bb4b5d794b8f2a363ddcea640c7742984db8441987b1d195 CVE-2024-3114,0,0,ade433a65127555302d65b2c164d94e533c3b45e4239cf2791c7a999f14d794c,2024-08-30T14:15:15.937000 CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376a40,2024-12-16T15:58:11 CVE-2024-31141,0,0,d3e6234dd5f7853dd5cc5624c4460d246120bc3e8971c692c1eba3ffde4baa26,2025-01-31T15:15:12.987000 -CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000 +CVE-2024-31142,0,1,2dfd590e58a88f8700b5069e4a92d888e33d858010972d20e44ed086d437002d,2025-03-27T21:15:48.497000 CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000 CVE-2024-31144,0,0,ef6f78f259561eb4d342edb6d84335a73e62df62c2b5a9db02f48dfc8ecfd42d,2025-02-18T15:15:16.050000 CVE-2024-31145,0,0,f3ca8145921f17e384184f2a401130163f6a98a09ec4c0f02db53b87f0633d0f,2024-11-21T09:12:55.410000 @@ -258276,7 +258276,7 @@ CVE-2024-32064,0,0,dbd54301038cc21ecfd959ae6b4c22d3f3371dcb1f683d2492a8558fb73b5 CVE-2024-32065,0,0,4e269c3b4617b51abbf7fad0fb189e864f793651d042c42c0e6c76cdaab0ff9f,2024-11-21T09:14:25.143000 CVE-2024-32066,0,0,e2d564a6fee7a9e5f3fdab2d0b49dd5d8b58b3bad6120a98104b2feb5f2112fa,2024-11-21T09:14:25.267000 CVE-2024-3207,0,0,02d8ec17fdfdc3fcf46708a9320e4db12160865848100afd95416d6fbb5d38fa,2024-11-21T09:29:08.997000 -CVE-2024-32077,0,1,0d70631bea9ad9956cc7de2c5d0a52f59744a3d5cf2dc94e91bfd7710ba7f114,2025-03-27T20:15:26.090000 +CVE-2024-32077,0,0,0d70631bea9ad9956cc7de2c5d0a52f59744a3d5cf2dc94e91bfd7710ba7f114,2025-03-27T20:15:26.090000 CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000 CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000 CVE-2024-3208,0,0,825a61e8cc05584c2ef2bb5c9aa68d5659595de19829f1ae20c53568a7d588e9,2025-02-24T17:57:40.263000 @@ -258945,7 +258945,7 @@ CVE-2024-32890,0,0,78b1d29189c0e69e39914bd212c487e5bce386c1674ec6acf86e4ed6c62b0 CVE-2024-32891,0,0,116d7659361a612a296037e21d468baeedce7616c0a5d53d7dac85cc53b6a9ae,2024-11-21T09:15:56.940000 CVE-2024-32892,0,0,d1509b4b88cd18875c51fabeebac054d143a76c7c679673d158454687c32565e,2025-03-13T20:15:19.830000 CVE-2024-32893,0,0,7f2196fe37f6cecf97fa3a552b41e1a0b723599c3f47534189332b6f0b24828f,2024-11-21T09:15:57.307000 -CVE-2024-32894,0,1,b456987999e24ae20c341a2f6b6eb1466d4edc6f999d59baf340f612e2a49f5b,2025-03-27T19:15:47.943000 +CVE-2024-32894,0,0,b456987999e24ae20c341a2f6b6eb1466d4edc6f999d59baf340f612e2a49f5b,2025-03-27T19:15:47.943000 CVE-2024-32895,0,0,6709bc3c1bb78d9c2493392efeab50690fd1c653aea96a20b79893c0045cf436,2024-11-21T09:15:57.643000 CVE-2024-32896,0,0,dd18a2d0e9ceab5cd619fb697b3cdaf9a96542d355fbe789f097d6e43c131218,2024-11-29T16:43:34.323000 CVE-2024-32897,0,0,0af7c61e5ff24dc0a7b1140c716d31c928da2eb3c19b3541c6b1230044e101c5,2025-03-13T20:15:20.010000 @@ -259226,7 +259226,7 @@ CVE-2024-33303,0,0,788999d70993e4029560429717cb0a5b52e1c75a670c402df99e894a2e38b CVE-2024-33304,0,0,29c021a3880698e20fcd7d239a85eabb88a80ce4d09af7c66815d1b48c062b25,2024-11-21T09:16:46.643000 CVE-2024-33305,0,0,d872ba3229a671ba7898ca454c70b19f41ac4e35e9973c9cddb7f3043c93b4c1,2025-03-26T14:15:30.893000 CVE-2024-33306,0,0,c674ae8e870d8ea7b9496d624021eb490db8e79bf45d8ae6b6305d0dc1c3b509,2024-11-21T09:16:47.003000 -CVE-2024-33307,0,0,ac7d56af44afb2c2b4a91577f9c8dba989c4554f34f5f7b59ad656ea25cfee5d,2024-11-21T09:16:47.213000 +CVE-2024-33307,0,1,cce1e2cd16d198a119dfeb1177fe47eb90a98da17122cc403a9ab7849e99d22c,2025-03-27T21:15:48.650000 CVE-2024-33308,0,0,00a8a2c0784c175809445a9a47d85dd5333b912b9bfcfcc130d47e205cafb559,2024-11-21T09:16:47.373000 CVE-2024-33309,0,0,dc4195b27a37ab2d92f92a2a98fdc38ed8116ffde6823e4c2749a8c5c16d5d37,2024-11-21T09:16:47.607000 CVE-2024-3331,0,0,30b4cfd6970699509f68e11b342846ae042b92bc870d5f80f5121c22d3ab382f,2024-11-21T09:29:24.200000 @@ -259737,7 +259737,7 @@ CVE-2024-34000,0,0,259f2a98e75761aef92dd8a7ee8e1af17039db733ba842087a4d7ce04040e CVE-2024-34001,0,0,0fbd867be3058ecd93512b1064253b8de9f1c4e263ced1d55db0ac451cb2a012,2024-11-21T09:17:52.937000 CVE-2024-34002,0,0,10aae2c3312448ca41c6532140a57881251c00c0d1ac84493cafdd88cc486eac,2024-11-21T09:17:53.120000 CVE-2024-34003,0,0,cb144304b059eaee253844283d1d01bdcb8fbac35494da903e966441ce153d8c,2024-11-21T09:17:53.290000 -CVE-2024-34004,0,0,06e4e845f1afa5df660cac48fe096e3ec9ce591660d06e9706ce588c0290f43b,2024-11-21T09:17:53.467000 +CVE-2024-34004,0,1,649a243a7ed7b1ed4bdd0e1477c646a81dce9ad486d0dfdf3d4a920e5ca4a433,2025-03-27T22:15:16.257000 CVE-2024-34005,0,0,9c619b646bfd8b6ba071f7c7a05e6d7482bef712704a79dacbe78904bb3915eb,2024-11-21T09:17:53.570000 CVE-2024-34006,0,0,fc53f6fa5a40ec57818dd606b4e40cdc2854b14b7a4f9c226152ad1063e21c3d,2024-11-21T09:17:53.750000 CVE-2024-34007,0,0,a9ce91776b0f9568c40c8191cf839e23abeefdf13b069e2815488c4e0297bb79,2024-11-21T20:15:41.453000 @@ -260472,7 +260472,7 @@ CVE-2024-3489,0,0,d81ffb51bf0a659f164f0f5b63c8747e7c707bdc92a027d4fc95141a53a81b CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d3819c2,2024-11-05T17:35:17.710000 CVE-2024-34896,0,0,8d09afa1c0452297a17a98820985a7e80472ceca07ff84c37ebacbc75087da4e,2025-03-14T17:15:45.620000 CVE-2024-34897,0,0,ec99a3657bdeb5346c50fb249b7f2d8fa7ab1470fa272d54625daa6f1a2201ed,2025-03-18T21:15:27.097000 -CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000 +CVE-2024-34899,0,1,e86ccec423016b215652ae6dcd2a5ab1e645679b0176c19699fb24d3b46749b0,2025-03-27T21:15:48.820000 CVE-2024-3490,0,0,d53a9b9868aa923b594f859a57c3fbd0cd1cddafafda61c97d0c078c0f819fa5,2025-02-27T18:39:42.717000 CVE-2024-34905,0,0,59d0bb8ac29776054ec2390b8e9ed63207063a9a715e1e403ae1d1ccb3a38a14,2024-11-21T09:19:31.277000 CVE-2024-34906,0,0,3bbfb8955edb9ea0b431511df10b395b49def6a899fcaa20ba525c1779c862e5,2024-11-21T09:19:31.530000 @@ -260506,7 +260506,7 @@ CVE-2024-34948,0,0,49bda64427407ecb2180b4b1b7b2e9653684a7b457eb15865cb81d1a7a2be CVE-2024-34949,0,0,b071e3a6c100e9a327bd79bacd5f4de547f0a047eed909ca9f420db03fa2e8c4,2024-11-21T09:19:36.760000 CVE-2024-3495,0,0,3fb1c314cfd57cb18d26d7cef17b997e0ca6bdd9b2251ef3488472e3c5f60221,2024-11-21T09:29:43.573000 CVE-2024-34950,0,0,a6b126d64aa0ba456ecd616d45f62074a5406fa93e0daab388c44de3be35d7cc,2024-11-21T09:19:37.233000 -CVE-2024-34952,0,1,714ced0a477a50c4477397d464fcf76c2900d64e8398efd585991120c91f7ac3,2025-03-27T20:15:26.297000 +CVE-2024-34952,0,0,714ced0a477a50c4477397d464fcf76c2900d64e8398efd585991120c91f7ac3,2025-03-27T20:15:26.297000 CVE-2024-34953,0,0,39e1673dd79aa740ac449bee0990185e133e2cdfb359047cbaf9f24df0c042d4,2024-11-21T09:19:37.610000 CVE-2024-34954,0,0,d50068f68816eb84deb46a88ed0ea48fd39f21d7feaeda62384b1cca46468522,2024-11-21T09:19:37.837000 CVE-2024-34955,0,0,840358294e4b513a83028ec3488bb06c9c8c62c547805da452fda5a9ffb62b41,2024-11-21T09:19:38.043000 @@ -260782,7 +260782,7 @@ CVE-2024-35358,0,0,5a774499d49264ad975d89ad0adbcff91c0faccd37e91e4b84d650a0181d6 CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089700,2024-11-21T09:20:12.920000 CVE-2024-3536,0,0,7989c25e2375d082a5474974320e66a71227073e4e43c82e8bb2c43b72686d65,2025-02-27T20:01:21.167000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 -CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000 +CVE-2024-35362,0,1,7d28cc56b5f65473bfe8a716407a4c594620f271f57b4534c7007a73760c929e,2025-03-27T21:15:48.987000 CVE-2024-35365,0,0,1c05bee1a7dabfe40acb221d1e4fd3b9c4ef93fda79ae1a0f764cfd1249a7a38,2025-01-03T21:15:12.940000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 @@ -260846,7 +260846,7 @@ CVE-2024-35492,0,0,95f9a6ef68591f2158df514fa0b56c27d61acfc840f920f18bc3599e42cac CVE-2024-35495,0,0,390f47c2cbce25898044aeb7d1d5f69964e2bab36870c263144336aca99b03e9,2024-10-30T15:35:10.887000 CVE-2024-35498,0,0,bb1d6dc6adc06319174305aec52a77d02e9248270cdfbb5d04470bef2b3a6d9f,2025-01-07T16:15:33.277000 CVE-2024-3550,0,0,a348af20d00fce44e48b601f2d3c8c174fccfa03a19fd2c3e450aef353e3c986,2025-02-04T17:07:26.947000 -CVE-2024-35504,0,1,01d36097fe3b8849c1a5b5ed514ace039bebf20cb35d6cef55c5f2288e21157b,2025-03-27T20:15:26.493000 +CVE-2024-35504,0,0,01d36097fe3b8849c1a5b5ed514ace039bebf20cb35d6cef55c5f2288e21157b,2025-03-27T20:15:26.493000 CVE-2024-3551,0,0,6dfb995a287494b771bad4f867f53bea4aed5291629de60ee9f068404e24e321,2024-11-21T09:29:51.557000 CVE-2024-35510,0,0,ff9eaeac7af3aeda20030df3975e48b4abf9e87d4b6c8e27ab0969dcd485e5b8,2024-11-21T09:20:22.060000 CVE-2024-35511,0,0,14044eaed9c2f367b0028647ed9c4436d2893d59ef4a39dc74f6a633968c7669,2024-11-21T09:20:22.317000 @@ -261379,7 +261379,7 @@ CVE-2024-36064,0,0,bf7fd7b62e5a2fb95726ce7f1fb0026147c4b4a98515c74584e43c847c060 CVE-2024-36066,0,0,b5e552d5a7a4644200e0321a56e459c1db66771cb7d845383282164567b121b7,2025-03-25T17:15:56.690000 CVE-2024-36068,0,0,3211c8cc1108b1cf5b554d20b9dbe1f13ba680cf18e634d0fe313e9859fb99b9,2024-09-05T20:27:19.640000 CVE-2024-3607,0,0,00eb3c93b2fe5b13cd3942958d1958984c5adf3d72430ebdb6e53915b9d11912,2025-02-04T17:08:57.963000 -CVE-2024-36070,0,1,0fa1fee63cb6aabdf8deb10e6085a69f9dca9464bf67545be06885e28258be40,2025-03-27T20:15:26.677000 +CVE-2024-36070,0,0,0fa1fee63cb6aabdf8deb10e6085a69f9dca9464bf67545be06885e28258be40,2025-03-27T20:15:26.677000 CVE-2024-36071,0,0,9bafe84344bc2dc3777eaac1da2edb455c4ed81c1214ef6ff4b2f701c81200fe,2024-11-21T09:21:34.343000 CVE-2024-36072,0,0,b687cc556ab9d8f308c2ebf6b85e107f2750960f2795256e2a9bb1e7bda4077a,2024-11-21T09:21:34.530000 CVE-2024-36073,0,0,bf0ed494bcfd1a9c641098b08535847bba2110d3ead7bcc32e3c8b05064c8fe0,2024-11-21T09:21:34.763000 @@ -261597,7 +261597,7 @@ CVE-2024-36302,0,0,1d69f0b64200ec5d47ab74795b72da3adcfcdb8bd0ca0ec8048662d28fc09 CVE-2024-36303,0,0,b4111938d128c9565d65f07c6c56322c350c793e76b61c6854b8deaf71b80e05,2025-03-25T19:15:43.273000 CVE-2024-36304,0,0,39de3b97a62c326f0de94a26273cfef054176ef9702ccd3cf739192c46d0f3ab,2024-11-21T09:22:00.380000 CVE-2024-36305,0,0,6cfa43069ee33e00c30d8fa3baead3036438742e2cae79ef30cc5d5dbaececa6,2025-03-14T02:15:14.077000 -CVE-2024-36306,0,0,19cb75114f82b64b24cc502744b2764ae0a24581830717e25e2f792e2f6836ce,2024-11-21T09:22:00.633000 +CVE-2024-36306,0,1,64b14f3a298243574030100c00019e79538277aa5e06c79a15c2ad9d80646a47,2025-03-27T21:15:49.143000 CVE-2024-36307,0,0,414e52094f7235c3eb5327c31ff9b09fd96051a3be211c98e0020a97c19c3806,2024-11-21T09:22:00.763000 CVE-2024-3631,0,0,87b52c0b4c60e81ea46c2144b40729e765d86ec2487bd60b958524d1574cf2bd,2025-03-25T19:15:43.967000 CVE-2024-3632,0,0,119403a424687bcfc6e7f9b6ed0b72a6392ff6135bcf171b98aba3696d4839b8,2024-11-21T09:30:02.140000 @@ -261879,7 +261879,7 @@ CVE-2024-3673,0,0,e164828477a784c9fdcdc0e4d6c19b0eec129743b7b338aea79ec63aceab21 CVE-2024-36730,0,0,410c6adcef120338ff5aeddb17dd6610145f63760639617fa266b0b9033b6d59,2025-03-14T14:15:15.717000 CVE-2024-36732,0,0,81ba85fc69d74cc192832ab6f674d87a86f9d3396e165e082d8d918ae0ce6a1a,2024-11-21T09:22:34.047000 CVE-2024-36734,0,0,2eb1d87ac32d1977c1f0b28392038961db03e840d3a5a3b5105eabed99ec9617,2024-11-21T09:22:34.267000 -CVE-2024-36735,0,1,eb5bce5adcd2cc796dec063db96956a90de38ac952af99d20d8fc9bc428424d1,2025-03-27T19:15:48.147000 +CVE-2024-36735,0,0,eb5bce5adcd2cc796dec063db96956a90de38ac952af99d20d8fc9bc428424d1,2025-03-27T19:15:48.147000 CVE-2024-36736,0,0,03be2a30087ff58c5018661c420fd6bfa3b6017adc091c78b30103b20ee1a821,2025-03-25T17:15:57.270000 CVE-2024-36737,0,0,0570a0af82c8cb7cea9db8761bd6dd4f3feaa61a8587165222ca6da64f8f51b4,2024-11-21T09:22:34.843000 CVE-2024-3674,0,0,22193ad9925936ca40eafc01b0fc37460e0cb0f612b5716ded7f8e8445f6046c,2024-11-21T09:30:09.347000 @@ -262095,7 +262095,7 @@ CVE-2024-37029,0,0,5918db5a14026e0b27bb4c942ba1e1642be15a85fde071166e39c0c7f0b92 CVE-2024-3703,0,0,2080817821aef58a35950a9a2e43fea9084fbc80f2586d869a26da229ac0b7a6,2024-11-29T16:15:10.427000 CVE-2024-37030,0,0,de5271cb68cf41601817643fc548aa7da37e18020142a53d8305e026ae0604d7,2024-11-21T09:23:04.790000 CVE-2024-37031,0,0,d941e2f07f23bfe0fa1efac56a08c7b13f8e72c04feb4a54b1fb5af65673dbc3,2024-11-21T09:23:04.920000 -CVE-2024-37032,0,0,79d10dd6c6215e78b93625f1323041f0fdfd1c8b10639c7a928430d70b2b0746,2024-11-21T09:23:05.137000 +CVE-2024-37032,0,1,63b61ec0d79ff4535526e876bb3b0674922e961bd23866a6c67bbe291cbba9d8,2025-03-27T21:15:49.287000 CVE-2024-37034,0,0,f95063b38ebd8a7fafbd66ea92b0b2a5992250de1d826771f36359ac16b95078,2025-03-14T16:15:31.970000 CVE-2024-37036,0,0,f37f5426e9b1c4b93a4cc596ff61074bd776ea1e088c04d3b1a45ddb8d37bc18,2024-11-21T09:23:05.510000 CVE-2024-37037,0,0,e7696e47bd31bf9ae23a123028881672c684381a3a6965caebf7fba3211688f2,2024-11-21T09:23:05.690000 @@ -262786,7 +262786,7 @@ CVE-2024-37863,0,0,6e547bbf181c4a9e595d32656aed95f0317e97be6194411c87b914a812710 CVE-2024-37865,0,0,dfeb9a6ca61904e957829daa61e066997af14de3bcf96e9ea969e9a485811c09,2024-11-21T09:24:25.140000 CVE-2024-37868,0,0,86aba95bea13cf4bcf66aea63309cd8719ccea2be3d5a1c071c8e084167a7293,2024-10-08T18:16:07.383000 CVE-2024-37869,0,0,ce409ae8f9d19780de31fb5c79caf3f541d760ccb03940db155e1fc53346697d,2024-10-08T18:15:54.250000 -CVE-2024-3787,0,0,e7eca4a7ba161b525e35e3c5eeb36a46f51d6904a2749f3b66a2c451322c679b,2025-02-27T16:20:34.350000 +CVE-2024-3787,0,1,0a58b75ac32fe2ff82ff806b70113a714faeac3517302ffaa7c15c7ad37b3314,2025-03-27T21:15:49.447000 CVE-2024-37870,0,0,d15041c1c4174f04ccd6db3655427ba3b8c771d22aedee856ced32d25642ca29,2024-11-21T09:24:25.827000 CVE-2024-37871,0,0,b045ceb4582b35706f03973a842d86ec98725db8fd2169ac81b3e469ff7aad96,2024-11-21T09:24:26.050000 CVE-2024-37872,0,0,8d1e254eb7523d398afd2ac4a3a43d964124c32e65e3e5ffed14fdd015d2da4d,2024-11-21T09:24:26.263000 @@ -263138,7 +263138,7 @@ CVE-2024-38226,0,0,c7695c6a6e3adfd32ab9d8e824ec9fa1bca55465436bea51c1858409e12f7 CVE-2024-38227,0,0,ed444d1f838f77562d732188fe9b348de21aaf3ad19e321e63fddaeac3f01dcf,2024-09-17T16:57:39.267000 CVE-2024-38228,0,0,feb9b32b0d8d9738fc74baeae4c5aec6462e15dea6f13d42f8eb897a16369095,2024-09-17T16:57:54.950000 CVE-2024-38229,0,0,a3f71208f7fb52ddac4363b01a6927139fd5a64df329b0a573ed936e4765b947,2024-10-16T15:36:38.317000 -CVE-2024-3823,0,0,eb09e2f8ed709b5b125cdcdde26b66bf8b906b2eed98f88b8f606612f46a7fc0,2024-11-21T09:30:28.433000 +CVE-2024-3823,0,1,991fb6cbd2e66897cf46e0e78874c80142c2f1716ad812243b9b46e6cbe2ed75,2025-03-27T21:15:49.600000 CVE-2024-38230,0,0,fb10de1ce150c2c4fcf6604a5757dc3b828cfc0330155feed4de959e94bd9bed,2024-09-17T16:56:15.420000 CVE-2024-38231,0,0,0ce283246a7e9bb3941099800e9db7ae51856b83a3ad47eff4591f3a4b824711,2024-09-17T16:52:56.323000 CVE-2024-38232,0,0,d39d82a75ce0f68880e88ce015889e6d16457d28aa87fc8fb95597b61ce5fc91,2024-09-17T16:52:05.267000 @@ -264512,7 +264512,7 @@ CVE-2024-39842,0,0,e01acc4dbc30a817a1f7075a2860b62628a91fc70a03e1f009962db2377cc CVE-2024-39843,0,0,487982c7ac9edf948bf5070b1d5694d31df05d071ec44e4a9d29dcddfbfbd983,2024-09-26T13:32:55.343000 CVE-2024-39844,0,0,85c3a846aa32629f6113f9a413e0e7dc227dbddf60f06f604db9d915b574da6c,2024-11-21T09:28:25.877000 CVE-2024-39846,0,0,80953257ce1c332cd15e530c3e3ca7ffad1fca5d0d35a29a56f52115354d0829,2024-11-25T21:15:15.117000 -CVE-2024-39848,0,1,99f200c9110b9b0b02c88f225876f5dbd71c44d31f66cf410750136bfadecde4,2025-03-27T20:15:26.860000 +CVE-2024-39848,0,0,99f200c9110b9b0b02c88f225876f5dbd71c44d31f66cf410750136bfadecde4,2025-03-27T20:15:26.860000 CVE-2024-3985,0,0,8f03264baafc07298f97f70b4ff78c785056a15ca84e8beab59019b2a1407b8f,2025-01-21T19:52:52.653000 CVE-2024-39853,0,0,a224043399891653f1bf55094c6d78bc499427db95adef716d68626986175f2f,2024-11-21T09:28:26.447000 CVE-2024-3986,0,0,7c22c53a0878a262a608a9d1c3fdcc329a9d6483cd2f7affa5dd9450a42b232b,2025-03-13T14:15:29.767000 @@ -264630,7 +264630,7 @@ CVE-2024-40086,0,0,59721de2a9eb842f68fdc99333245818c6abbbae4238c0b32b069b650dfa5 CVE-2024-40087,0,0,03313a4d49449c4e1d0e9c1207cd7b2c1808bc78eb6614851343e2cdf6a1f6bc,2024-10-23T15:12:34.673000 CVE-2024-40088,0,0,701531852f33fd97e525317798bf462fb364c26c0c4fff7814f92849464a54f7,2024-10-23T15:12:34.673000 CVE-2024-40089,0,0,0479e8a8882d063e039d1d2419aedfcffbf1e44ba56d81ca3ea04c1b3e96307a,2024-10-23T15:12:34.673000 -CVE-2024-4009,0,0,3ba1044c6dae0dc957d0526ad53c320d2c1e1ef22b9d5d26d4b7c8a850793f02,2024-11-21T09:42:01.553000 +CVE-2024-4009,0,1,e6fc13339a022439928a3b880ac5a3dca7408f486ac8d9399d6664d4873778fb,2025-03-27T21:15:49.760000 CVE-2024-40090,0,0,6e46ab8288754b7c7436b821eb629344493356fbbc0e8aa78656b38bafae1a1a,2024-10-23T15:12:34.673000 CVE-2024-40091,0,0,c7e81cf1029e578a7ac6849154e7e72da9a1cadf7991dc5eaae2f3eb8895cfbf,2024-10-23T15:12:34.673000 CVE-2024-40094,0,0,9a4220a74ad0b1776bf22dd7bb76fc7ba6de66481703ba851cc70627616c9162,2024-11-21T09:30:56.560000 @@ -264803,7 +264803,7 @@ CVE-2024-40584,0,0,47900c93570e7eb552e292857883b68b4e31ad2a59fc1e0340e58d431c1a6 CVE-2024-40585,0,0,fccd036a281b93281347721487f116fa32c9624e61c57ee93bab6f84f3e2a0f5,2025-03-14T16:15:33.400000 CVE-2024-40586,0,0,edf532244e9d4f3f710d6611abcec2ddafc23b7e2ee6987f2706d8a1b6b8778f,2025-02-11T17:15:22.683000 CVE-2024-40587,0,0,de0c24e4e6a8866fccaaacb21ee1c63e90684efa6aa26e616d976649f617d5ad,2025-01-31T16:34:37.880000 -CVE-2024-4059,0,1,7d866e411d327c1d33c5cd52c78ae54059bf2c7df278e74d8925f447e422cf1e,2025-03-27T20:15:27.037000 +CVE-2024-4059,0,0,7d866e411d327c1d33c5cd52c78ae54059bf2c7df278e74d8925f447e422cf1e,2025-03-27T20:15:27.037000 CVE-2024-40590,0,0,420db5daf9cef8fb2fdfcff60c780eb63ed5486d48ba6028605678e332c01a24,2025-03-14T15:15:41.630000 CVE-2024-40591,0,0,70c59ddda7629e1c082b5b948d65adc5f2ebe759d2e9b040cf087140e04072da,2025-02-11T17:15:22.810000 CVE-2024-40592,0,0,70d588c7e0dd63c3f30c565c48cdd17864cf3988f3b717bd753beb73e71e83a3,2024-11-14T20:37:06.040000 @@ -267324,7 +267324,7 @@ CVE-2024-43716,0,0,7489d0822e490afc1bd3fcb5fbb351089e0a6ff380a7fb6cc52971a4c5345 CVE-2024-43717,0,0,e6e3262f2fda611566ecc564d59a0306a774da188ba68097ba9079de44feb9ed,2025-01-15T17:39:26.247000 CVE-2024-43718,0,0,394dea2bb63e682641a18a050280c4d9fb559e75c8d8f769c6d9d796d651463e,2024-12-17T14:59:24.850000 CVE-2024-43719,0,0,9e152e2bc11f3e899db10ed56cf0d743ff8e1ac51d28f9bba7748782b337b4ae,2024-12-17T15:23:21.027000 -CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000 +CVE-2024-4372,0,1,710948cc5a06a8e4ae039b690ddff67c3dbe376da20f30b1fda13b0f9f8a7e7c,2025-03-27T21:15:49.937000 CVE-2024-43720,0,0,d638c021d2c4519944c77cc82d48804bad9a1d4d299b1831914f9401b5a56417,2024-12-17T15:23:30.417000 CVE-2024-43721,0,0,a6677e379da9c7522d20d339a613d2bcd13e9be3f5f5377521705bde68dea815,2024-12-17T18:20:52.507000 CVE-2024-43722,0,0,2d7c1a09d04203b6410590a8908788e04cb7c1302077cbd2d9259af2be85a4fe,2024-12-17T18:20:54.857000 @@ -270023,7 +270023,7 @@ CVE-2024-47496,0,0,7baf53fceab8fc1cb9045ce576b0b09e91eba4c794fee952a81ab7be89d8f CVE-2024-47497,0,0,ee50f34bbcc7363ea540f0f36a1d8b69992ede7bbd13455812411639ae3fb2e7,2024-10-15T12:58:51.050000 CVE-2024-47498,0,0,60a0c4145c3af04552c81e6e1b2fb69df6596ef3f3f661d83bbf12c2d25b9916,2024-10-15T12:58:51.050000 CVE-2024-47499,0,0,0e2f8dbbaf8ded9c9a28986e50f4c094e925e34b5e679cf1178cc97d78f8de8c,2024-10-15T12:58:51.050000 -CVE-2024-4750,0,0,b5e2f8015f7d46ca06145de45fe7464d6a24c73c268179249d9868c0d43e45c9,2024-11-21T09:43:31.107000 +CVE-2024-4750,0,1,3adafc3aa2828c51db7dd488b68afd7e8a6975ff3dfe1dc2f15ad7f72097ea21,2025-03-27T21:15:50.083000 CVE-2024-47501,0,0,3b96eddb4c7e43371462bf27c8a7fb0a0f86ef894cd5a6bb36435d3b873a3fc7,2024-10-15T12:58:51.050000 CVE-2024-47502,0,0,205ff6dd53bd8f5e2c32bdc49451f7c7cb2cc07e5354ab0384c1c35b19b1e65f,2024-10-15T12:58:51.050000 CVE-2024-47503,0,0,6312bd26dc87c9a4bfe4bcf4b31aeb4ff6b20d6bfa264b3ce95a714e991f90fe,2024-10-15T12:58:51.050000 @@ -270884,7 +270884,7 @@ CVE-2024-48856,0,0,ce7b591dc12194a864ce7803641602395d9322f26c898d2d5b208c4a055c6 CVE-2024-48857,0,0,734998c87f103fb09a721f23a6d832247e2e929586d2aac6990e3e1aa680a002,2025-01-21T18:06:46.287000 CVE-2024-48858,0,0,e3ac978ab9666b0be7c3804be06d1ac89ef20ea5c03c187f730857c345a661a1,2025-01-14T20:15:28.373000 CVE-2024-48859,0,0,05d0a9dcb5a708235b0f2138c22cf84e2e28e47d8a02327472814809b6409c79,2024-12-06T17:15:08.350000 -CVE-2024-4886,0,0,634729ff8fe359265716858de65a284196532efd0dbb21da126bc9a1da5cc664,2024-11-21T09:43:47.583000 +CVE-2024-4886,0,1,bdf61c727cb199ce620a102962708ad708cdfb3f8cd89ce66195b17eeb6d1fd9,2025-03-27T21:15:50.223000 CVE-2024-48860,0,0,5019a6e5ad855b42ba7a0382529136c2e078d26be8e3341136aaeae311f54231,2024-11-22T16:15:28.337000 CVE-2024-48861,0,0,f2e56e74772e56409fc2807a1473087052bb0f47a879527c35ea32b9a7cb30e9,2024-11-22T16:15:28.483000 CVE-2024-48862,0,0,34011f3d825da8e353de6ce07fcd70a7205f097b533b31757cbbc7381a7840b6,2024-11-22T16:15:28.623000 @@ -272948,7 +272948,7 @@ CVE-2024-51566,0,0,1fd52d54ba2a2afa1bd706d74deb2afeee5b314d5e4c8525c97ce6b09c31f CVE-2024-51567,0,0,e490ca29dd77f48f58ef7ff469fcee4797b406471164a77e0419ad638995d587,2025-02-05T20:15:44.913000 CVE-2024-51568,0,0,c593ce3a074ec8aca16002f5375acf94a05fb6e9351e0ec984c43ad8651ac6ac,2024-11-01T12:57:03.417000 CVE-2024-51569,0,0,97749bc3cd1412bd3be900ea07d859b63213ae6788fb52624c50c42ebb16167b,2024-12-06T11:15:08.630000 -CVE-2024-5157,0,1,75c6b8b24f558cd83ee042ce806213ad234e3fa3949f34a265920db4ddf858ca,2025-03-27T20:15:27.833000 +CVE-2024-5157,0,0,75c6b8b24f558cd83ee042ce806213ad234e3fa3949f34a265920db4ddf858ca,2025-03-27T20:15:27.833000 CVE-2024-51570,0,0,7ef279fad1ecc643141c7d475972198d020bd7ffff6e7ce123a18cfe7a427865,2024-11-12T13:56:24.513000 CVE-2024-51571,0,0,dc2c9d29753cdf34b15105d82a00ecb73b2037fa34d139be374327e97ac95d41,2024-11-12T13:55:21.227000 CVE-2024-51572,0,0,cee16c3e387ef6582f33492e847eee772272cd62e767fa2846a666d813bad2a2,2024-11-12T13:55:21.227000 @@ -275427,9 +275427,9 @@ CVE-2024-55060,0,0,4048f1192456f842242dc77cf8bffb1d255a4e15611329017f6eba962db74 CVE-2024-55062,0,0,3123150d46b761ada11b83c374a54e9242d8e139ac058a4ffae965af3a17f30c,2025-02-11T22:15:28.900000 CVE-2024-55064,0,0,d70e68d4be0dd347bbd63a462911314935d644c9781ea6458c9d9173090f4c9d,2025-03-05T18:50:13.373000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 -CVE-2024-55070,1,1,3fad7d709803f8e36c2c5867139a893064fc371eb771fde66baa0d04443c939d,2025-03-27T20:15:27.247000 -CVE-2024-55072,1,1,dcc86f0d2421f35d7a1c5c8b3545bb9dd3dd1fbe55f55cf3f213d82ce1821935,2025-03-27T20:15:27.427000 -CVE-2024-55073,1,1,c5c7963610b9f5bb75fda6e957b0ac6bdcd960fbd3305919a5d48b27b4cf6d4b,2025-03-27T20:15:27.647000 +CVE-2024-55070,0,1,e9b1bcdb2ade375425f0dce45098fba4f3ef6dd597f9cb8735e55be43104fbe2,2025-03-27T21:15:50.390000 +CVE-2024-55072,0,0,dcc86f0d2421f35d7a1c5c8b3545bb9dd3dd1fbe55f55cf3f213d82ce1821935,2025-03-27T20:15:27.427000 +CVE-2024-55073,0,0,c5c7963610b9f5bb75fda6e957b0ac6bdcd960fbd3305919a5d48b27b4cf6d4b,2025-03-27T20:15:27.647000 CVE-2024-55074,0,0,1bb56c00ce7b87cd6028403786c83c9593cbcc8954e072dc461304855924628a,2025-01-06T21:15:14.803000 CVE-2024-55075,0,0,4928182cae41a13ce4b894fa02b7ed8267f67e5fe7ff39725507907b9004a7ab,2025-01-06T21:15:14.970000 CVE-2024-55076,0,0,c92f585d56e12f2f0837c39bfd7ebadf83e043051c49b34e391e84fdfbd62f1d,2025-01-06T21:15:15.133000 @@ -276462,7 +276462,7 @@ CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd1 CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000 CVE-2024-5685,0,0,2d6b631f654a98eb4d420c5da149286286a9d638c829ff7827b94e7c52131735,2025-03-07T16:07:06.043000 CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 -CVE-2024-5687,0,1,ceba3175c3bfd14790e93d6d60cf2282164bca8098cfa2f452b5343d2a9e086b,2025-03-27T20:13:57.260000 +CVE-2024-5687,0,0,ceba3175c3bfd14790e93d6d60cf2282164bca8098cfa2f452b5343d2a9e086b,2025-03-27T20:13:57.260000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 CVE-2024-56882,0,0,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000 CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000 @@ -276477,11 +276477,11 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7 CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 -CVE-2024-5692,0,1,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000 +CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000 CVE-2024-56921,0,0,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 -CVE-2024-5693,0,1,1d12910190fc65b94183c50b33ecc0f30f62a8f9021d779dc1e8f157aac98880,2025-03-27T20:02:24.947000 +CVE-2024-5693,0,0,1d12910190fc65b94183c50b33ecc0f30f62a8f9021d779dc1e8f157aac98880,2025-03-27T20:02:24.947000 CVE-2024-56938,0,0,5c9375b6af4b1a81b6e0aaeaac635cc830f9078a857dd2f622f15fc3186dfb1f,2025-02-24T16:33:42.337000 CVE-2024-56939,0,0,ec6291c63ef112a2796d7c65a02055253df8c0ddd93ff937f69292dbb45c0647,2025-02-24T16:34:05.060000 CVE-2024-5694,0,0,e4f4b8c16de9301e429477c0d7bbb30f101a87e4420589fea7225a76e3335508,2025-03-14T17:15:49.090000 @@ -276499,7 +276499,7 @@ CVE-2024-56954,0,0,5d95940f4500e4c8ed1c79d18da6b28e89ae8e21b6ac5f6f5d9e7bf553492 CVE-2024-56955,0,0,695572a5b43187fae26cfd564d6083408fea2627baf453a4637e921b7d077e8e,2025-01-28T20:15:52.693000 CVE-2024-56957,0,0,a365f0dba6fa5a6a54d32b6e465b7e4720d23d8b2e7adbfd200091b6dfd36d15,2025-01-28T20:15:52.837000 CVE-2024-56959,0,0,443e07d6aa8cbad9f593e7593ba2d839cf52eefdd0713fc78166f22ec2070f70,2025-01-28T20:15:52.987000 -CVE-2024-5696,0,1,6dfbe4b32a50f25fce4f3f1c50bb9c66bd528f663de96b36ea72404cc0419502,2025-03-27T19:55:20.653000 +CVE-2024-5696,0,0,6dfbe4b32a50f25fce4f3f1c50bb9c66bd528f663de96b36ea72404cc0419502,2025-03-27T19:55:20.653000 CVE-2024-56960,0,0,37e2be0ec82bb034d2e2028e2ce56b2586f141a84e855af0badd56a1d71121a9,2025-01-28T20:15:53.127000 CVE-2024-56962,0,0,f93bf8ccff4c99060a7ebb57d88104301c7ef42923a9fdd490b7de1971a9a550,2025-01-28T20:15:53.273000 CVE-2024-56963,0,0,7bb629f288477f1368d70432b9845302d59f2abdab13ed7f914c7a59d4d42a20,2025-01-28T20:15:53.423000 @@ -281073,7 +281073,7 @@ CVE-2025-0181,0,0,3daa095a8ef29b155e27eb528b6494dc885d5fb57d0193f8fe2a690199fb3a CVE-2025-0182,0,0,ce6eb1c5e890daafbcef0255789d97a7de18e7b69bbbb56f54ba67149797ef14,2025-03-20T10:15:50.910000 CVE-2025-0183,0,0,b557502f07b5d99e1644a9e9e95a51cab50b17ec119cd48b0ae904f27508b120,2025-03-20T10:15:51.033000 CVE-2025-0184,0,0,b184a63ccfba52aab27fef6691d340e1daddf4d99a47576e2d38909af97d37e8,2025-03-20T10:15:51.173000 -CVE-2025-0185,0,1,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000 +CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000 CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000 CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000 CVE-2025-0189,0,0,fca222ba5bcbefdec4f0f915caf83951aab0638cdf91dbb61c81c563a9c01f3f,2025-03-20T10:15:51.660000 @@ -281139,11 +281139,11 @@ CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f CVE-2025-0281,0,0,3eed2c9ac115be61f8948fe5ec86ee9cb61bbdd7dd3b065a4b62fe68aa7cd3a6,2025-03-20T10:15:52.153000 CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 -CVE-2025-0285,0,1,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000 -CVE-2025-0286,0,1,10ce5fd9acbea28cf7c2026a8fc335065d04068a17dbbfff503187d19e2e3db1,2025-03-27T19:15:48.663000 -CVE-2025-0287,0,1,7e198555d406436fb9e72500b90542b937b1ca90e159c36432ad3c5af4210a8c,2025-03-27T19:15:48.793000 -CVE-2025-0288,0,1,253e96cac70bcc2877a11f9b1ecc15e17ccda3a3be4ab8e2014455dd9d9dbb61,2025-03-27T19:15:48.933000 -CVE-2025-0289,0,1,5d53dae19dff83cf1df2c164a36c905782ca321b425abf33116f4ab2cbddc1bf,2025-03-27T20:15:28.127000 +CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000 +CVE-2025-0286,0,0,10ce5fd9acbea28cf7c2026a8fc335065d04068a17dbbfff503187d19e2e3db1,2025-03-27T19:15:48.663000 +CVE-2025-0287,0,0,7e198555d406436fb9e72500b90542b937b1ca90e159c36432ad3c5af4210a8c,2025-03-27T19:15:48.793000 +CVE-2025-0288,0,0,253e96cac70bcc2877a11f9b1ecc15e17ccda3a3be4ab8e2014455dd9d9dbb61,2025-03-27T19:15:48.933000 +CVE-2025-0289,0,0,5d53dae19dff83cf1df2c164a36c905782ca321b425abf33116f4ab2cbddc1bf,2025-03-27T20:15:28.127000 CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 @@ -281400,7 +281400,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 -CVE-2025-0624,0,0,c8316e263a066c4e3ae3ec4743dbdf4efc90c26c3c7dc035177727f072164a15,2025-03-17T05:15:33.400000 +CVE-2025-0624,0,1,219c9ae30df91d7005895c2bd65660e673df694103bf294453d32dec62acd6a4,2025-03-27T22:15:16.430000 CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000 @@ -283699,6 +283699,8 @@ CVE-2025-22735,0,0,de6a6f26a15403b2f22d28132a742d5d30dbb5d122c903ecf659b867065c2 CVE-2025-22736,0,0,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000 CVE-2025-22737,0,0,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000 CVE-2025-22738,0,0,5df876143cd2e8f6f1b456f1a5d948e1f71ead69b99197fd86f9725871713218,2025-03-03T18:36:26.930000 +CVE-2025-22739,1,1,5b098bc18a6a02e2a222a746c67639f13f7cb4689fead82dc02163e5be6802cf,2025-03-27T22:15:16.590000 +CVE-2025-22740,1,1,59e4629719cb7d46c1d2b8cd964e9bd8d1cf3a02fd768b4c4d0279bb9787e047,2025-03-27T22:15:16.747000 CVE-2025-22742,0,0,11a4a56fc317da9c8dfee788933cef43a2971f0d29d36632165000485ef746b0,2025-01-15T16:15:36.350000 CVE-2025-22743,0,0,76f32fc2f88d28b097346bb603b63ac7aee93ae537a00506ea3d57cf32b7feb9,2025-01-15T16:15:36.503000 CVE-2025-22744,0,0,9c4303b28715077c0dbe485fb40535cf186962e58a22a39419bcf9fb85bca699,2025-01-15T16:15:36.657000 @@ -284229,7 +284231,7 @@ CVE-2025-23605,0,0,a5c3f045d7f5392310e3b492d36e50315347b85ed5c038b043c5cd0276f08 CVE-2025-23606,0,0,90766fc8001f9931fea414b5dda3bc6adaf3411aaa9fbcf017409abaf142b264,2025-01-22T15:15:19.073000 CVE-2025-23607,0,0,644891006442e903fbf179ad53f57553b3ae1706983005c3775a2cd73265c3b7,2025-01-22T15:15:19.200000 CVE-2025-23609,0,0,2d1ae51d827307d5688ebafc347a4adf6cd78f47bdcd33d55e01a23dfca2ac4a,2025-01-22T15:15:19.343000 -CVE-2025-2361,0,0,70618654b4e9e66cd7decce6fb0803096f4baa51100e2a75b51be673a71f05da,2025-03-21T22:15:26.110000 +CVE-2025-2361,0,1,b9c91828fe3eb04ae28c37003e2160d536880a6e0d9788291870ea9626e34cf6,2025-03-27T21:15:50.553000 CVE-2025-23610,0,0,0bcb81d57261851ef09d1ff4eef60d378fd3132dcc27872e262fb4f82499c82e,2025-01-22T15:15:19.473000 CVE-2025-23611,0,0,d85c3eaa2a359ab1dd0cf8fc2d813b125c4ab2ba5978c80ec826f8303b177a52,2025-01-22T15:15:19.610000 CVE-2025-23612,0,0,a9a9c273ae96cc5319b66407459adc5c2e4559fc360cc6be56e5025be2b911e4,2025-03-27T16:45:27.850000 @@ -284993,7 +284995,7 @@ CVE-2025-24658,0,0,998dc8b87f0bb72c992e3106285f00f7037efa9c383eaa222321a76f3e0f2 CVE-2025-24659,0,0,7661064d144ed79b467af94013d805cb7f0b5286a5d4bf5f0a7f8ab4e84e50c3,2025-01-24T18:15:40.020000 CVE-2025-24660,0,0,79390b79b78a558e15c5049828cc80e47ac9a488050a775f2fd094872651a726,2025-02-03T15:15:29.287000 CVE-2025-24661,0,0,ee559a0615caff04167747aa96a1343906741386195a00d44e9fc310a58592a2,2025-02-03T15:15:29.547000 -CVE-2025-24662,0,0,368015a831a0b3a5963b212d5d3b9405c6f97012fceea9b31b8229f070dd86f1,2025-01-27T15:15:15.227000 +CVE-2025-24662,0,1,b3eae8cd7649d7ef39999c7169baa6def5d63ddc696ae3f7f3be305008defd43,2025-03-27T22:15:16.890000 CVE-2025-24663,0,0,cc1661410b4a7ce917aee2539d1bd237dfac747f65cb5d7f6520aee434b6b52e,2025-01-24T18:15:40.203000 CVE-2025-24664,0,0,f5dc842ab3bb4d6ec2a27107ca38585af9d2618fcdb0a14a7fcc578e366ccff9,2025-01-27T14:15:29.197000 CVE-2025-24665,0,0,e9fdfa7c6918005fc194d2fe8ba7c673d912fd27408a4cd41f1926193118d380,2025-01-27T15:15:15.427000 @@ -285993,6 +285995,7 @@ CVE-2025-2672,0,0,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b3 CVE-2025-2673,0,0,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000 CVE-2025-26731,0,0,f67730d1a62b21fe079b1f62dc56a1a46976a3111d95604fc1c76a197974aaca,2025-03-27T16:45:12.210000 CVE-2025-26732,0,0,18092d406c37e4a30c9ae075a22eb6aae01ecce04566cb69f72a098963162b7c,2025-03-27T16:45:12.210000 +CVE-2025-26733,1,1,5350d1b40bdc55abe57ba0617da5cc6ef8e9730712ff6e4c37ec5a3a8bf53489,2025-03-27T22:15:17.003000 CVE-2025-26734,0,0,51f70d1ee626286138ffb8787db02211365b7911510348e4749574e2cb0dd1cd,2025-03-27T16:45:12.210000 CVE-2025-26736,0,0,13dbfe77eb0e0384e05f3b46e4d9a063fe7550a0611589936e9364a96c62f4be,2025-03-27T16:45:12.210000 CVE-2025-26737,0,0,0011f80f568732a76bf0e41589180a4b80fdd2947b1363241733ff8a89deb66c,2025-03-27T16:45:12.210000 @@ -286060,6 +286063,8 @@ CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b08 CVE-2025-26869,0,0,a478c5658e508ed802536bcbcd20e5908ef4279d4bf22775ffd2201f754d48ea,2025-03-27T16:45:27.850000 CVE-2025-2687,0,0,27bb11d09e87f67e308b5df8d882120f5aff0d2280b537587a204562dcae0660,2025-03-27T18:14:18.840000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 +CVE-2025-26873,1,1,eb46759c2511d25b3a5ba89d14df4da025114da63eab080f07cbe57191e88287,2025-03-27T22:15:17.150000 +CVE-2025-26874,1,1,6a8546be19b89ac2421d3ba8639e069a9decd3968f928ff3188b86bbd867641f,2025-03-27T22:15:17.293000 CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000 CVE-2025-26876,0,0,22d5e3662987726006c8c5bdd9aefc0ed802e210686667cf89016011bdc03010,2025-02-25T15:15:24.180000 CVE-2025-26877,0,0,b6bbd106fc09effb170ea41e4eff1e72fc5e0e40d7a5e670464380cec25fedef,2025-02-25T15:15:24.380000 @@ -286074,11 +286079,13 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 CVE-2025-2689,0,0,7def21fc4f9af6929592c74150fdb16a7f32a04a61b4c9679449b0c0f3db1408,2025-03-24T17:17:26.607000 +CVE-2025-26890,1,1,17c7adda9981ffd9d35e1647a87fe111b7fd8049db22463d0e6b35830748178f,2025-03-27T22:15:17.440000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000 CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000 CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000 CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000 +CVE-2025-26898,1,1,22c6720f88efaa03f95b265c4ca5e785db98c0144a053351ad4538510aee2a83,2025-03-27T22:15:17.573000 CVE-2025-26899,0,0,95b084e2f68809ccb6891be9923c60028fc93cee3b6a691436d8301682c70fa6,2025-03-15T22:15:14.250000 CVE-2025-2690,0,0,ba0a819c9af2cc9ef6be5031e2f922b414ad3e85f830bda091f0f98a651b600e,2025-03-24T17:15:40.917000 CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702ad8,2025-02-25T15:15:25.853000 @@ -286121,6 +286128,7 @@ CVE-2025-26947,0,0,17ca4a960f692537dd7bd29667eead07a638e9187cd25b27f2e6eb39d83f1 CVE-2025-26948,0,0,7e692ce2f0fb2189773dab014b01c64cf92c1c0d6e24b0bdecd31d44fc8a160e,2025-02-25T15:15:28.597000 CVE-2025-26949,0,0,756ec3a8273ffe21cd013eae401b29681f02ddf1186e27472f179b3deeae84ca,2025-02-25T15:15:28.733000 CVE-2025-26952,0,0,a13de9204c8fb7f5ac97c6580a46c2af94bfa390df931bb26a31447f73f1cb45,2025-02-25T15:15:28.870000 +CVE-2025-26956,1,1,59f90ab299f93cfbcd9b81046cc32c0581f331b3d4d6c325e42704b336adc393,2025-03-27T22:15:17.717000 CVE-2025-26957,0,0,6c29e79d7d5ad28c3d1452c9dd015db2eba8e2ce8661a68ea61bf9040ea56305,2025-02-25T15:15:29.010000 CVE-2025-26960,0,0,ad36f999467934854428e722bc7b7f4dfd105622c135096dd3c0aa70afd80457,2025-02-25T15:15:29.150000 CVE-2025-26961,0,0,32038fb2c0fd1f686db79d976fcbcdf3a25031c595e82f3f1b331462be320b81,2025-03-15T22:15:14.960000 @@ -286598,7 +286606,7 @@ CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000 CVE-2025-2854,0,0,185208968a442a85cdd6b4f4f60fcb2b65d89a8cdf76ae7b9385fd96015563ab,2025-03-27T16:45:12.210000 CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000 -CVE-2025-2857,0,1,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000 +CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000 CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 @@ -286709,7 +286717,7 @@ CVE-2025-29226,0,0,598431993e1dea28d2a41edf1a133ff19583a46461026345d090d7abff0d6 CVE-2025-29227,0,0,15031612a342f1663453dfb027586c6db2ea2f4e163dcc47110f16a263fdb927,2025-03-21T19:15:46.310000 CVE-2025-29230,0,0,82fd9baf0d57bfe253b1907c4d74fadd09e960a1c557455f486f92c59e6e235a,2025-03-21T18:15:38.943000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 -CVE-2025-29306,1,1,e1023615173b6d92ee43b1044c0a9ac09bc1586c199274f23eafc952a95e5ccf,2025-03-27T19:15:49.290000 +CVE-2025-29306,0,0,e1023615173b6d92ee43b1044c0a9ac09bc1586c199274f23eafc952a95e5ccf,2025-03-27T19:15:49.290000 CVE-2025-29310,0,0,5968624cc4eac663d93be6b2916e12611652e7aaf63c8a9dec75d1bf422a4ce5,2025-03-27T16:45:46.410000 CVE-2025-29311,0,0,161950615d0127c3236db6118583f44a1a788e99b252d828a62135dca0485d9d,2025-03-27T16:45:46.410000 CVE-2025-29312,0,0,ce414325add69c05fcd36bd91b11e6c0ba3aecbf3624ac26ac84c6a1a5a8fea8,2025-03-27T16:45:46.410000 @@ -286739,7 +286747,7 @@ CVE-2025-29427,0,0,fb06bea0565e418e672284053343d8d697fe811255662bb7ca45bb09b0b61 CVE-2025-29429,0,0,70ed76e22abf856ea286be6fccfd66e6102b6f8a8d8567a46ea60e2a92631a4a,2025-03-25T18:46:50.230000 CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b283a,2025-03-25T18:44:43.817000 CVE-2025-29431,0,0,31720ec0bc8cba4659c1c2d3999cf0913efe8183aa46190b4c6f3ec8b4bb5bc1,2025-03-19T19:15:50.223000 -CVE-2025-29483,0,1,1c4dfd2a92ae2ca576ed75da199ffe16123bea30fcc4252e1e6d3267ab61b70c,2025-03-27T19:15:49.380000 +CVE-2025-29483,0,0,1c4dfd2a92ae2ca576ed75da199ffe16123bea30fcc4252e1e6d3267ab61b70c,2025-03-27T19:15:49.380000 CVE-2025-29484,0,0,1bb36b7e889238e32c77bbf1cc0cbeefbc7ec16e65b841e22b84a9a74bef45f0,2025-03-27T16:45:12.210000 CVE-2025-29485,0,0,de1a86369d082156c421a3233bf3d853b9b73c385a63f0f12155fdcc620be3cf,2025-03-27T16:45:12.210000 CVE-2025-29486,0,0,b4ca882bf3d4e82aabe25b1ce07ad473b478483d0b500ef2eb50d269623c7e3b,2025-03-27T16:45:12.210000 @@ -286813,7 +286821,7 @@ CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c1 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 -CVE-2025-30093,1,1,121b8925c56c9b2babddec51424e1a66dd8b32b15f254aeeeeaab40cbb5fc7a3,2025-03-27T19:15:49.677000 +CVE-2025-30093,0,0,121b8925c56c9b2babddec51424e1a66dd8b32b15f254aeeeeaab40cbb5fc7a3,2025-03-27T19:15:49.677000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 @@ -286883,11 +286891,11 @@ CVE-2025-30355,0,0,c181bb9f03178ada7f8864d95d9a7bf782ab89dac6c391740fa45089c2c71 CVE-2025-30358,0,0,1336bf68dc77795212b15e968253b9b288e4ef6b51817854b1199a3a91700753,2025-03-27T16:45:12.210000 CVE-2025-30361,0,0,06f550a7eefd9f28cf06a8d784513dfd1d48b0b7dab2795bc2fb88731b684659,2025-03-27T17:15:57.167000 CVE-2025-30362,0,0,3dfd8d8039ce5200035bdd0164b2b22b6def4d52fc472ba14ea275d3f5d2f5ee,2025-03-27T17:15:57.357000 -CVE-2025-30363,0,1,aaf91a8bd29409d88acc88d6feb74d228a84788db8ff9df13b4923b111cd88dc,2025-03-27T19:15:49.877000 -CVE-2025-30364,0,1,4b4940d6e80ca4623ac6e07b442fa34d2a2e5145a055b7fec311f87ad7ea2a87,2025-03-27T19:15:50.193000 -CVE-2025-30365,0,1,0fb6ad8b9cc1386c7c7a199337e2288c094cca4c0b764a4aa22a6d4630d8da57,2025-03-27T19:15:50.297000 -CVE-2025-30366,0,1,e9a3d99ed82d95574110d0e12c95e3535524dfda831f7e1f11e16e0930a733dd,2025-03-27T19:15:50.427000 -CVE-2025-30367,0,1,8f521c65fc5c6a4f459b61da6b32b8b65de98a3a2ad3f6a40dd09a099e12f187,2025-03-27T19:15:50.537000 +CVE-2025-30363,0,0,aaf91a8bd29409d88acc88d6feb74d228a84788db8ff9df13b4923b111cd88dc,2025-03-27T19:15:49.877000 +CVE-2025-30364,0,0,4b4940d6e80ca4623ac6e07b442fa34d2a2e5145a055b7fec311f87ad7ea2a87,2025-03-27T19:15:50.193000 +CVE-2025-30365,0,0,0fb6ad8b9cc1386c7c7a199337e2288c094cca4c0b764a4aa22a6d4630d8da57,2025-03-27T19:15:50.297000 +CVE-2025-30366,0,0,e9a3d99ed82d95574110d0e12c95e3535524dfda831f7e1f11e16e0930a733dd,2025-03-27T19:15:50.427000 +CVE-2025-30367,0,0,8f521c65fc5c6a4f459b61da6b32b8b65de98a3a2ad3f6a40dd09a099e12f187,2025-03-27T19:15:50.537000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000 CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000